The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Breaking the Mold: How the CISO Role Has Outgrown Its Technical Roots

Breaking the Mold: How the CISO Role Has Outgrown Its Technical Roots

​Recently on the DevSecOops podcast, hosts Tom Walker and Scott Fletcher sat down with George Abraham, CISO at Influx, to discuss the changing nature of cybersecurity leadership, the human challenges of leading teams, and the complex security risks emerging from new technologies. George began with a note that cybersecurity careers rarely follow a ...
GenAI for Cybersecurity – Embrace the Power, Own the Risk

GenAI for Cybersecurity – Embrace the Power, Own the Risk

Introduction Generative AI (GenAI) is actively reshaping the way attackers and defenders operate in Australia. Threat actors have weaponised GenAI to synthesise text, code, voice, and video at scale, increasing impersonation scams and malware campaigns.  In response to these evolving threats, security teams have also adopted GenAI tools to automate ...
Improving Australia’s Resilience Against Growing Cyber Threats

Improving Australia’s Resilience Against Growing Cyber Threats

By focusing on measurable outcomes, such as speed of detection and response, rather than compliance checklists, Australia can build a digital economy that is not only innovative and productive, but also secure against the rising tide of cyber threats.
Navigating Hybrid Cloud Security In the AI Era As Regulations Tighten

Navigating Hybrid Cloud Security In the AI Era As Regulations Tighten

Introduction As hybrid cloud infrastructures continue to evolve, they are increasingly subject to AI-driven risks, complex data environments, and growing cyberthreats. Our recent 2025 Hybrid Cloud Security Survey underscores the rising pressure faced by organisations worldwide as AI technologies disrupt traditional security frameworks. With a 17 ...
From Chaos to Command: Secure Communications at Scale for Public Safety

From Chaos to Command: Secure Communications at Scale for Public Safety

Introduction When it comes to public safety, every second counts. If communication breaks down, so does the response - leading to losses in time, coordination, effectiveness, and public trust. During large-scale incidents, a persistent “communications gap” emerges: the critical distance between information being available and that same information ...
Securing Australian Organisations in the Quantum Era

Securing Australian Organisations in the Quantum Era

Australian organisations are under-prepared for the cybersecurity threat of quantum and should take these steps to minimise disruption as the technology takes hold.
Deepfakes are Spiralling Out of Control, But How Far Will It Go?

Deepfakes are Spiralling Out of Control, But How Far Will It Go?

David Wiseman, Vice President of Secure Communications at BlackBerry spoke with me about the increase of deepfakes which are our own voices and countenance that can be fabricated to present like it's us. But its not us. “Anyone’s voice can be deep faked at this point,” warned Wiseman. “Anyone with some basic set of tooling can generate that deep ...
The Hidden Costs To Consider When Selecting A Cyber Security Vendor

The Hidden Costs To Consider When Selecting A Cyber Security Vendor

Evaluating cyber security vendors through the lens of their vulnerability management practices - including frequency, severity, and time-to-patch - is no longer optional. It’s an essential part of any strategic approach to risk mitigation and long-term operational resilience.
No results found.

In The News

KnowBe4 Predicts the Agentic AI Revolution Will Reshape Cybersecurity in 2026

KnowBe4 Predicts the Agentic AI Revolution Will Reshape Cybersecurity in 2026

KnowBe4 releases cybersecurity predictions for 2026 
Research Proves Billions in GDP and Thousands More Jobs If Government Backs Australian-owned Companies

Research Proves Billions in GDP and Thousands More Jobs If Government Backs Australian-owned Companies

New economic modelling has found that awarding a greater share of Australian Defence procurement, covering both services and materiel, to Australian-owned and operated prime contractors would inject billions annually into the nation's GDP and create tens of thousands of jobs, whilst also strengthening Australia’s sovereign capability at a time of ...
PyTorch Users at Risk: Unveiling 3 Zero-Day PickleScan Vulnerabilities

PyTorch Users at Risk: Unveiling 3 Zero-Day PickleScan Vulnerabilities

AI Model Scanning as the First Layer of Security JFrog Security Research found 3 zero-day critical vulnerabilities in PickleScan, which would allow attackers to bypass the most popular Pickle model scanning tool. PickleScan is a widely used, industry-standard tool for scanning ML models and ensuring they contain no malicious content. Each discovered ...
CrowdStrike Named AWS 2025 Global Security Partner & Global Marketplace Partner of the Year

CrowdStrike Named AWS 2025 Global Security Partner & Global Marketplace Partner of the Year

CrowdStrike also recognized as Canada, Iberia, MENA, and SSA Technology Partner of the Year
Wasabi Strengthens Cloud Storage Security with Covert Copy Capability

Wasabi Strengthens Cloud Storage Security with Covert Copy Capability

Cloud storage company Wasabi has expanded its cyber resilient cloud storage capabilities with Covert Copy, a patent pending, advanced ransomware-resistant storage solution that allows users to create a locked, hidden copy of storage buckets to ensure critical data remains untouchable, even in the event of a cyberattack. The selected data is logically ...
CrowdStrike Delivers Agentic Security to HPE Unleash AI Partner Program

CrowdStrike Delivers Agentic Security to HPE Unleash AI Partner Program

CrowdStrike and HPE deliver unified protection for HPE Private Cloud AI, co-developed with NVIDIA, empowering enterprises to accelerate secure, high-performance AI at scale
CrowdStrike Stops Cloud Attacks in Seconds with Real-Time Cloud Detection and Response Innovations

CrowdStrike Stops Cloud Attacks in Seconds with Real-Time Cloud Detection and Response Innovations

New real-time detection engine, cloud Indicators of Attack, and automated response actions give SOC teams real-time protection at machine speed
CrowdStrike Operationalizes and Secures Agentic AI Workloads on AWS

CrowdStrike Operationalizes and Secures Agentic AI Workloads on AWS

CrowdStrike named an inaugural AWS Agentic AI Specialization Partner, recognized for its proven expertise in securing and operationalizing intelligent, agentic AI systems at scale
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This