The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Australia’s Cyber Posture Needs More Than an Update

Australia’s Cyber Posture Needs More Than an Update

Australia’s cyber risk is no longer just a technology issue - it’s a capability gap. AI is accelerating both opportunity and exposure. The conversation about Australia’s cyber readiness can no longer focus on technology alone.
‘Platformisation is a myth.’ According to Long Standing Cyber Analyst

‘Platformisation is a myth.’ According to Long Standing Cyber Analyst

​Cybersecurity industry analyst Richard Stiennon at IT-Harvest says artificial intelligence is reshaping the future of digital defence at a pace most organisations still don’t fully understand and legacy security vendors could be in serious hot water if they fail to adapt. The longtime Analyst and Founder at IT-Harvest argued that AI is no longer ...
How Mythos Reshapes the Cyber Threat Landscape

How Mythos Reshapes the Cyber Threat Landscape

Many organisations still prioritise operational speed over security hardening, particularly when systems are ‘good enough’ to meet business needs. Mythos challenges this balance by increasing the cost of complacency.
Cybersecurity Leaders Struggle to Turn Data Into Boardroom Decisions

Cybersecurity Leaders Struggle to Turn Data Into Boardroom Decisions

Cybersecurity leaders are sitting on more data than ever, yet many organisations remain unable to translate it into decisions that resonate at board level. The core issue is not data scarcity, but the difficulty of converting technical signals into meaningful assessments of business risk. Security teams can track alerts, incidents, throughput, and ...
Defend the Next Cyberattack at Unprecedented Speed. Be IT a Human or an AI

Defend the Next Cyberattack at Unprecedented Speed. Be IT a Human or an AI

The next cyberattack could be human, or a human engineering an AI from the outside, or an AI engineered from the inside. It could be a zero-day attack or a known weakness that was never mitigated. It could be a cyberattack, a collective, a lone warrior, or a disgruntled employee. It does not matter. What really matters is whether you were ready to ...
Oracle Admits Customers No Longer Tolerate Vendor Lock in

Oracle Admits Customers No Longer Tolerate Vendor Lock in

Customers no longer want to live inside a walled garden. Requirements and workloads change, more frequently now with AI powering those decisions. Oracle Cloud Infrastructure's Senior Vice President of Product Management Nathan Thomas laid out how AI, sovereignty demands, and rising customer expectations are forcing hyperscalers into a new paradigm, ...
Monday Morning Quarterbacking. Why Everyone Thinks they can Run a Cyber Crisis

Monday Morning Quarterbacking. Why Everyone Thinks they can Run a Cyber Crisis

When a cyberattack hits, most organisations think the real battle is all technical. They’re wrong. According to Lisa Black, Director of Public Sector at Aeon Nexus, the real collapse often starts long before systems are restored and it has nothing to do with code. “Threat actors exploit confusion more than code,” Black said. “The loss of confidence ...
If AI Talent Needs Permission, Your Competitor is Already Ahead

If AI Talent Needs Permission, Your Competitor is Already Ahead

Introduction ​Most organisations still treat AI as a program to control, a platform to roll out, or a governance issue to contain. That is understandable, but it is no longer enough. The real question is much sharper: can your best people build with freedom, speed, and confidence inside your organisation? Because if they cannot, someone else will. ...
No results found.

In the News

Call for Nominations: STEM Changemakers Recognised in 29th Annual Women in Technology Awards

Call for Nominations: STEM Changemakers Recognised in 29th Annual Women in Technology Awards

Brisbane, Australia, 22 May, 2026 – Women in Technology (WiT) is calling for nominations to recognise outstanding women, female-led or majority-female teams, projects, start-ups and businesses making a meaningful impact across Queensland’s science, technology, engineering and mathematics (STEM) sectors. Among Australia’s largest and longest-running ...
Rapid7 Q1 2026 Threat Landscape Report Finds Vulnerability Exploitation Overtakes Social Engineering as the Top Initial Access Vector

Rapid7 Q1 2026 Threat Landscape Report Finds Vulnerability Exploitation Overtakes Social Engineering as the Top Initial Access Vector

Rapid7 has released its 2026 Q1 Threat Landscape Report, which examines how cyber attackers are accelerating operations and increasingly exploiting vulnerabilities faster than organisations can respond.
ManageEngine Rolls out Autonomous AI Capabilities Across Its Suite to Power Digital Enterprises

ManageEngine Rolls out Autonomous AI Capabilities Across Its Suite to Power Digital Enterprises

ManageEngine, a division of Zoho Corporation and a leading provider of enterprise IT management solutions, today announced the rollout of Zia Agents, the company's proprietary AI-powered autonomous agent, across its digital enterprise management suite. Built within a secure and privacy-compliant framework, these agents can orchestrate and execute tasks ...
CrowdStrike Delivers Visibility and Monitoring for Claude Activity via Claude’s Compliance API

CrowdStrike Delivers Visibility and Monitoring for Claude Activity via Claude’s Compliance API

Integration brings Claude activity into the Falcon platform, enhancing unified detection, response, and governance across enterprise AI usage
Riverbed Defines the Era of Zero Disruption for Digital Employee Experience 

Riverbed Defines the Era of Zero Disruption for Digital Employee Experience 

New AI-driven Aternity innovations help enterprises prevent disruption, protect employee productivity, and advance autonomous IT operations 
Saviynt Emerges as an Overall Leader Across Four KuppingerCole Reports

Saviynt Emerges as an Overall Leader Across Four KuppingerCole Reports

Recognised across Identity Governance, Privileged Access Management, SAP Access Control, and Business Application Risk Management, reinforcing Saviynt’s leadership as an AI-era identity security platform 
AI Adoption Outpaces Governance and ROI, ISACA Research Find

AI Adoption Outpaces Governance and ROI, ISACA Research Find

Global survey of 3,400+ digital trust professionals reveals gaps in policy, incident response and training
CrowdStrike 2026 Financial Services Threat Landscape Report: North Korean Adversaries Steal Billions in Digital Assets

CrowdStrike 2026 Financial Services Threat Landscape Report: North Korean Adversaries Steal Billions in Digital Assets

China-nexus espionage and ransomware pressure on the financial sector intensify as adversaries weaponise AI to compress the time from access to impact
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This