The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

International Women’s Day

International Women’s Day

International Women’s Day is a moment to celebrate progress, possibility and the incredible women shaping the future of our industry. Reflecting on my own journey from engineering into leadership within the technology sector, one thing stands out, growth rarely follows a straight line. It is built through curiosity, resilience and the willingness to ...
How ‘Verified Trust’ Is Redefining Digital Authentication in the Age of AI

How ‘Verified Trust’ Is Redefining Digital Authentication in the Age of AI

When verified trust becomes embedded in every interaction, authentication transforms from a barrier into an enabler. It delivers not only protection against fraud and impersonation but also the confidence that underpins long-term relationships.
Tanium Names Satyen Desai Regional VP for ASEAN, as Company Doubles Down on Growth in the Region

Tanium Names Satyen Desai Regional VP for ASEAN, as Company Doubles Down on Growth in the Region

Cybersecurity and endpoint management firm Tanium has appointed Satyen Desai as the new Regional Vice President for ASEAN, signalling the company’s continued push to expand its presence across one of the world’s fastest growing economies. Desai announced the move while attending Tanium’s global Sales Kickoff (SKO) in Dallas, describing the opportunity ...
What Einstein would say about AI

What Einstein would say about AI

Einstein was talking about the concept of “technological unemployment,” the idea that technology will destroy jobs and lead to disaster. Will AI cause mass unemployment? Probably not, because when it comes to economics, Einstein was no Einstein. The vast majority of economists, including me, do not think that automation was an important cause of the ...
The AI Edge in Edge Security

The AI Edge in Edge Security

As Australian organisations expand into hybrid cloud and edge environments, their attack surface is rapidly growing beyond the traditional perimeter. This byline explores how AI-first, platform-led security enables real-time threat detection at the edge, strengthens Zero Trust enforcement and unifies protection across cloud, OT and endpoints. It argues ...
AI Versus AI: Why The Next Cyber Security Battle Will Be Fought By Machines

AI Versus AI: Why The Next Cyber Security Battle Will Be Fought By Machines

Artificial intelligence has evolved from being a technical novelty into a powerful business tool with remarkable speed. Companies are embedding generative AI into customer service, software development, and finance operations to unlock efficiency gains and accelerate innovation. However, as adoption deepens, cyber security leaders are confronting a new ...
Eliminating the Technical Debt Caused by AI-Assisted Software Development

Eliminating the Technical Debt Caused by AI-Assisted Software Development

The software development community is experiencing a near ubiquitous usage of AI coding tools as teams face pressure to generate more output in less time. While the huge efficiency gains from the tools help significantly, teams too often fail to incorporate adequate safety controls and practices into AI deployments. Industry leaders are pushing for ...
Why Identity Security Is Breaking Under the Weight of Silos

Why Identity Security Is Breaking Under the Weight of Silos

Identity has become the connective tissue of the modern enterprise, and the connective tissue of modern attacks. As digital environments grow more complex and AI-driven identities multiply, the cost of managing identity security in silos will only rise.
No results found.

In The News

“LeakyLooker” Discovery Reveals Nine Vulnerabilities in Google Looker Studio, Exposing Sensitive Cloud Data

“LeakyLooker” Discovery Reveals Nine Vulnerabilities in Google Looker Studio, Exposing Sensitive Cloud Data

Tenable Research has uncovered a series of security vulnerabilities in Google Looker Studio, dubbed "LeakyLooker," that allowed attackers to run arbitrary SQL queries on victims’ databases and exfiltrate sensitive data within organisations' Google Cloud environments.
Identity Attacks and AI Risks Emerging as Key Cloud Threats for Australian Organisations

Identity Attacks and AI Risks Emerging as Key Cloud Threats for Australian Organisations

Australian organisations accelerating their adoption of cloud and artificial intelligence technologies may be exposing themselves to new cybersecurity risks, according to new research from Google Cloud. The company’s Cloud Threat Horizons Report H1 2026 highlights a shift in how cyber attackers target cloud environments, with identity systems, cloud ...
Saviynt Taps NEXTGEN, an Exclusive Networks Company, to Accelerate Digital Identity Security in Australia

Saviynt Taps NEXTGEN, an Exclusive Networks Company, to Accelerate Digital Identity Security in Australia

Collaboration strengthens Saviynt’s partner-first strategy as AI-driven identity risk builds across the APJ region. | Saviynt will broaden access to AI-ready identity security for organisations navigating growing digital risks | NEXTGEN will help scale Saviynt’s partner ecosystem across APJ, enabling faster adoption of identity-centric security in the AI era
Fortinet Advances Its Security Operations Platform with Unified SOC, Agentic AI, and Expanded Endpoint Security

Fortinet Advances Its Security Operations Platform with Unified SOC, Agentic AI, and Expanded Endpoint Security

New innovations unify cloud SOC, agentic AI, managed detection and response, and endpoint protection within a single Security Fabric architecture
Fortinet Introduces FortiOS 8.0 to Expand Secure Networking With Secure AI Controls, Fabric-based AI Agents, Flexible SASE, and Simplified SD-WAN

Fortinet Introduces FortiOS 8.0 to Expand Secure Networking With Secure AI Controls, Fabric-based AI Agents, Flexible SASE, and Simplified SD-WAN

Latest FortiOS capabilities help organisations secure AI adoption, simplify operations, and strengthen protection across hybrid and multi-cloud environments
Tenable Patch Tuesday Commentary – March 2026

Tenable Patch Tuesday Commentary – March 2026

Microsoft patched 83 CVEs in its March 2026 Patch Tuesday release, with eight rated critical and 75 rated as important. Our counts omitted one CVE (CVE-2026-26030) assigned by GitHub. Elevation of privilege (EoP) vulnerabilities accounted for 55.4% of the vulnerabilities patched this month, followed by remote code execution (RCE)vulnerabilities at ...
Google Threat Intelligence Group Warns Enterprise Systems Now Dominate Global Zero-day Attacks

Google Threat Intelligence Group Warns Enterprise Systems Now Dominate Global Zero-day Attacks

Enterprise technologies have emerged as the primary target for zero-day exploitation, according to new research from the Google Threat Intelligence Group (GTIG), signalling a continued shift away from traditional browser-based attacks toward enterprise infrastructure and edge devices. In its report, “Look What You Made Us Patch: 2025 Zero-Days in ...
Ping Identity Advances Regional Trust with PROTECTED-Level IRAP Assessment

Ping Identity Advances Regional Trust with PROTECTED-Level IRAP Assessment

Strengthens Support for Australian Government and Regulated Enterprises
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This