The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

‘Platformisation is a myth.’ According to Long Standing Cyber Analyst
Cybersecurity industry analyst Richard Stiennon at IT-Harvest says artificial intelligence is reshaping the future of digital defence at a pace most organisations still don’t fully understand and legacy security vendors could be in serious hot water if they fail to adapt.
The longtime Analyst and Founder at IT-Harvest argued that AI is no longer ...

How Mythos Reshapes the Cyber Threat Landscape
Many organisations still prioritise operational speed over security hardening, particularly when systems are ‘good enough’ to meet business needs. Mythos challenges this balance by increasing the cost of complacency.

Cybersecurity Leaders Struggle to Turn Data Into Boardroom Decisions
Cybersecurity leaders are sitting on more data than ever, yet many organisations remain unable to translate it into decisions that resonate at board level. The core issue is not data scarcity, but the difficulty of converting technical signals into meaningful assessments of business risk. Security teams can track alerts, incidents, throughput, and ...

Defend the Next Cyberattack at Unprecedented Speed. Be IT a Human or an AI
The next cyberattack could be human, or a human engineering an AI from the outside, or an AI engineered from the inside. It could be a zero-day attack or a known weakness that was never mitigated. It could be a cyberattack, a collective, a lone warrior, or a disgruntled employee. It does not matter.
What really matters is whether you were ready to ...

Oracle Admits Customers No Longer Tolerate Vendor Lock in
Customers no longer want to live inside a walled garden. Requirements and workloads change, more frequently now with AI powering those decisions.
Oracle Cloud Infrastructure's Senior Vice President of Product Management Nathan Thomas laid out how AI, sovereignty demands, and rising customer expectations are forcing hyperscalers into a new paradigm, ...

Monday Morning Quarterbacking. Why Everyone Thinks they can Run a Cyber Crisis
When a cyberattack hits, most organisations think the real battle is all technical. They’re wrong.
According to Lisa Black, Director of Public Sector at Aeon Nexus, the real collapse often starts long before systems are restored and it has nothing to do with code.
“Threat actors exploit confusion more than code,” Black said. “The loss of confidence ...

If AI Talent Needs Permission, Your Competitor is Already Ahead
Introduction
Most organisations still treat AI as a program to control, a platform to roll out, or a governance issue to contain. That is understandable, but it is no longer enough. The real question is much sharper: can your best people build with freedom, speed, and confidence inside your organisation? Because if they cannot, someone else will. ...

Fragile or Future-ready? The Decisions Shaping Australia’s AI Ambitions
Introduction
Senior data leaders are being asked to navigate a level of complexity that feels new, even by recent standards. Across Australia, organisations are under pressure to turn AI ambition into real outcomes, often while working with fragile data foundations that were never designed for this level of demand.
Other factors compound that ...
No results found.
In the News
Saviynt Emerges as an Overall Leader Across Four KuppingerCole Reports
Recognised across Identity Governance, Privileged Access Management, SAP Access Control, and Business Application Risk Management, reinforcing Saviynt’s leadership as an AI-era identity security platform
AI Adoption Outpaces Governance and ROI, ISACA Research Find
Global survey of 3,400+ digital trust professionals reveals gaps in policy, incident response and training
CrowdStrike 2026 Financial Services Threat Landscape Report: North Korean Adversaries Steal Billions in Digital Assets
China-nexus espionage and ransomware pressure on the financial sector intensify as adversaries weaponise AI to compress the time from access to impact
Check Point Embarks on a Mission to Transform Network Security Management with its Agentic Network Security Orchestration Platform, to Replace Decades of Rule-Based Complexity
As enterprise networks approach the limits of human-driven management, Check Point moves the industry from rules to intent, from fixed controls to dynamic prevention, and from fragmented consoles to unified orchestration
SMBs Hit a Cybersecurity Breaking Point as 91% Fear AI-Driven Attacks, Driving Shift to MSP-Led Security Models, WatchGuard Finds
New global research shows internal teams can’t keep pace, fuelling demand for always-on, outcome-driven security services
TrendAI™ Scales Threat Research to Address Vulnerabilities in AI Systems with Industry-leading Zero Day Initiative
Sydney, Australia - 20 May 2026 – TrendAI™, the enterprise cybersecurity business from Trend Micro Incorporated (TYO: 4704; TSE: 4704), has highlighted the growing importance of AI security for organisations around the world including Australia following the latest Pwn2Own competition in Berlin.
At the globally recognised hacking event, security ...
Operator XR Secures First European Contract with Swedish Military
ASX-listed xReality Group Limited has announced that its wholly owned subsidiary, Operator XR Pty Ltd (“Operator XR”), has secured its first European contract, supplying an OP-2 Virtual Reality (VR) tactical training system to a Swedish military end-user. The contract has been executed via Operator XR’s Swedish distribution partner, PROMOTEQ i ...
The $600 Billion Wake-up Call: New Splunk Research Reveals Downtime is a Systemic Business Crisis
The $600 Billion Wake-up Call: New Splunk Research Reveals Downtime is a Systemic Business Crisis
$600 Billion Annual Impact: Aggregate downtime costs for the Global 2000 have soared 50% in two years.
$15,000 Per Minute: The average cost of downtime for organisations, highlighting the immediate financial impact of service disruptions.
...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
- 353
- 354
- 355
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
