The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Australia’s Cyber Laws Just Changed on Who Takes the Hit

Australia’s Cyber Laws Just Changed on Who Takes the Hit

There’s a new kind of tension creeping into Australian boardrooms. For years, when cyber incidents hit, accountability had a familiar landing zone to fob off and ‘talk to security’. Well, those days are over. With new federal cyber legislation now placing personal liability on company directors, responsibility has shifted upstream and everyone feels ...
How to Build Secure Communications Beyond “End-to-End” Network Encryption

How to Build Secure Communications Beyond “End-to-End” Network Encryption

For governments and critical infrastructure operators, secure communications are essential to national governance, operational continuity, and crisis response. Secure communication is the process of safeguarding communication channels and taking full control over critical information. It involves methods and technologies to ensure that all data ...
NIAP-Certified Security – a Foundation for Trusted Communications

NIAP-Certified Security – a Foundation for Trusted Communications

In government and critical infrastructure, security is not an optional feature, it is the foundation of operational integrity. For organizations responsible for protecting sensitive data and ensuring mission continuity, trust in communication systems must be earned through independent, rigorous validation. Relying on unvetted software introduces ...
Streamlining Cyber Operations

Streamlining Cyber Operations

Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing pressure to protect, adapt, and enable innovation. For many organisations, cyber operations are buckling under the weight of manual tasks, legacy tools, and cross-functional bottlenecks. The result is a reactive security posture that ...
Australia’s AI Future Is Being Built in the Cloud

Australia’s AI Future Is Being Built in the Cloud

When Amazon Web Services, more commonly known as AWS, planted their flag on Australian soil 13 years ago, cloud computing was still emerging. Today, it powers almost everything we do day to day; consumer banking, enterprise platforms as well as systems tied to national security. AI adoption accelerates across Australia and New Zealand, the question is ...
Containing the Inevitable: What Cyber Leaders Must Prepare for in 2026

Containing the Inevitable: What Cyber Leaders Must Prepare for in 2026

As we head into 2026, I am thinking of a Japanese idiom, Koun Ryusui (行雲流水), to describe how enterprises should behave when facing a cyberattack. Koun Ryusui means “to drift like clouds and flow like water.” It reflects calm movement, adaptability, and resilience. For enterprises, this is an operating requirement. Cyber incidents are no longer isolated ...
Continuous Compliance Isn’t an Option

Continuous Compliance Isn’t an Option

Discover why CISOs must lead the shift to continuous compliance—boosting security, reducing risk, and aligning with evolving regulatory demands.
Trust, Power, People: Hybrid AI’s 2026 Imperative 

Trust, Power, People: Hybrid AI’s 2026 Imperative 

Over the past year across Asia Pacific, conversations with customers, from fast-growing digital natives to highly regulated banks and healthcare providers, all have shared a common thread: AI has moved from experimentation to execution. The question is no longer “if” but “how” to scale responsibly, efficiently, and with clear business outcomes. As we ...
No results found.

In the News

Ping Identity Defines the Runtime Identity Standard for Autonomous AI

Ping Identity Defines the Runtime Identity Standard for Autonomous AI

General Availability of Identity for AI establishes continuous, contextual enforcement and real-time control over AI agents 
Interactive Secures IT Managed Services Agreement With Major Superannuation Fund

Interactive Secures IT Managed Services Agreement With Major Superannuation Fund

The leading Australian IT service provider will support the delivery of Hostplus’ technology strategy to enhance service delivery and operational resilience.
15,500 Malicious Domains: How Threat Actors Abuse a Popular Ad Tracker for Cloaked AI Investment Scams

15,500 Malicious Domains: How Threat Actors Abuse a Popular Ad Tracker for Cloaked AI Investment Scams

New research from Infoblox Threat Intel and Confiant reveals that cybercriminals are abusing Keitaro, a widely used advertising performance tracker, to hide (“cloak”) scams and malware behind ordinary web traffic; with many posing specifically as AI investment opportunities. Cloaking has become a foundational block of modern cybercrime, allowing ...
Elastic Eliminates Per-Endpoint Pricing for XDR

Elastic Eliminates Per-Endpoint Pricing for XDR

The Australian cyber landscape has reached a critical tipping point. As the latest ASD Cyber Threat Report reveals, average crime costs for large Aussie firms have spiked 219% to over $200k per incident. While much of the industry is focused on the AI arms race, there is a deeper shift occurring: the move from reactive dashboards to the agentic SOC. To ...
Elastic Eliminates the SOAR Automation Tax With Native Workflows

Elastic Eliminates the SOAR Automation Tax With Native Workflows

The Australian cyber landscape has reached a critical tipping point. As the latest ASD Cyber Threat Report reveals, average crime costs for large Aussie firms have spiked 219% to over $200k per incident. While much of the industry is focused on the AI arms race, there is a deeper shift occurring: the move from reactive dashboards to the agentic SOC. To ...
Milestone Systems Introduces Trusted Generative AI Tools for Security Operations

Milestone Systems Introduces Trusted Generative AI Tools for Security Operations

Milestone Systems has unveiled a new suite of generative AI-powered solutions designed specifically for security operations, addressing long-standing challenges around manual workflows, regulatory compliance, and trust in automated systems. While generative AI adoption continues to accelerate across industries, many security teams still rely on manual ...
Commvault Expands Microsoft Security Integration to Accelerate Threat Detection and Recovery

Commvault Expands Microsoft Security Integration to Accelerate Threat Detection and Recovery

Commvault has announced an expanded integration with Microsoft Security, connecting threat detection, investigation, and trusted recovery to strengthen enterprise cyber resilience operations. The integration brings together Microsoft Sentinel, Microsoft Security Copilot, and the Commvault Cloud platform to streamline resilience operations (ResOps), ...
Dell Technologies Expands Cybersecurity and Resilience for the AI Era and Emerging Quantum Risks

Dell Technologies Expands Cybersecurity and Resilience for the AI Era and Emerging Quantum Risks

New enhancements help organisations strengthen device trust, improve cyber resilience and detect threats in AI data platforms Security by design approach hardens Dell commercial PCs[i] with quantum-ready protections AI-powered cyber resilience helps organisations spot ransomware signals earlier and simplify recovery at scale Managed ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This