The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Do You Use Free Wi-Fi in Public Places?

Do You Use Free Wi-Fi in Public Places?

In today's modern life, we find ourselves highly dependent on the connected world. Think about it, almost everything we do or need in some form requires being connected via a website, app or computer platform. We carry most of us smartphones which are smarter than the computer systems that enabled man to land on the moon.  Seriously, just think ...
AI Broke Cybersecurity and Corporate Leadership Still Hasn’t Noticed

AI Broke Cybersecurity and Corporate Leadership Still Hasn’t Noticed

​Code is now being written and shipped faster than most security programs were ever built to withstand. Developers are moving at speed. Product teams are pushing releases earlier. And companies are racing to stay competitive often without fully grasping the risks they’ve just signed up for.Sonali Chaudhuri, Founder of MySmartOps commented,“...Exposing ...
blockchain Auditing in Practice: What Executives Need to Understand Now

blockchain Auditing in Practice: What Executives Need to Understand Now

Blockchain doesn’t remove trust, it relocates it into code, consensus, and governance. Learn how to audit blockchain systems using ISO 27001, COBIT, and NIST without starting over, and where risk truly lives.
Cyber Powerhouse Ben Doyle Walks Away From Thales

Cyber Powerhouse Ben Doyle Walks Away From Thales

After 22 years as the longest tenured CISO in Australia at the same organisation, beloved Ben Doyle is officially stepping away from his role at Thales... and yep, the cyber industry is feeling it. “I have been extremely lucky having the tenure, support, and career opportunity at an organisation like Thales that allowed me to grow as the cyber ...
In the Age of Microsegmentation Enforcement in Hours, Are You Still Shutting Down Operations?

In the Age of Microsegmentation Enforcement in Hours, Are You Still Shutting Down Operations?

I was researching cyberattacks, and a common theme popped out. “We had an unprecedented cyberattack… and we shut down our operations to protect stakeholder interests.” I know, breaches can be strenuous. The initial hours following a breach are often marked by chaos and urgency as crisis leaders call vendors, disconnect systems, analyze logs, and ...
Economic Statecraft Is the New Force Multiplier

Economic Statecraft Is the New Force Multiplier

​Defence power is no longer defined by platforms alone. It’s shaped upstream, by capital allocation, ownership rules and the speed at which states can convert technology into deployable capability. That shift is already underway. Many governments recognise it. Some have redesigned their systems around it. Australia is still adapting, albeit slowly, to ...
How Strider Technologies Is Mapping Foreign Interference Across Western Innovation

How Strider Technologies Is Mapping Foreign Interference Across Western Innovation

Foreign states are extracting openly, legally and at scale from Western systems that were built on trust, transparency, and collaboration. Paul Maddison, Australia, and New Zealand Country Manager at Strider Technologies, talks about a threat that rarely announces itself. “Strider is a company that was founded six years ago in response to this sort ...
Encryption Isn’t Enough: The Hidden Threat of Messaging Metadata

Encryption Isn’t Enough: The Hidden Threat of Messaging Metadata

Today’s Digital Landscape Metadata is one of the most overlooked security risks in modern digital communications. Adversaries no longer need to break into encrypted chats to understand your intent; all they need is your metadata. For government officials who deal with national security, foreign relations, or coordination of high-stakes operations ...
No results found.

In the News

VAST Data Hits $30 Billion Valuation as AI Drives a New Infrastructure Stack

VAST Data Hits $30 Billion Valuation as AI Drives a New Infrastructure Stack

AI operating system company VAST Data today announced the closing of its Series F financing at a US$30 billion valuation, representing more than a threefold increase from its US$9.1 billion Series E valuation in late 2023. The latest round was led by Drive Capital, with Access Industries acting as co-lead, and included participation from existing ...
Check Point to Integrate AI Defense Plane With Google Cloud to Help Secure AI Agents With Integrated Discovery, Governance, and Runtime Protection

Check Point to Integrate AI Defense Plane With Google Cloud to Help Secure AI Agents With Integrated Discovery, Governance, and Runtime Protection

REDWOOD CITY, CA. – April 22, 2026 -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced that it will serve as a launch partner with Google Cloud to integrate Check Point's AI Defense Plane with Google Cloud's Gemini Enterprise Agent Platform. The integration will combine ...
Exabeam Extends Agent Behaviour Analytics to the Google Cloud Agent Ecosystem

Exabeam Extends Agent Behaviour Analytics to the Google Cloud Agent Ecosystem

Comprehensive visibility and anomaly detection now available for agents built with Google Cloud’s Agent Development Kit and multi-agent workflows via the upcoming Google Agent Gateway
DataDog Announces GPU Monitoring to Help Businesses Optimise Spend and Performance as They Aim to Scale AI Projects

DataDog Announces GPU Monitoring to Help Businesses Optimise Spend and Performance as They Aim to Scale AI Projects

The launch of Datadog’s GPU Monitoring helps teams plan capacity, troubleshoot issues quickly, prevent costly failures and avoid wasted spend
NinjaOne Unified Backup Surpasses Fifteen Thousand Customers

NinjaOne Unified Backup Surpasses Fifteen Thousand Customers

Today, NinjaOne announced strong momentum for its NinjaOne Backup product, with more than 15,000 customers now relying on the solution to protect their endpoints, servers, and SaaS applications. The growth reflects increasing demand from IT teams and managed service providers (MSPs) for backup and recovery to be embedded within a unified IT operations ...
Defender’s Guide to the Frontier AI Impact on Cybersecurity

Defender’s Guide to the Frontier AI Impact on Cybersecurity

The release of the newest frontier AI models marks a turning point for cybersecurity. Palo Alto Networks has conducted early testing of the latest frontier AI models, including Anthropic’s Mythos model as part of Project Glasswing and OpenAI’s latest models as part of Trusted Access for Cyber program. The conclusion is clear: They are extraordinarily ...
Arctic Wolf Introduces Decipio, a Community Tool to Catch Credential Theft With Defense‑First AI

Arctic Wolf Introduces Decipio, a Community Tool to Catch Credential Theft With Defense‑First AI

Community beta tool invites defenders to collaborate and help shape a new approach to exposing credential‑stealing attacks
Check Point Software Ranks #1 in Miercom’s 2026 Hybrid Mesh Network Security

Check Point Software Ranks #1 in Miercom’s 2026 Hybrid Mesh Network Security

Miercom’s 2026 Hybrid Mesh Network Security Assessment Shows Check Point achieving the highest overall security effectiveness score of 99.8%, highlighting its industry-leading threat prevention   
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This