The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Fragile or Future-ready? The Decisions Shaping Australia’s AI Ambitions
Introduction
Senior data leaders are being asked to navigate a level of complexity that feels new, even by recent standards. Across Australia, organisations are under pressure to turn AI ambition into real outcomes, often while working with fragile data foundations that were never designed for this level of demand.
Other factors compound that ...

AI Moving Faster Than Security, Creating a New Identity Crisis
AI is reshaping the cybersecurity landscape faster than organisations can adapt. For CISOs, the challenge is no longer whether to govern AI, but how quickly they can close the gap between deployment and control.

Why the Illusion of Control Is Failing Australian Identity Security Programmes
Most Australian enterprises believe they have identity security under control. Frameworks are in place, policies are documented, and zero trust strategies feature prominently in boardroom presentations and annual reports. On paper, it looks robust. In practice, many organisations are running identity controls that were designed for a world that no ...

It’s Not Just Big Companies Anymore. Small Businesses in the Firing Line
A new wave of cyber loss data is painting a clear picture for businesses in 2026, and picture indicates that it’s Small-to-Medium Businesses (SMBs) that are bearing the brunt.
Industry experts warn that while ransomware headlines command the news cycle, the real financial devastation is coming from something less visible, prolonged business ...

Beyond ‘Vibe Coding’: Securing AI-Generated Software Requires a Risk-First Strategy
Organisations face significant security risks in the era of "vibe coding" and AI-generated software. A recent benchmark test conducted by Armis that revealed that every model struggles to consistently produce secure code. This reality necessitates that Application Security (AppSec) programs shift away from fragmented vulnerability scanner management ...

Why Businesses Must Rethink Security in a Fragmented Digital Era
A unified identity security strategy not only reduces risk but also enables organisations to innovate with greater confidence. As companies continue to adopt AI, automation, and cloud-native architectures, those with strong identity security will be better positioned to scale securely and minimise identity-based risks.

Why Compute Power is Becoming Formula 1’s Ultimate Advantage
The Scene
Over the weekend, the heat in Miami wasn’t the only thing rising. Oracle Red Bull Racing's approach to operationalising their data with the intent to win was at the forefront.
Amongst the elite and the fast cars, there’s a version of Formula 1 that most people understand, and then there’s the version that actually decides who wins races; ...

Is AI Under Fire? Genetec CEO Warns of Dangerous Tech Failures
Introduction
Founder, President and CEO of Genetec Pierre Racz recently delivered a keynote in Genetec’s HQ in Montreal about the future of artificial intelligence, arguing the industry is barreling toward risk, misinformation and accountability failures unless leaders change course now.
According to Racz, AI doesn’t actually understand ...
No results found.
In the News
Palo Alto Networks Introduces Idira: The Next-Generation Identity Security Platform Built for the AI Enterprise
Delivers modern privileged access management by democratising security controls for every human, machine and agentic identity
Veeam Previews New Release of Veeam Data Platform at VeeamON New York City, Further Advancing Unified Data Trust
Veeam Data Platform v13.1 advances secure-by-design data resilience with more than 70 new features and enhancements, and extends management with a new DataAI Resilience Module in the Veeam DataAI Command Platform
80% of Australian Organisations Suffered at Least One Identity Breach in the Past Year, Sophos Research Finds
Today, Sophos released the State of Identity Security 2026, a vendor-agnostic survey of 5,000 IT and cybersecurity leaders across 17 countries, including 300 in Australia. The survey found that 80% of Australian organisations surveyed suffered at least one identity-related breach in the past year, and on average organisations reported three separate ...
Infosys Launches Dedicated Global Security Operations Center in Australia; Expands Cybersecurity Capabilities Across ANZ
Infosys has launched its first dedicated Global Security Operations Center (GSOC) in Australia, at its North Sydney office. The GSOC will bring together specialist security talent, established operations capabilities, and proven delivery processes under Infosys’ global security framework. Following Infosys’ acquisition of The Missing Link, a leading ...
Boomi and Red Hat Collaborate on Production-Ready Agentic AI
Companies team to deliver a unified, enterprise-scale agentic stack to help organisations with managing data sovereignty and optimising AI costs
Veeam Launches DataAI™ Command Platform, the Industry’s First Unified Data and AI Trust Infrastructure for the Agentic Era
Combining #1 Data Resilience with #1 Data Security, Veeam delivers the missing layer in the AI stack, bringing together Data, Access, Identities, and AI in one connected trust platform
Boomi Unveils Innovations That Power the Agentic Enterprise
Orchestration capabilities simplify workflows, while advanced agent connectivity and an enhanced context layer activate data and scale AI
Veeam Unveils Intelligent ResOps for the Agentic AI Era, Turning Data Context Into Faster, More Precise Recovery
Part of the new Veeam DataAI™ Command Platform, this new Veeam solution add-on, powered by the Veeam DataAI Command Graph, unifies data context and recovery so enterprises can manage, back up and retain data more intelligently, respond faster, and restore only what’s impacted | Microsoft 365 is the first supported workload, with additional workloads ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
