The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How to Remove the Roadblocks to Going Passwordless

How to Remove the Roadblocks to Going Passwordless

The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity
How to Protect Against Double-extortion Ransomware Attacks

How to Protect Against Double-extortion Ransomware Attacks

Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
How to Protect Against Double-extortion Ransomware Attacks

How to Protect Against Double-extortion Ransomware Attacks

Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
Insikt Report – Deepfakes : I Have No Mouth, and I Must Do Crime

Insikt Report – Deepfakes : I Have No Mouth, and I Must Do Crime

Intelligence company Recorded Future today released the findings of its latest deepfakes research. Titled “I Have No Mouth, And I Must Do Crime”, the report looks at how the spread of deepfake technologies, specifically through advancements in AI-based voice cloning, is pushing scams to a new level.
Shadow API Usage Surges 900%, Revealing Alarming Lack of API Visibility Among Enterprise

Shadow API Usage Surges 900%, Revealing Alarming Lack of API Visibility Among Enterprise

New Research Highlights APIs are Now a Leading Attack Vector, Posing New and Significant Threats to Organisation
Rethinking How to Engage Australian Directors in Security Budget Discussions

Rethinking How to Engage Australian Directors in Security Budget Discussions

Boards are still fractured when it comes to cybersecurity capability, skills and buy-in, but there are ways for CISOs to navigate this to keep their programs funded.
Rethinking How to Engage Australian Directors in Security Budget Discussions

Rethinking How to Engage Australian Directors in Security Budget Discussions

Boards are still fractured when it comes to cybersecurity capability, skills and buy-in, but there are ways for CISOs to navigate this to keep their programs funded.
New Research: Digital Trust Is Integral to Innovation and Resilience,  but Major Gaps Threaten Business Operations and Reputations

New Research: Digital Trust Is Integral to Innovation and Resilience, but Major Gaps Threaten Business Operations and Reputations

99 percent of respondents in ANZ say digital trust is important and 84 percent say its importance will increase in five years; but a lack of training (52 percent) and leadership buy-in (52 percent) jeopardise the value it can deliver.
No results found.

In the News

Capture the Bug Achieves CREST Penetration Testing Accreditation in Australasia

Capture the Bug Achieves CREST Penetration Testing Accreditation in Australasia

Capture The Bug, a leading Penetration Testing as a Service (PTaaS) platform, is proud to announce its official CREST Penetration Testing accreditation in Australasia. This significant milestone demonstrates our commitment to delivering the highest standards of cybersecurity testing across Australia and New Zealand, placing Capture The Bug among an ...
New Sophos Report Finds AI Adoption and Increased Threat Activity Amongst Drivers Keeping Cybersecurity Burnout High in Australia in 2025

New Sophos Report Finds AI Adoption and Increased Threat Activity Amongst Drivers Keeping Cybersecurity Burnout High in Australia in 2025

Shadow AI, resource and budget shortages and meeting compliance and regulatory requirements put pressure on security teams
Claroty Achieves AWS Manufacturing and Industrial Competency for OT Security

Claroty Achieves AWS Manufacturing and Industrial Competency for OT Security

Claroty achieves AWS Manufacturing and Industrial Competency for OT Security. Achievement highlights company’s ability to provide unrivalled OT expertise for securing mission-critical infrastructure.
Turnitin Enhances Capabilities Amid Growing AI Bypasser Use

Turnitin Enhances Capabilities Amid Growing AI Bypasser Use

New detection feature helps educators detect potential AI misuse
Check Point Named a Leader in the 2025 Gartner Magic Quadrant for Hybrid Mesh Firewall

Check Point Named a Leader in the 2025 Gartner Magic Quadrant for Hybrid Mesh Firewall

Delivering AI-powered network security across on-premises, cloud and SASE to prevent the most advanced threats
CyberArk Helps Optiv Transform Workforce Access, Applying Privilege Controls to Every Identity

CyberArk Helps Optiv Transform Workforce Access, Applying Privilege Controls to Every Identity

Replaces legacy SSO with CyberArk to enable secure, frictionless workforce access
HCLTech and Rubrik to Deliver Multi-Layered Cybersecurity

HCLTech and Rubrik to Deliver Multi-Layered Cybersecurity

HCLTech’s VaultNXT powered by Rubrik provides ransomware detection and remediation, ensuring data integrity for complete cyber resilience
Citrix NetScaler ADC and NetScaler Gateway Zero-Day Remote Code Execution Vulnerability Exploited in the Wild

Citrix NetScaler ADC and NetScaler Gateway Zero-Day Remote Code Execution Vulnerability Exploited in the Wild

Citrix has released patches to address a zero-day remote code execution vulnerability in NetScaler ADC and NetScaler Gateway that has been exploited. Organisations are urged to patch immediately as Citrix’s NetScaler ADC and Gateway appliances have been a valuable target for attackers over the last several years. “While patches are available for ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This