The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Avoiding Security Operation Chokepoints
Introduction
Security operations often become inadvertent chokepoints. When every vendor relationship triggers an extensive security review, and teams rely on spreadsheets and email chains to gather responses, progress grinds to a halt. For resource‑constrained organisations, particularly in the fintech, SaaS and technology spaces, these bottlenecks ...

2026 Predictions: The Year Identity Becomes the Ultimate Control Point for an Autonomous World
Jeffrey Kok, Vice President, Solution Engineers, Asia Pacific & Japan at CyberArk shares his 2026 predictions for the cybersecurity industry - outlining why identity and innovation in governance will be key to organisational survival as organisations face the risks of autonomous AI agents and shrinking certificate lifespans.

Hybrid Mesh Security in the Age of AI and Ransomware
By adopting hybrid mesh security principles and embracing AI-enhanced controls, security leaders can effectively disrupt the sophisticated ransomware attack chain and establish resilient, future-proof defences against the evolving threats of the digital age.

Why 9 In 10 IT Teams Overestimate Their Operational Resilience
Australian IT leaders report strong confidence in their organisation’s resilience — yet the SolarWinds 2025 IT Trends Report shows a more complicated reality. While most believe they can withstand today’s demands, that confidence drops when facing challenges like AI adoption, cyber threats, or evolving regulations such as CPS 230. Nearly half of IT ...

Cybersecurity in Manufacturing: Why It’s More Important Now Than Ever
Manufacturing has always depended on stable operations. That used to mean keeping machines running, maintaining quality, and hitting delivery schedules. Today it also means defending the environment from attacks that can shut down production, corrupt data, or compromise customer trust. Plants are now connected in ways they weren’t ten years ago, and ...

AI to Supercharge Cyber Threats Across Australia
AI is fundamentally changing the economics of cyberattacks in Australia. Adversaries are no longer scaling through the workforce, but rather through automation. Leaders can’t rely on human-paced defences in a machine-paced threat environment.
Here are the top security trends to watch out for in 2026 and beyond:
Compressed Attack Timelines Due to ...

Why Fighting Fraud Requires a Real-time Foundation
Introduction
Australia is fast becoming a hotspot for AI-generated cybercrime. Risks that were once theoretical are now costing businesses millions, even as security teams deploy advanced analytics, AI, and new approaches to keep pace.
Consider this case in 2024. A finance employee in Hong Kong wired US$25 million during what appeared to be a ...

‘Tis the Season to Stay Secure: Safeguarding Your Business this Festive Period
This holiday shopping season can make or break many Australian businesses. While consumers are shopping for bargains, attackers are searching for vulnerabilities.
The surge in shopping traffic during Black Friday, Cyber Monday and Christmas sales provides cybercriminals with the perfect cover to launch scams and fraud campaigns, exploiting the rise ...
No results found.
In The News
CrowdStrike Unveils Secure-by-Design AI Blueprint for AI Agents Built with NVIDIA
Architecture will integrate protection from the Falcon platform with NVIDIA OpenShell to run safer, autonomous AI agents both locally on DGX Spark and in the cloud
Akamai Launches AI Grid Intelligent Orchestration for Distributed Inference Across 4,400 Edge Locations
Akamai Inference Cloud is the industry's first global-scale implementation of NVIDIA AI Grid, intelligently routing AI workloads across its edge, regional, and core footprint to balance latency, cost, and performance
NinjaOne Revolutionises Vulnerability Management with AI-driven Assessment to Reduce Risk Faster
NinjaOne has announced its new solution NinjaOne Vulnerability Management, which helps IT teams identify, prioritise, and remediate vulnerabilities faster, without relying on periodic scans from security teams that often lack context and connection to remediation workflows. Built natively into the NinjaOne platform, the new solution brings together ...
Cisco Secure AI Factory with NVIDIA Makes AI Easier to Deploy and Secure, Anywhere Organizations Need It
Expanded architecture lets businesses run AI at scale, from central data centers to the factory floor, without sacrificing performance or security
TrendAI Delivers Security-by-design for AI Factories Powered by NVIDIA
SYDNEY, Australia – 17 March 2026 – TrendAI™, the enterprise AI security leader from Trend Micro Incorporated (TYO: 4704; TSE: 4704), today announced a new integration with the NVIDIA DSX Air Platform, which will empower customers to design, test, and prove AI factory security before deployment, rather than after.
To learn more about the TrendAI and ...
Logicalis Australia Bolsters Erica Smith’s Remit to Head of Marketing and Vendor Alliances
MELBOURNE, AUSTRALIA, MARCH 16, 2026: Logicalis Australia, a leading global technology service provider, has expanded Erica Smith's remit to Head of Marketing and Vendor Alliances. The new role unifies brand strategy, demand generation, and partner engagement to turbocharge growth and channel alliances across Logicalis Australia.
Erica’s expanded ...
F5 Advances Enterprise Application Security for the AI and Post-quantum Era
New security innovations in the F5 Application Delivery and Security Platform unify AI-driven protection, zero trust access, and post-quantum readiness across hybrid multicloud environments
LastPass Launches Secure Access Essentials to Tackle SaaS and AI Access Risks
LastPass has unveiled a new security approach designed to help organisations manage access across a growing ecosystem of SaaS applications, AI tools and browser-based workflows.
The company announced Secure Access Essentials, which combines application discovery, access controls and secure authentication capabilities into a single solution delivered ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
