The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Cybersecurity Leaders Struggle to Turn Data Into Boardroom Decisions
Cybersecurity leaders are sitting on more data than ever, yet many organisations remain unable to translate it into decisions that resonate at board level. The core issue is not data scarcity, but the difficulty of converting technical signals into meaningful assessments of business risk. Security teams can track alerts, incidents, throughput, and ...

Defend the Next Cyberattack at Unprecedented Speed. Be IT a Human or an AI
The next cyberattack could be human, or a human engineering an AI from the outside, or an AI engineered from the inside. It could be a zero-day attack or a known weakness that was never mitigated. It could be a cyberattack, a collective, a lone warrior, or a disgruntled employee. It does not matter.
What really matters is whether you were ready to ...

Oracle Admits Customers No Longer Tolerate Vendor Lock in
Customers no longer want to live inside a walled garden. Requirements and workloads change, more frequently now with AI powering those decisions.
Oracle Cloud Infrastructure's Senior Vice President of Product Management Nathan Thomas laid out how AI, sovereignty demands, and rising customer expectations are forcing hyperscalers into a new paradigm, ...

Monday Morning Quarterbacking. Why Everyone Thinks they can Run a Cyber Crisis
When a cyberattack hits, most organisations think the real battle is all technical. They’re wrong.
According to Lisa Black, Director of Public Sector at Aeon Nexus, the real collapse often starts long before systems are restored and it has nothing to do with code.
“Threat actors exploit confusion more than code,” Black said. “The loss of confidence ...

If AI Talent Needs Permission, Your Competitor is Already Ahead
Introduction
Most organisations still treat AI as a program to control, a platform to roll out, or a governance issue to contain. That is understandable, but it is no longer enough. The real question is much sharper: can your best people build with freedom, speed, and confidence inside your organisation? Because if they cannot, someone else will. ...

Fragile or Future-ready? The Decisions Shaping Australia’s AI Ambitions
Introduction
Senior data leaders are being asked to navigate a level of complexity that feels new, even by recent standards. Across Australia, organisations are under pressure to turn AI ambition into real outcomes, often while working with fragile data foundations that were never designed for this level of demand.
Other factors compound that ...

AI Moving Faster Than Security, Creating a New Identity Crisis
AI is reshaping the cybersecurity landscape faster than organisations can adapt. For CISOs, the challenge is no longer whether to govern AI, but how quickly they can close the gap between deployment and control.

Why the Illusion of Control Is Failing Australian Identity Security Programmes
Most Australian enterprises believe they have identity security under control. Frameworks are in place, policies are documented, and zero trust strategies feature prominently in boardroom presentations and annual reports. On paper, it looks robust. In practice, many organisations are running identity controls that were designed for a world that no ...
No results found.
In the News
TrendAI™ Scales Threat Research to Address Vulnerabilities in AI Systems with Industry-leading Zero Day Initiative
Sydney, Australia - 20 May 2026 – TrendAI™, the enterprise cybersecurity business from Trend Micro Incorporated (TYO: 4704; TSE: 4704), has highlighted the growing importance of AI security for organisations around the world including Australia following the latest Pwn2Own competition in Berlin.
At the globally recognised hacking event, security ...
Operator XR Secures First European Contract with Swedish Military
ASX-listed xReality Group Limited has announced that its wholly owned subsidiary, Operator XR Pty Ltd (“Operator XR”), has secured its first European contract, supplying an OP-2 Virtual Reality (VR) tactical training system to a Swedish military end-user. The contract has been executed via Operator XR’s Swedish distribution partner, PROMOTEQ i ...
The $600 Billion Wake-up Call: New Splunk Research Reveals Downtime is a Systemic Business Crisis
The $600 Billion Wake-up Call: New Splunk Research Reveals Downtime is a Systemic Business Crisis
$600 Billion Annual Impact: Aggregate downtime costs for the Global 2000 have soared 50% in two years.
$15,000 Per Minute: The average cost of downtime for organisations, highlighting the immediate financial impact of service disruptions.
...
Confluent Makes It Easier to Build and Secure Real-Time AI at Scale
New capabilities remove barriers to production-ready AI applications with agent-powered workflows, automated data protection, and private cloud connectivity
Barracuda Collaborates With CyberCert On Simpler Compliance Certification for Australian Businesses
New relationship will reduce cost and complexity of cybersecurity compliance certification for small-to-medium businesses in A/NZ
AI Has Left the Lab: F5 Report Reveals 78 per cent of Enterprises Now Run AI Inference as a Core Operation
2026 F5 State of Application Strategy Report shows production AI model and agentic AI trends fundamentally shifting how enterprises deliver and secure apps in hybrid multicloud environments | Despite the large number of enterprises globally running AI inference, A/NZ organisations are trailing their global counterparts significantly, with less than ...
BeyondTrust Named an Overall Leader in 2026 KuppingerCole Analysts Leadership Compass for Privileged Access Management for Sixth Consecutive Year
Atlanta, GA – May 18, 2026 – BeyondTrust, the global leader in privilege-centric identity security protecting Paths to Privilege™, today announced it has been recognized by KuppingerCole Analysts AG as an Overall Leader in the 2026 Leadership Compass for Privileged Access Management (PAM), with leadership positions across Product, Innovation, and ...
Australia Urged to Prepare for PQC by 2030 As Readiness Lags
New research also finds 78% of organisations see legacy systems as their biggest security risk
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
- 353
- 354
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
