The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Organisations Must Adapt Defences To 2025’s Dynamic Ransomware Threat

Organisations Must Adapt Defences To 2025’s Dynamic Ransomware Threat

Ransomware has entered a new phase in 2025—faster, more unpredictable, and increasingly targeting APAC. Reactive security no longer works and organisations must adopt intelligence-led, multi-layered defences to keep pace.
IT-OT Convergence: What Happens When Two Worlds Collide?

IT-OT Convergence: What Happens When Two Worlds Collide?

​Most people thought that cybersecurity is all about data breaches, suspicious links, or adversaries trying to get access to your accounts. But in recent years, the space has gone beyond computers and firewalls. Today, cybersecurity also means keeping the power on, the water safe, and hospitals operational. Recently on the DevSecOops podcast, hosts ...
Hygiene is Hard: Why Even Security-Conscious Organisations Still Fall at the First Hurdle

Hygiene is Hard: Why Even Security-Conscious Organisations Still Fall at the First Hurdle

Simply put, organisations need to move beyond reactive threat hunt engagements to proactive identity security and zero trust and statistics show this is one of the biggest gaps in our environments today that need attention
The Next Scammer’s Paradise

The Next Scammer’s Paradise

The email looks real. It sounds like your boss. Thinking it might be urgent, you click the link included therein. And just like that, it’s over. This is the new face of cybercrime. Powered by AI, cybercrime no longer requires technical prowess nor heavy coding. All you need is the right tool and the appropriate prompt; something that can scrape ...
The PIN That Wasn’t Yours

The PIN That Wasn’t Yours

Fintech gift card system flaw may have allowed quiet cashouts. Signs point to possible exploitation months before it was discovered.
It’s Time to Hack the Hackers

It’s Time to Hack the Hackers

Introduction Cybercrime in Australia is rising rapidly. From the major breachers that held headlines hostage for months, to government agencies and critical infrastructure being targeted, cyberattacks continue to hit hard and fast. In the last few months alone, a major Australian university appears to have fallen victim to a ransomware attack, a ...
Resilience Comes from Knowing What to Prioritise

Resilience Comes from Knowing What to Prioritise

As cyber threats and disruptions grow, organisations must make data resilience a core component of their IT strategy to ensure business continuity and safeguard critical data.
Shadow AI Is The Blind Spot No Australian Board Can Ignore

Shadow AI Is The Blind Spot No Australian Board Can Ignore

Australia’s corporate leaders are sleepwalking into a technology blind spot that will cost them dearly. Shadow AI is already entrenched in workplaces, and boards that treat it as a side issue are making the same mistake they made a decade ago with shadow IT and cloud adoption. Back then, companies allowed employees to use unapproved cloud apps because ...
No results found.

In The News

Mitsubishi Electric to Acquire Nozomi Networks to Improve Industrial Cyber Defences and Power Operational Transformation

Mitsubishi Electric to Acquire Nozomi Networks to Improve Industrial Cyber Defences and Power Operational Transformation

• ‍Nozomi Networks, a global leader in OT, IoT and CPS security, defends organisations around the world from cyber threats and operational disruption ‍ • The acquisition accelerates Nozomi’s industrial cybersecurity innovation while maintaining its heterogeneous approach to supporting customers and partners ‍ • Both companies share a vision for the ...
DevSecOps in the AI Era: JFrog Powers Agentic Remediation with Self-Healing Software Supply Chain

DevSecOps in the AI Era: JFrog Powers Agentic Remediation with Self-Healing Software Supply Chain

New JFrog Platform MCP connections with GitHub Copilot deliver autonomous security resolution capabilities directly into developer workflows
JFrog Unveils Industry’s First Agentic Repository, Revolutionising How Developers Deliver AI-Native Software

JFrog Unveils Industry’s First Agentic Repository, Revolutionising How Developers Deliver AI-Native Software

JFrog Fly delivers a zero-config, fully transparent agentic repository for accelerating modern, AI-driven software delivery
JFrog Unveils AppTrust: “DevGovOps” Solution to Redefine Software Release Governance

JFrog Unveils AppTrust: “DevGovOps” Solution to Redefine Software Release Governance

Platform-native, secure, release management solution delivers evidence-based insights for software supply chain security, compliance, and integrity
Kyndryl Survey Reveals That Mainframe Modernisation Projects Deliver 2-3X Return on Investment

Kyndryl Survey Reveals That Mainframe Modernisation Projects Deliver 2-3X Return on Investment

Respondents expect AI will drive billions in cost savings and increased revenues. The mainframe powers AI innovation across hybrid IT environments.
KnowBe4 Defines a Holistic Approach to Human Risk Management

KnowBe4 Defines a Holistic Approach to Human Risk Management

KnowBe’s new HRM framework guides organisations to transform employees into an active layer of defence through data-driven insights, cultural understanding and targeted interventions
Cohesity Appoints Greg Statton as Chief Technology Officer, Asia Pacific and Japan

Cohesity Appoints Greg Statton as Chief Technology Officer, Asia Pacific and Japan

SYDNEY – September 10 2025 – Cohesity, a leader in AI-powered data security, today announced the appointment of Greg Statton as Chief Technology Officer for the Asia Pacific and Japan (APJ) region. In this newly created role, Statton will lead technology strategy and innovation initiatives across APJ, supporting Cohesity’s mission to deliver ...
Secure Code Warrior Expands Commitment to Secure by Design Best Practices with Free Secure Code Video Series for Developers

Secure Code Warrior Expands Commitment to Secure by Design Best Practices with Free Secure Code Video Series for Developers

Launch of new 12-week video series on AI/LLM security empowers developers to safely adopt AI coding and mitigate emerging security risks 
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This