The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Australia Moves to Honour its Secret Holders. Starting With a Crowdfunding Campaign
Australia’s intelligence community has long operated in the shadows, but now, a bold push is underway to bring those stories into the light. But instead of a government backed rollout, it’s starting with a GoFundMe page ahead of its major raise.
Australia, unlike allies such as the United States and the United Kingdom, ...

Three Critical Actions for Achieving An Optimal SAP Cybersecurity Budget
Any enterprise is subject to cyberattacks. The details about incidents concerning critical enterprise applications like SAP S/4HANA are often internal, and hence, public awareness is not up to the mark of malware and phishing. As the attacks become more sophisticated, it is important to understand what your optimal budget should be to protect ...

From 398 to 200 Days: Understanding the TLS Certificate Lifespan Reduction
Digital trust is entering a new phase, and on March 15, 2026, a policy change will take effect that reshapes how organisations approach security.
In 2025, the CA/Browser Forum, a consortium of browser vendors and certificate authorities, approved revisions to public TLS standards, introducing a phased reduction in certificate lifespans to better ...

Cybersecurity Leader Sean Duca exits Vendor Land after 25 years, Launches Boutique Executive Advisory Firm
After more than two decades inside the global technology vendor ecosystem, cybersecurity heavyweight Sean Duca is stepping out on his own.
Duca, most recently Chief Technology Officer for Customer Experience at Cisco, has officially launched The Duca Group, a boutique executive advisory firm designed to help boards, C-suite leaders and Founders make ...

Reducing Cyber and Physical Risks: What Every IT Manager Should Know About Access Control
Access control has long been treated as a function of facilities teams, focused on unlocking and locking doors. As digital systems and physical spaces become more interconnected, that point of view needs to be rethought.
Access control is now playing an added role to cybersecurity and operational strategy. The systems that determine who can enter ...

How Modern Search Technology Is Changing Video Investigations For Security Teams
Intelligent search reflects a practical evolution in how video is used during investigations. Rather than changing what security teams do, it changes how quickly and confidently they can do it. By simplifying review workflows and reducing manual effort, intelligent search helps teams manage investigation workloads more effectively.

International Women’s Day
International Women’s Day is a moment to celebrate progress, possibility and the incredible women shaping the future of our industry. Reflecting on my own journey from engineering into leadership within the technology sector, one thing stands out, growth rarely follows a straight line. It is built through curiosity, resilience and the willingness to ...

How ‘Verified Trust’ Is Redefining Digital Authentication in the Age of AI
When verified trust becomes embedded in every interaction, authentication transforms from a barrier into an enabler. It delivers not only protection against fraud and impersonation but also the confidence that underpins long-term relationships.
No results found.
In The News
Organisations Overlook AI Risk as Governance Fails to Keep Up
TrendAI™ research reveals pressure to deploy AI for business speed is outpacing control, visibility and accountability
Mandiant Report – Why Identity and Cloud Missteps are Fuelling Australia’s Next Wave of Cyber Attacks
Australian organisations are facing a subtle but significant shift in cyber risk — one where attackers no longer need to break in, because they can simply log in.
According to the latest M-Trends report from Google Cloud’s Mandiant division, the global threat landscape is being reshaped by a combination of credential theft, cloud misconfigurations and ...
ESET Launches Cloud Workload Protection and AI Enhancements for ESET PROTECT Customers
● ESET to protect cloud virtual machines (VMs) from advanced threats with its new ESET Cloud Workload Protection module.
● While competitors often offer cloud workload protection as a stand-alone offering, ESET includes it at no additional cost for ESET PROTECT customers.
● Other updates include advanced AI reporting for ESET’s cloud sandboxing ...
DigiCert Releases Latest Tools to Secure Digital Documents and Mitigate AI Fraud
Updates to Document Trust Manager streamline signing and centralise key management
Tanium Accelerates Autonomous IT with AI and Security Innovations
New platform capabilities unveiled at RSAC 2026 conference span Security Operations, Exposure Management and Endpoint Management – driven by AI and real-time intelligence
CrowdStrike Launches the Charlotte AI AgentWorks Ecosystem for Building Secure Agents
Collaboration partners including Accenture, AWS, Anthropic, Deloitte, Kroll, NVIDIA, OpenAI, Salesforce, and Telefónica Tech accelerate agentic SOC transformation for customers with CrowdStrike’s no-code security agent development platform
WatchGuard Expands NDR Capabilities, Making Advanced Network Threat Detection Practical for MSPs and Midmarket Organisations
SYDNEY – 26 March, 2026: WatchGuard® Technologies, a global leader in unified cybersecurity for MSPs, today announced new WatchGuard NDR for Firebox, Managed NDR and Total NDR offerings for organisations to easily deploy and scale AI-powered threat detection that uncovers, investigates and contains malicious activity without added complexity. This ...
Geopolitical Tensions Drive Sustained Surge in Cyber Attacks
Bitdefender has today released new research revealing that cyber attacks linked to geopolitical conflict are escalating in both volume and sophistication, with a 130% increase in phishing and malware campaigns targeting Gulf countries following the recent escalation involving Iran, Israel and the United States.
The research shows a clear inflection ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
