The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

AI in Defence – A Partner, Not a Quick Fix
AI has been making waves for years now. It has moved from the pages of science fiction into the control rooms of our defence and security agencies and critical infrastructures, watching over networks and inspecting traffic.
Why wouldn’t it be when it promises to work faster than humans and spot the tiniest anomaly possible? For defence and ...

Why You Need Speed and Trust for Modern Software Delivery
Introduction
Businesses are creating and launching software faster than ever to keep pace with competitors and drive innovation. The focus on increased speed has created a few trends:
Developer productivity is no longer only measured by speed, but quality and security as well
Many development teams rely on platform engineering to build tools ...

Is GenAI Outsmarting Us or Just Making Us Lazy?
Is AI turning our brains to mush? Hosts Phoebe Goh and Mekka Williams are joined by Karissa “KB” Breen, the sharp-tongued cybersecurity journalist behind the popular podcast, KBKast, for a no-holds-barred look at how AI is rewriting the rules of the game.
From the sneaky rise of unsanctioned “shadow AI” tools to the unnervingly convincing ...

The Growing Tug-of-War Between Scammers and Defenders: What Australian Businesses Need to Do to Stay Safe
Scams are no longer on the fringes of criminal activity. They have become a mainstream threat for Australians, targeting both consumers and businesses with increasing sophistication. According to Scamwatch, Australians lost $2.03 billion to scams in 2024.
This year’s Scams Awareness Week (25-29 August 2025) highlights this escalating issue and shows ...
Claroty Team82 Uncovers Critical Vulnerabilities in Axis Video Surveillance Products
Turning Camera Surveillance on its Axis

Why Asia Pacific Organisations Must Rethink Inline Security After a Wave of Data Breaches
Asia Pacific is in the midst of a cybersecurity reckoning following a spate of major data breaches including Qantas and Louis Vuitton in Australia, attacks on Singapore’s critical infrastructure, a surge of ransomware threats in India, and most recently a successful attack on Google. While most organisations are focused on enhancing cybersecurity, one ...

Unmasking Identity Risks Before They Become Breaches
An effective identity security strategy must move beyond siloed tools and reactive policies. It requires unified visibility across all users and assets, contextual understanding of privilege, and automated enforcement of least-privilege principles.

Cyber-securing Enterprises, the AI Way
“...Therefore, send not to know
For whom the bell tolls,
It tolls for thee.”
John Donne, “No man is an island”
Introduction
No enterprise is an island of security when it comes to cyber-attacks. Australia suffered a staggering 47 million data breaches in 2024 — equivalent to one attack every second — representing a twelvefold increase ...
No results found.
In The News
Modern 42 Appointed BeyondTrust’s First Advanced Implementation Partner in Australia
Canberra, 17 November 2025 – Modern 42, a specialist provider of Identity and Access Management, Privileged Access Management, CIAM and Securing Entra ID, today announced that it has been appointed the first BeyondTrust Advanced Implementation Partner in Australia.
Appointed initially as a BeyondTrust partner in 2023, the new advanced implementation ...
Dynatrace Announces New Cloud Operations Solution for Microsoft Azure
Provides customers with comprehensive visibility into their Azure environments, enabling automatic remediation, prevention, and optimisation
Barracuda Identifies Three Concerning Trends in Email-Based Cyber Attacks
Over the last month, Barracuda threat analysts have seen the following notable developments in email-based threats targeting organisations:
New tools and tactics for the Tycoon 2FA phishing kit
Invisible characters that help Cephas kit evade scanners and rules
A sophisticated attack involving steganography (image-concealed ...
Kyndryl Launches New Agentic AI Services to Support Agentic-driven Workforce Strategy Development and Customer Experience
New Kyndryl Consult organisational change management services harness Kyndryl Agentic AI Framework to help enterprises ready their workforces and redefine how work is done
NetApp Fortifies Channel Leadership in APAC, Driven By Robust Partner Program
NetApp® (NASDAQ: NTAP), the Intelligent Data Infrastructure company, today announced the impact of Partner Sphere, its hallmark partner program that is designed to accelerate partners’ strategic growth and hone their competitive edge and differentiating factor. To ramp up partners’ proficiencies in addressing enterprises’ complex digital transformation ...
Armis Expands Technology Partner Ecosystem to Help Global Organisations Fortify Cyber Defences
Strategic integrations unify cyber capabilities, enhancing joint customers’ existing technology stacks
Rapid7 Q3 Threat Report Reveals Ransomware Alliances, AI Weaponisation, and the Obsolescence of “Time to Patch”
Rapid7’s latest Q3 2025 Threat Landscape Report reveals how cybercriminals are accelerating exploitation timelines, consolidating ransomware alliances, and weaponising AI to outpace defenders.
42% Of Australians Targeted by Job Scams and Nearly One In Three Hit by Financial Fraud Amid Cost-Of-Living Crunch
New Trend Micro research finds half of Australians are under financial strain, with economic stress driving riskier behaviour online
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
