The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Your AI is Only as Good as your Data, According to NetApp’s President

Your AI is Only as Good as your Data, According to NetApp’s President

Forget dashboards and customer insights, the game has changed. The royal flush is in the data and lots of it.​ Countries and corporations that can prove the integrity of their data will dominate the next stage of global trade and innovation.Recently, NetApp’s President César Cernuda walked through the AI gold rush. It’s meaningless if companies can’t ...
North Korean ‘Laptop Farm’ Scheme Nets Prison Time for US Operatives

North Korean ‘Laptop Farm’ Scheme Nets Prison Time for US Operatives

​Two US nationals have been sentenced years behind bars after federal prosecutors say they helped fuel a sophisticated North Korean scheme that infiltrated American companies, stole identitie,s and funnelled millions to a hostile regime.The United States Department of Justice announced that Kejia Wang, 42, and Zhenxing Wang, 39, were sentenced for ...
The Mission-Critical Standard: Why Mission-Certified Communications are the Future of High-Stakes Operations

The Mission-Critical Standard: Why Mission-Certified Communications are the Future of High-Stakes Operations

Mission-certified communications deliver secure, unified support in high-stakes operations.
Break Glass Accounts: Essential Security or a Cyber Risk?

Break Glass Accounts: Essential Security or a Cyber Risk?

Enterprises need a zero trust mindset to emergency access: least privilege, continuous monitoring and no implicit trust, even in a crisis. Break glass accounts should be treated as exceptions, not shortcuts, and governed accordingly.
The Latest Security Vulnerability Exploit Doesn’t Break Your Encryption. It Bypasses It.

The Latest Security Vulnerability Exploit Doesn’t Break Your Encryption. It Bypasses It.

A zero-day vulnerability exploit shows device compromises can bypass encryption entirely.
Building Secure Automation: Three Core Pillars That Make An iPaaS Enterprise-ready

Building Secure Automation: Three Core Pillars That Make An iPaaS Enterprise-ready

Introduction Security and governance are no longer back-office concerns, and in Australia, the stakes have never been higher. After a record 1,113 notifiable data breaches in 2024, the OAIC logged more than 530 additional breaches in the first half of 2025, with malicious attacks continuing to dominate. At the same time, major privacy reforms (e.g. ...
Identity Management Day

Identity Management Day

The sixth Identity Management Day highlights the evolving nature of identity. The meteoric rise of AI in general and its impact on nonhuman identities (NHIs) has focused attention on identity security as never before. But in the long view, it simply highlights the same issues we have seen in identity management since it was called “identity ...
Encryption Alone Is Not a Security Strategy

Encryption Alone Is Not a Security Strategy

Consumer apps lack identity and device controls, risking sensitive data.
No results found.

In the News

Entrust Expands Identity Verification to Support Australia’s AML/CTF Reforms

Entrust Expands Identity Verification to Support Australia’s AML/CTF Reforms

Australia’s evolving Anti-Money Laundering and Counter-Terrorism Financing (AML/CTF) framework is reshaping how organisations approach identity verification. With Tranche 2 reforms set to extend compliance obligations across new industries, businesses are under increasing pressure to strengthen customer due diligence processes while maintaining ...
CrowdStrike Accelerates SMB Cybersecurity Transformation Across JAPAC with Expanded Distributor-Led Services

CrowdStrike Accelerates SMB Cybersecurity Transformation Across JAPAC with Expanded Distributor-Led Services

Expanded go-to-market empowers distributors to recruit and onboard MSSPs, increasing SMBs access and adoption of the Falcon platform
Research Reveals “Trust Gap” Threatening Agentic AI Adoption: 66% of Organisations Say Real-Time Data is Non-Negotiable

Research Reveals “Trust Gap” Threatening Agentic AI Adoption: 66% of Organisations Say Real-Time Data is Non-Negotiable

New Global Study of 850 Executives Also Finds That Fragmented Data Sources and Lack of Governance Are Stalling the Shift from AI Insights to AI Action
Kinetic IT Appoints Chief Transformation Officer to Accelerate Growth and Sovereign Technology Innovation

Kinetic IT Appoints Chief Transformation Officer to Accelerate Growth and Sovereign Technology Innovation

April 20, 2026 - Kinetic IT, a leading Australian-owned technology services partner, today announced the appointment of Kishore Jayaram as Chief Transformation Officer. This newly created executive role reflects Kinetic IT's next phase of evolution - building on its strong trusted managed services foundation to become a more diversified, ...
As Agentic AI Adoption Accelerates, Rubrik Warns of Growing Security Gaps

As Agentic AI Adoption Accelerates, Rubrik Warns of Growing Security Gaps

New research from Rubrik Zero Labs highlights a critical lack of identity governance as organisations race to adopt autonomous systems they cannot fully observe or restore.
TrendAI™ Partners With Anthropic to Extend Leadership in AI Security

TrendAI™ Partners With Anthropic to Extend Leadership in AI Security

Trend Micro’s enterprise business accelerates its transformation as AI security category leader
Bitdefender Launches Powerful Email Security Solution for Businesses and MSPs

Bitdefender Launches Powerful Email Security Solution for Businesses and MSPs

Unified Email and Endpoint Security Detects and Stops Phishing, BEC, Ransomware, and Other Evolving Threats Across the Full Email Attack Chain
ESET Launches eCrime Reports to Give Security Teams a Strategic Edge Against Modern Cybercriminal Groups

ESET Launches eCrime Reports to Give Security Teams a Strategic Edge Against Modern Cybercriminal Groups

ESET’s standalone eCrime reports provide security teams with curated, high‑quality insights into incidents, including key lessons, IoCs, hunting rules, and guidance to strengthen resilience | ESET Threat Intelligence eCrime Reports deliver a clear, operational view into real-world intrusions and uncover hidden clusters of activity, including TTPs and ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This