The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Australia’s Next Insider Threat Might Be an Algorithm

Australia’s Next Insider Threat Might Be an Algorithm

As Australian organisations race to embed AI tools across human resources, finance and operations, they may be missing a critical security fault line. While disgruntled employees or contractors gone rogue remain a concern, the next major data breach is increasingly likely to come from an algorithm that never intended malice.
Safeguarding Australia’s Most Critical Systems: Why Cybersecurity Is a Sovereignty Issue

Safeguarding Australia’s Most Critical Systems: Why Cybersecurity Is a Sovereignty Issue

Byline from Christopher Rule, General Manager of Defence, Security, and Resilence at GME about why cybersecurity is a sovereignty issue, on the back off ASD's recent Cyber Threat Report and ASIO Director-General Mike Burgess's speech on cyber espionage against critical infrastructure no longer being a hypothetical wartime scenario.
Exploring Security In the Context of AI

Exploring Security In the Context of AI

Insights from the Cisco Live! "Redefining Security in the AI Era" Panel The rapid proliferation of Artificial Intelligence (AI) across industries has adroitly shifted the paradigm of cybersecurity. At the recent “Redefining Security in the AI Era” panel held at Cisco Live! 2025, senior leaders from Cisco, and partner organisation Logicalis, met to ...
Cybercrime to Hit $10.5 Trillion by 2025, According to Cybersecurity Ventures

Cybercrime to Hit $10.5 Trillion by 2025, According to Cybersecurity Ventures

According to research from Cybersecurity Ventures, cybercrime is projected to cost the world $10.5 trillion annually by 2025 ¹ and attacks, especially ransomware, are now an everyday fact of life. Last week in New York, at a recent press briefing before the official commencement of Commvault Shift, Commvault disclosed that 78% of respondents in the ...
‘We Let the Internet Down Today’ says Co-Founder at Cloudflare

‘We Let the Internet Down Today’ says Co-Founder at Cloudflare

​When Cloudflare goes down, the internet feels it. The recent Cloudflare outage wasn’t just ‘a blip’ - it was an unfortunate failure that took some of the world’s most heavily trafficked services offline. Cloudflare confirmed that a configuration update triggered a failure inside its control plane, specifically within systems responsible for managing ...
Like It or Not, PQC Is the Key (For Now)

Like It or Not, PQC Is the Key (For Now)

Every few months, another “quantum-safe” technology is marketed as the real answer, usually with the claim that post-quantum cryptography isn’t enough. PQC is too new, too slow, too fragile, too unproven. One person I spoke to even described adopting PQC as “shuffling the furniture on a sinking ship,” as if the standards effort itself is the ...
The ABCs of GRC

The ABCs of GRC

Introduction In the face of increasing regulatory pressure, rising cyber threats, and growing business complexity, organisations need a structured, scalable approach to managing risk. Governance, Risk, and Compliance (GRC) frameworks have become vital for aligning information security with corporate objectives, ensuring operational resilience, and ...
The Korean Leaks – Analysing the Hybrid Geopolitical Campaign Targeting South Korean Financial Services with Qilin RaaS

The Korean Leaks – Analysing the Hybrid Geopolitical Campaign Targeting South Korean Financial Services with Qilin RaaS

When preparing data for the Bitdefender Threat Debrief | October 2025, Bitdefender noticed a significant departure from established ransomware trends. Typically, the top five most impacted countries are consistently the US, Canada, and major Western European nations. However, for this period, South Korea (KR) suddenly became the second most-targeted ...
No results found.

In The News

Black Kite’s 2026 Wholesale & Retail Report Reveals Over 70% of Major Retailers, Nearly 60% of Wholesalers, and 52% of the Supply Chain Have Exposed Credentials

Black Kite’s 2026 Wholesale & Retail Report Reveals Over 70% of Major Retailers, Nearly 60% of Wholesalers, and 52% of the Supply Chain Have Exposed Credentials

Report finds the sectors’ shared supply chain is the greatest risk, as attackers view wholesale and retail as an interconnected target landscape
Hiring Season Is Scam Season: How Fake Recruiters Exploit Job Seekers with Trusted Brand Names

Hiring Season Is Scam Season: How Fake Recruiters Exploit Job Seekers with Trusted Brand Names

According to Bitdefender’s Antispam Lab latest data, a wave of fake recruitment emails is actively circulating, timed to coincide with the early-year hiring surge. These scams impersonate well-known employers and staffing companies, promising easy jobs, fast interviews, and flexible work. ‘Your interview is confirmed’ These scams open with good ...
Total Economic Impact Study: JFrog Unifies and Accelerates the Secure Software Supply Chain from Code to AI

Total Economic Impact Study: JFrog Unifies and Accelerates the Secure Software Supply Chain from Code to AI

New Industry Analyst Study Shows that JFrog Delivered 282% ROI in Three Years, Reducing Risk While Accelerating Safer Software Releases for Enterprises
Check Point Software Technologies Reinforces New Zealand Presence with Local Check Point Harmony SASE Data Residency Instance

Check Point Software Technologies Reinforces New Zealand Presence with Local Check Point Harmony SASE Data Residency Instance

New Point of Presence Enhances Web application and API protection with low latency and delivers Industry-Leading Threat Prevention and Cloud-Ready Security Architecture
Sophos Expands Portfolio with Workspace Protection to Secure Hybrid Work and Govern Employee AI Use

Sophos Expands Portfolio with Workspace Protection to Secure Hybrid Work and Govern Employee AI Use

Sophos today announced Sophos Workspace Protection, expanding its portfolio to help organisations secure hybrid work and govern the use of emerging technologies, including AI. Built around the Sophos Protected Browser, powered by Island, the solution enables organisations to protect applications, data, users, and guests wherever work takes place, while ...
Five Enterprise Security Predictions for 2026 for Australia’s Most Critical Services

Five Enterprise Security Predictions for 2026 for Australia’s Most Critical Services

Weaponised AI and the cyber arms race
Ping Identity Advances Universal Services to Redefine Trust in the Age of AI-Driven Fraud

Ping Identity Advances Universal Services to Redefine Trust in the Age of AI-Driven Fraud

A new model for continuous, verified trust across every identity, every interaction, and every environment
Lenovo Releases New AI Inferencing Servers

Lenovo Releases New AI Inferencing Servers

Lenovo announced a suite of purpose-built enterprise servers, solutions and services for AI inferencing workloads expanding the Lenovo Hybrid AI Advantage portfolio. Setting the stage for the next era of AI, Lenovo is advancing the field of inferencing and eliminating hurdles to power real-world AI use cases ranging from storefront customer ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This