The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

97% of Australian Companies Are Sitting Ducks for the Next Major Cybersecurity Attack

97% of Australian Companies Are Sitting Ducks for the Next Major Cybersecurity Attack

Only 3% of Australian organisations claim to be ‘mature’ in their cybersecurity stance, according to Cisco’s 2025 Cybersecurity Readiness Index report. Seventy-five percent expect a major business disruption within two years due to a cyber incident.   From 8000 companies across 30 countries, only ~3% rate themselves as mature. CTO of ...
Why AWS Security Is the Middleman, Which Is What Regulators Need

Why AWS Security Is the Middleman, Which Is What Regulators Need

Regulators want certainty. Engineers want velocity. Cloud providers are expected to satisfy both simultaneously, globally, and at scale. Tough job, but not for Mark Ryland, Director of Security at AWS. Ryland's day to day to role is being the intermediate between all parties to ensure things get done and to make it happen. The function is underpinned ...
Can AI Ever Really Outpace AI-Powered Cyberattacks?

Can AI Ever Really Outpace AI-Powered Cyberattacks?

Introduction There's this question that keeps coming up in cybersecurity circles, and honestly, it feels a bit like asking whether we can outrun our own shadow. Can defensive AI actually stay ahead of AI-powered attacks? The short answer is probably not in any permanent way, but that doesn't mean we're doomed to lose this fight. The thing about AI ...
Putting Your Money Where Your Money Is

Putting Your Money Where Your Money Is

Introduction Fintech companies occupy a unique position at the intersection of finance and technology. They handle extremely sensitive customer information, personal identities, payment data, transaction histories, and therefore represent a high‑value target for cyber‑criminals. In the Asia‑Pacific region, nearly 80 percent of executives anticipate ...
ISACA Sydney Conference 2025 – Event Recap

ISACA Sydney Conference 2025 – Event Recap

Overview Walking into the ISACA Sydney Chapter Conference as “the student voice”, I knew I was surrounded by some of the heaviest hitters in cyber, audit and technology leadership. My job for the day was simple but huge: ask the questions students and early-career professionals are scared to ask and bring those answers back to our community. By the ...
Kaseya Connect APAC 2025 – Event Recap

Kaseya Connect APAC 2025 – Event Recap

Introduction Kaseya Connect APAC 2025 delivered a message that went beyond product releases: MSP cybersecurity is entering an era where resilience, automation and identity-level defences matter more than point solutions. While most coverage will focus on the Datto SIRIS 6 appliance and Kaseya’s acquisition of INKY, what stood out inside the rooms at ...
Disruption Demands Coordination: Why Secure Communications Solutions Are Key to Disrupting the Illegal Fentanyl Trade

Disruption Demands Coordination: Why Secure Communications Solutions Are Key to Disrupting the Illegal Fentanyl Trade

Introduction The Government of Canada is taking concrete and bold action to strengthen border security and disrupt the illegal fentanyl trade. It has announced an investment of $1.3 billion to enhance operations. The funding will support hiring additional personnel and purchasing advanced technology and equipment. This includes state-of-the-art ...
Failure Isn’t an Option Says CISO at Amazon

Failure Isn’t an Option Says CISO at Amazon

Security teams must move faster because attackers already are, according to Amazon’s CISO, CJ Moses. His key tenet is to cut the friction, build the right systems, and make security so seamless that nobody has to think twice. “If you make someone’s job easier AND more secure, they’ll do it,” Moses comments. ✔️ Stop begging engineers ✔️ Stop ...
No results found.

In the News

Ping Identity Defines the Runtime Identity Standard for Autonomous AI

Ping Identity Defines the Runtime Identity Standard for Autonomous AI

General Availability of Identity for AI establishes continuous, contextual enforcement and real-time control over AI agents 
Interactive Secures IT Managed Services Agreement With Major Superannuation Fund

Interactive Secures IT Managed Services Agreement With Major Superannuation Fund

The leading Australian IT service provider will support the delivery of Hostplus’ technology strategy to enhance service delivery and operational resilience.
15,500 Malicious Domains: How Threat Actors Abuse a Popular Ad Tracker for Cloaked AI Investment Scams

15,500 Malicious Domains: How Threat Actors Abuse a Popular Ad Tracker for Cloaked AI Investment Scams

New research from Infoblox Threat Intel and Confiant reveals that cybercriminals are abusing Keitaro, a widely used advertising performance tracker, to hide (“cloak”) scams and malware behind ordinary web traffic; with many posing specifically as AI investment opportunities. Cloaking has become a foundational block of modern cybercrime, allowing ...
Elastic Eliminates Per-Endpoint Pricing for XDR

Elastic Eliminates Per-Endpoint Pricing for XDR

The Australian cyber landscape has reached a critical tipping point. As the latest ASD Cyber Threat Report reveals, average crime costs for large Aussie firms have spiked 219% to over $200k per incident. While much of the industry is focused on the AI arms race, there is a deeper shift occurring: the move from reactive dashboards to the agentic SOC. To ...
Elastic Eliminates the SOAR Automation Tax With Native Workflows

Elastic Eliminates the SOAR Automation Tax With Native Workflows

The Australian cyber landscape has reached a critical tipping point. As the latest ASD Cyber Threat Report reveals, average crime costs for large Aussie firms have spiked 219% to over $200k per incident. While much of the industry is focused on the AI arms race, there is a deeper shift occurring: the move from reactive dashboards to the agentic SOC. To ...
Milestone Systems Introduces Trusted Generative AI Tools for Security Operations

Milestone Systems Introduces Trusted Generative AI Tools for Security Operations

Milestone Systems has unveiled a new suite of generative AI-powered solutions designed specifically for security operations, addressing long-standing challenges around manual workflows, regulatory compliance, and trust in automated systems. While generative AI adoption continues to accelerate across industries, many security teams still rely on manual ...
Commvault Expands Microsoft Security Integration to Accelerate Threat Detection and Recovery

Commvault Expands Microsoft Security Integration to Accelerate Threat Detection and Recovery

Commvault has announced an expanded integration with Microsoft Security, connecting threat detection, investigation, and trusted recovery to strengthen enterprise cyber resilience operations. The integration brings together Microsoft Sentinel, Microsoft Security Copilot, and the Commvault Cloud platform to streamline resilience operations (ResOps), ...
Dell Technologies Expands Cybersecurity and Resilience for the AI Era and Emerging Quantum Risks

Dell Technologies Expands Cybersecurity and Resilience for the AI Era and Emerging Quantum Risks

New enhancements help organisations strengthen device trust, improve cyber resilience and detect threats in AI data platforms Security by design approach hardens Dell commercial PCs[i] with quantum-ready protections AI-powered cyber resilience helps organisations spot ransomware signals earlier and simplify recovery at scale Managed ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This