The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Trust, Power, People: Hybrid AI’s 2026 Imperative 

Trust, Power, People: Hybrid AI’s 2026 Imperative 

Over the past year across Asia Pacific, conversations with customers, from fast-growing digital natives to highly regulated banks and healthcare providers, all have shared a common thread: AI has moved from experimentation to execution. The question is no longer “if” but “how” to scale responsibly, efficiently, and with clear business outcomes. As we ...
97% of Australian Companies are Sitting Ducks for the Next Major Cybersecurity Attack

97% of Australian Companies are Sitting Ducks for the Next Major Cybersecurity Attack

Only 3% of Australian organisations claim to be ‘mature’ in their cybersecurity stance, according to Cisco’s 2025 Cybersecurity Readiness Index report. Seventy-five percent expect a major business disruption within two years due to a cyber incident.   From 8000 companies across 30 countries, only ~3% rate themselves as mature. CTO of ...
Why AWS Security is the Middleman, which is what Regulators Need

Why AWS Security is the Middleman, which is what Regulators Need

Regulators want certainty. Engineers want velocity. Cloud providers are expected to satisfy both simultaneously, globally, and at scale. Tough job, but not for Mark Ryland, Director of Security at AWS. Ryland's day to day to role is being the intermediate between all parties to ensure things get done and to make it happen. The function is underpinned ...
Can AI Ever Really Outpace AI-Powered Cyberattacks?

Can AI Ever Really Outpace AI-Powered Cyberattacks?

Introduction There's this question that keeps coming up in cybersecurity circles, and honestly, it feels a bit like asking whether we can outrun our own shadow. Can defensive AI actually stay ahead of AI-powered attacks? The short answer is probably not in any permanent way, but that doesn't mean we're doomed to lose this fight. The thing about AI ...
Putting Your Money Where Your Money Is

Putting Your Money Where Your Money Is

Introduction Fintech companies occupy a unique position at the intersection of finance and technology. They handle extremely sensitive customer information, personal identities, payment data, transaction histories, and therefore represent a high‑value target for cyber‑criminals. In the Asia‑Pacific region, nearly 80 percent of executives anticipate ...
ISACA Sydney Conference 2025 – Event Recap

ISACA Sydney Conference 2025 – Event Recap

Overview Walking into the ISACA Sydney Chapter Conference as “the student voice”, I knew I was surrounded by some of the heaviest hitters in cyber, audit and technology leadership. My job for the day was simple but huge: ask the questions students and early-career professionals are scared to ask and bring those answers back to our community. By the ...
Kaseya Connect APAC 2025 – Event Recap

Kaseya Connect APAC 2025 – Event Recap

Introduction Kaseya Connect APAC 2025 delivered a message that went beyond product releases: MSP cybersecurity is entering an era where resilience, automation and identity-level defences matter more than point solutions. While most coverage will focus on the Datto SIRIS 6 appliance and Kaseya’s acquisition of INKY, what stood out inside the rooms at ...
Disruption Demands Coordination: Why Secure Communications Solutions are Key to Disrupting the Illegal Fentanyl Trade

Disruption Demands Coordination: Why Secure Communications Solutions are Key to Disrupting the Illegal Fentanyl Trade

Introduction The Government of Canada is taking concrete and bold action to strengthen border security and disrupt the illegal fentanyl trade. It has announced an investment of $1.3 billion to enhance operations. The funding will support hiring additional personnel and purchasing advanced technology and equipment. This includes state-of-the-art ...
No results found.

In The News

Malicious IDE Extension Uses Solana Blockchain to Steal Developer Credentials

Malicious IDE Extension Uses Solana Blockchain to Steal Developer Credentials

Bitdefender researchers have uncovered a malicious extension targeting the Windsurf integrated development environment (IDE) that uses the Solana blockchain to deliver malware designed to steal sensitive data from developers. The campaign disguises the extension as a tool for R language development inside Visual Studio Code–compatible environments. ...
Exabeam Expands Award-Winning Exabeam APEX Partner Program with New MSSP Commercial Framework

Exabeam Expands Award-Winning Exabeam APEX Partner Program with New MSSP Commercial Framework

Flexible, pooled licensing model purpose-built to help managed security providers scale faster and grow predictably
Secure Code Warrior Launches Trust Agent: AI to Enable Safe, Scalable AI-Driven Development

Secure Code Warrior Launches Trust Agent: AI to Enable Safe, Scalable AI-Driven Development

New AI Software Governance solution makes AI-generated code visible at commit, enforces policy before production, and connects real development behaviour to measurable risk reduction
Synechron Unifies Australian Firms Chamonix IT, Exposé and iGreenData Under Company’s Brand

Synechron Unifies Australian Firms Chamonix IT, Exposé and iGreenData Under Company’s Brand

Leading global firm appoints Scott Grigg as country managing director to build Australian consulting business
$12.5M Investment: GitHub and other industry leaders join forces for open source security

$12.5M Investment: GitHub and other industry leaders join forces for open source security

Investing in the people shaping open source and securing the future together See how GitHub is investing in open source security funding maintainers, partnering with Alpha-Omega, and expanding access to help reduce burden and strengthen software supply chains. Open source has always been about community. It’s about maintainers who review pull ...
CrowdStrike and Nebius Partner to Unify Security Across the Next Generation of AI Cloud Infrastructure

CrowdStrike and Nebius Partner to Unify Security Across the Next Generation of AI Cloud Infrastructure

CrowdStrike’s Falcon platform extends enterprise-grade cybersecurity to Nebius’s AI cloud platform, supporting high-performance environments built for AI innovators  March 17, 2026 CrowdStrike (NASDAQ: CRWD) and Nebius (NASDAQ: NBIS) today announced a major global partnership to bring the CrowdStrike Falcon® platform to Nebius AI Cloud, extending ...
World Wide Technology and CrowdStrike Launch Securing AI Lab Within WWT’s AI Proving Ground

World Wide Technology and CrowdStrike Launch Securing AI Lab Within WWT’s AI Proving Ground

The Securing AI Lab, built on NVIDIA AI factories within WWT’s AI Proving Ground, provides enterprises a validated path to secure, production-ready AI March 17, 2026 World Wide Technology (WWT) and CrowdStrike (NASDAQ: CRWD) today announced the launch of the Securing AI with CrowdStrike Lab within WWT’s AI Proving Ground. Built on NVIDIA AI ...
HPE Threat Labs Report Reveals Cyber Adversaries Are Morphing Their Business Model To Scale And Accelerate Attacks

HPE Threat Labs Report Reveals Cyber Adversaries Are Morphing Their Business Model To Scale And Accelerate Attacks

Cyber adversaries adopt business-like models to target every major sector, HPE finds Generative AI used to produce synthetic voices, images and videos for targeted impersonation fraud campaigns World-class network threat research expertise and experience brought together in new HPE Threat Labs Sydney, AUSTRALIA – March 18, 2026 – HPE (NYSE: ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This