The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Three Cybersecurity Predictions That Will Define the CISO Agenda in 2026

Three Cybersecurity Predictions That Will Define the CISO Agenda in 2026

In this byline, Sam Salehi, Managing Director ANZ at Qualys, shares his 2026 predictions for the cybersecurity industry, outlining the shifts that will define the CISO agenda as security teams grapple with an excess of signals, expanding AI-driven risk and rising board expectations. Sam argues that success in the year ahead will hinge on CISOs moving ...
Australia’s Cyber Laws Just Changed on Who Takes the Hit

Australia’s Cyber Laws Just Changed on Who Takes the Hit

There’s a new kind of tension creeping into Australian boardrooms. For years, when cyber incidents hit, accountability had a familiar landing zone to fob off and ‘talk to security’. Well, those days are over. With new federal cyber legislation now placing personal liability on company directors, responsibility has shifted upstream and everyone feels ...
How to Build Secure Communications Beyond “End-to-End” Network Encryption

How to Build Secure Communications Beyond “End-to-End” Network Encryption

For governments and critical infrastructure operators, secure communications are essential to national governance, operational continuity, and crisis response. Secure communication is the process of safeguarding communication channels and taking full control over critical information. It involves methods and technologies to ensure that all data ...
NIAP-Certified Security – a Foundation for Trusted Communications

NIAP-Certified Security – a Foundation for Trusted Communications

In government and critical infrastructure, security is not an optional feature, it is the foundation of operational integrity. For organizations responsible for protecting sensitive data and ensuring mission continuity, trust in communication systems must be earned through independent, rigorous validation. Relying on unvetted software introduces ...
Streamlining Cyber Operations

Streamlining Cyber Operations

Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing pressure to protect, adapt, and enable innovation. For many organisations, cyber operations are buckling under the weight of manual tasks, legacy tools, and cross-functional bottlenecks. The result is a reactive security posture that ...
Australia’s AI Future Is Being Built in the Cloud

Australia’s AI Future Is Being Built in the Cloud

When Amazon Web Services, more commonly known as AWS, planted their flag on Australian soil 13 years ago, cloud computing was still emerging. Today, it powers almost everything we do day to day; consumer banking, enterprise platforms as well as systems tied to national security. AI adoption accelerates across Australia and New Zealand, the question is ...
Containing the Inevitable: What Cyber Leaders Must Prepare for in 2026

Containing the Inevitable: What Cyber Leaders Must Prepare for in 2026

As we head into 2026, I am thinking of a Japanese idiom, Koun Ryusui (行雲流水), to describe how enterprises should behave when facing a cyberattack. Koun Ryusui means “to drift like clouds and flow like water.” It reflects calm movement, adaptability, and resilience. For enterprises, this is an operating requirement. Cyber incidents are no longer isolated ...
Continuous Compliance Isn’t an Option

Continuous Compliance Isn’t an Option

Discover why CISOs must lead the shift to continuous compliance—boosting security, reducing risk, and aligning with evolving regulatory demands.
No results found.

In the News

Good Drinks Australia Brews Stronger Network and Security With Macquarie Telecom

Good Drinks Australia Brews Stronger Network and Security With Macquarie Telecom

Independent Australian brewer improves reliability, efficiency and cyber security with AI powered SASE network solution
Akamai Guardicore Segmentation Transforms Zero Trust With New AI-Powered Capabilities

Akamai Guardicore Segmentation Transforms Zero Trust With New AI-Powered Capabilities

Latest enhancements enable simpler, faster, and safer segmentation
Introducing Tenable Hexa AI: The Agentic Engine That Supercharges Security Productivity and Accelerates Risk Reduction

Introducing Tenable Hexa AI: The Agentic Engine That Supercharges Security Productivity and Accelerates Risk Reduction

The Tenable One agentic AI engine orchestrates out-of-the-box and custom agents to automate security workflows and turn exposure intelligence into action 
CrowdStrike Introduces Falcon Data Security to Stop Data Theft Across the Agentic Enterprise

CrowdStrike Introduces Falcon Data Security to Stop Data Theft Across the Agentic Enterprise

CrowdStrike discovers, classifies, and secures sensitive data wherever it lives and moves, spanning endpoints, browsers, SaaS, cloud, and AI workflows
Databricks Enters Security Market With Launch of Lakewatch: New Open, Agentic SIEM

Databricks Enters Security Market With Launch of Lakewatch: New Open, Agentic SIEM

New product enables unlimited and unified data, petabyte-scale threat detection and investigations at up to 80% lower TCO
Check Point Launches AI Defense Plane to Secure the Agentic Enterprise at Scale

Check Point Launches AI Defense Plane to Secure the Agentic Enterprise at Scale

A unified AI security control plane delivering end-to-end protection across employee AI use, AI applications, and agentic systems
CrowdStrike Delivers Agentic MDR to Stop Breaches at Machine Speed

CrowdStrike Delivers Agentic MDR to Stop Breaches at Machine Speed

Falcon Complete’s elite security analysts build and orchestrate intelligent agents to stop AI-accelerated threats, while new services help organisations operationalise the agentic SOC
The State of Cloud-native Security 2026: Maturity Gaps and the Automation Mandate

The State of Cloud-native Security 2026: Maturity Gaps and the Automation Mandate

Red Hat, the world's leading provider of open source solutions, today releases data from its 2026 State of Cloud-Native Security Report, revealing that 97% of organisations reported at least one cloud-native security incident in the past year. These are not just sophisticated, one-off attacks, but rather often the result of "everyday lapses.” Hybrid ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This