The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

NIAP-Certified Security – A Foundation for Trusted Communications

NIAP-Certified Security – A Foundation for Trusted Communications

In government and critical infrastructure, security is not an optional feature, it is the foundation of operational integrity. For organizations responsible for protecting sensitive data and ensuring mission continuity, trust in communication systems must be earned through independent, rigorous validation. Relying on unvetted software introduces ...
Streamlining Cyber Operations

Streamlining Cyber Operations

Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing pressure to protect, adapt, and enable innovation. For many organisations, cyber operations are buckling under the weight of manual tasks, legacy tools, and cross-functional bottlenecks. The result is a reactive security posture that ...
Australia’s AI Future Is Being Built in the Cloud

Australia’s AI Future Is Being Built in the Cloud

When Amazon Web Services, more commonly known as AWS, planted their flag on Australian soil 13 years ago, cloud computing was still emerging. Today, it powers almost everything we do day to day; consumer banking, enterprise platforms as well as systems tied to national security. AI adoption accelerates across Australia and New Zealand, the question is ...
Containing the Inevitable: What Cyber Leaders Must Prepare for in 2026

Containing the Inevitable: What Cyber Leaders Must Prepare for in 2026

As we head into 2026, I am thinking of a Japanese idiom, Koun Ryusui (行雲流水), to describe how enterprises should behave when facing a cyberattack. Koun Ryusui means “to drift like clouds and flow like water.” It reflects calm movement, adaptability, and resilience. For enterprises, this is an operating requirement. Cyber incidents are no longer isolated ...
Continuous Compliance Isn’t An Option

Continuous Compliance Isn’t An Option

Discover why CISOs must lead the shift to continuous compliance—boosting security, reducing risk, and aligning with evolving regulatory demands.
Trust, Power, People: Hybrid AI’s 2026 Imperative 

Trust, Power, People: Hybrid AI’s 2026 Imperative 

Over the past year across Asia Pacific, conversations with customers, from fast-growing digital natives to highly regulated banks and healthcare providers, all have shared a common thread: AI has moved from experimentation to execution. The question is no longer “if” but “how” to scale responsibly, efficiently, and with clear business outcomes. As we ...
97% of Australian Companies are Sitting Ducks for the Next Major Cybersecurity Attack

97% of Australian Companies are Sitting Ducks for the Next Major Cybersecurity Attack

Only 3% of Australian organisations claim to be ‘mature’ in their cybersecurity stance, according to Cisco’s 2025 Cybersecurity Readiness Index report. Seventy-five percent expect a major business disruption within two years due to a cyber incident.   From 8000 companies across 30 countries, only ~3% rate themselves as mature. CTO of ...
Why AWS Security is the Middleman, which is what Regulators Need

Why AWS Security is the Middleman, which is what Regulators Need

Regulators want certainty. Engineers want velocity. Cloud providers are expected to satisfy both simultaneously, globally, and at scale. Tough job, but not for Mark Ryland, Director of Security at AWS. Ryland's day to day to role is being the intermediate between all parties to ensure things get done and to make it happen. The function is underpinned ...
No results found.

In The News

Claroty Announces Cybercriminals Are Increasingly Targeting Global Critical Infrastructure Via CPS

Claroty Announces Cybercriminals Are Increasingly Targeting Global Critical Infrastructure Via CPS

New research finds cybercriminals are increasingly targeting global critical infrastructure via direct access to cyber-physical systems | Claroty’s Team82 Investigated Hundreds of Politically, Socially Motivated Attacks on Exposed Internet-Facing Devices Including HMI and SCADA Assets
JFrog Unveils Universal MCP Registry, Delivering a Secure System of Record for the AI-Driven Software Supply Chain

JFrog Unveils Universal MCP Registry, Delivering a Secure System of Record for the AI-Driven Software Supply Chain

SYDNEY, Australia. – March 19, 2026 –  JFrog Ltd (Nasdaq: FROG), the Liquid Software company and creators of the JFrog Software Supply Chain Platform, the system of record for software artifacts, binaries, and AI assets, today introduced its JFrog MCP Registry. Expanding on current capabilities in JFrog AI Catalog, the new registry acts as a single ...
UiPath Collaborates with Microsoft to Accelerate Security and Confidence for Automated Workflows

UiPath Collaborates with Microsoft to Accelerate Security and Confidence for Automated Workflows

Integration demonstrates the power of agentic automation and security platforms working together to protect modern enterprises
Malicious IDE Extension Uses Solana Blockchain to Steal Developer Credentials

Malicious IDE Extension Uses Solana Blockchain to Steal Developer Credentials

Bitdefender researchers have uncovered a malicious extension targeting the Windsurf integrated development environment (IDE) that uses the Solana blockchain to deliver malware designed to steal sensitive data from developers. The campaign disguises the extension as a tool for R language development inside Visual Studio Code–compatible environments. ...
Exabeam Expands Award-Winning Exabeam APEX Partner Program with New MSSP Commercial Framework

Exabeam Expands Award-Winning Exabeam APEX Partner Program with New MSSP Commercial Framework

Flexible, pooled licensing model purpose-built to help managed security providers scale faster and grow predictably
Secure Code Warrior Launches Trust Agent: AI to Enable Safe, Scalable AI-Driven Development

Secure Code Warrior Launches Trust Agent: AI to Enable Safe, Scalable AI-Driven Development

New AI Software Governance solution makes AI-generated code visible at commit, enforces policy before production, and connects real development behaviour to measurable risk reduction
Synechron Unifies Australian Firms Chamonix IT, Exposé and iGreenData Under Company’s Brand

Synechron Unifies Australian Firms Chamonix IT, Exposé and iGreenData Under Company’s Brand

Leading global firm appoints Scott Grigg as country managing director to build Australian consulting business
$12.5M Investment: GitHub and other industry leaders join forces for open source security

$12.5M Investment: GitHub and other industry leaders join forces for open source security

Investing in the people shaping open source and securing the future together See how GitHub is investing in open source security funding maintainers, partnering with Alpha-Omega, and expanding access to help reduce burden and strengthen software supply chains. Open source has always been about community. It’s about maintainers who review pull ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This