The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

blockchain Auditing in Practice: What Executives Need to Understand Now

blockchain Auditing in Practice: What Executives Need to Understand Now

Blockchain doesn’t remove trust, it relocates it into code, consensus, and governance. Learn how to audit blockchain systems using ISO 27001, COBIT, and NIST without starting over, and where risk truly lives.
Cyber Powerhouse Ben Doyle Walks Away From Thales

Cyber Powerhouse Ben Doyle Walks Away From Thales

After 22 years as the longest tenured CISO in Australia at the same organisation, beloved Ben Doyle is officially stepping away from his role at Thales... and yep, the cyber industry is feeling it. “I have been extremely lucky having the tenure, support, and career opportunity at an organisation like Thales that allowed me to grow as the cyber ...
In the Age of Microsegmentation Enforcement in Hours, Are You Still Shutting Down Operations?

In the Age of Microsegmentation Enforcement in Hours, Are You Still Shutting Down Operations?

I was researching cyberattacks, and a common theme popped out. “We had an unprecedented cyberattack… and we shut down our operations to protect stakeholder interests.” I know, breaches can be strenuous. The initial hours following a breach are often marked by chaos and urgency as crisis leaders call vendors, disconnect systems, analyze logs, and ...
Economic Statecraft Is the New Force Multiplier

Economic Statecraft Is the New Force Multiplier

​Defence power is no longer defined by platforms alone. It’s shaped upstream, by capital allocation, ownership rules and the speed at which states can convert technology into deployable capability. That shift is already underway. Many governments recognise it. Some have redesigned their systems around it. Australia is still adapting, albeit slowly, to ...
How Strider Technologies Is Mapping Foreign Interference Across Western Innovation

How Strider Technologies Is Mapping Foreign Interference Across Western Innovation

Foreign states are extracting openly, legally and at scale from Western systems that were built on trust, transparency, and collaboration. Paul Maddison, Australia, and New Zealand Country Manager at Strider Technologies, talks about a threat that rarely announces itself. “Strider is a company that was founded six years ago in response to this sort ...
Encryption Isn’t Enough: The Hidden Threat of Messaging Metadata

Encryption Isn’t Enough: The Hidden Threat of Messaging Metadata

Today’s Digital Landscape Metadata is one of the most overlooked security risks in modern digital communications. Adversaries no longer need to break into encrypted chats to understand your intent; all they need is your metadata. For government officials who deal with national security, foreign relations, or coordination of high-stakes operations ...
Why Connectivity Failure Is Now a National Security Risk

Why Connectivity Failure Is Now a National Security Risk

​When emergency services go dark, coordination breaks down. Governments lose visibility at the exact moment they need it most. Recent outages in Australia, where people could not reach emergency services, were not edge cases. They were signals. Neha Idnani, Regional Vice President for APAC at Eutelsat, talked about what those failures reveal. Modern ...
Why Cyber Risk Doesn’t Pause, Even When Organisations Do

Why Cyber Risk Doesn’t Pause, Even When Organisations Do

​Late November in the US marks a slowdown for most organisations. Early November if you’re in Australia post the famous Melbourne Cup horse race. Teams thin out from then onwards. Decision making compresses. Attention shifts elsewhere. For attackers, it’s a window. The Semperis 2025 Holiday Ransom Report reinforces a reality security leaders already ...
No results found.

In the News

Semperis Expands Purple Knight to Strengthen Identity Security in Line With Five Eyes Guidance

Semperis Expands Purple Knight to Strengthen Identity Security in Line With Five Eyes Guidance

SYDNEY, Australia- 24 April 2026 – Semperis, the identity-driven cyber resilience and crisis response company, today announced expanded capabilities for Purple Knight, its free, community-driven Active Directory and Entra ID security assessment tool helping organisations strengthen identity security in line with guidance from the Five Eyes Alliance, of ...
Saviynt Appoints Tim Wedande as Field CTO for Asia Pacific and Japan

Saviynt Appoints Tim Wedande as Field CTO for Asia Pacific and Japan

APJ appointment strengthens regional customer engagement and technical strategy leadership.
CrowdStrike Launches Project QuiltWorks, Uniting the Cybersecurity Industry as Frontier AI Models Accelerate Risk

CrowdStrike Launches Project QuiltWorks, Uniting the Cybersecurity Industry as Frontier AI Models Accelerate Risk

Powered by frontier models from OpenAI and Anthropic, CrowdStrike’s coalition includes Accenture, EY, IBM Cybersecurity Services, Kroll, and OpenAI to close the AI vulnerability gap for every enterprise
Elastic Collaborates With Google Cloud to Bring Its Embedded Security Layer to Google Distributed Cloud Air-Gapped Environments

Elastic Collaborates With Google Cloud to Bring Its Embedded Security Layer to Google Distributed Cloud Air-Gapped Environments

Google Distributed Cloud is embedding Elastic’s agentic security operations platform, providing security analytics, automation, and XDR capabilities to help customers secure sensitive data in air-gapped environments
EXL Announces a Strategic Services Collaboration With Google Cloud

EXL Announces a Strategic Services Collaboration With Google Cloud

EXL’s relationship with Google Cloud underscores EXL’s strength as a differentiated outcome-led AI and cloud transformation partner
CrowdStrike Extends Its Real-Time Cloud Detection and Response to Google Cloud

CrowdStrike Extends Its Real-Time Cloud Detection and Response to Google Cloud

CrowdStrike expands cloud runtime security leadership, giving defenders the speed and precision to stop cloud breaches in seconds across hybrid and multi-cloud environments
Oracle Expands Powerful AI Capabilities in Oracle AI Database@Google Cloud to Supercharge Enterprise Data Innovation

Oracle Expands Powerful AI Capabilities in Oracle AI Database@Google Cloud to Supercharge Enterprise Data Innovation

Secure, natural language access to Oracle data through Gemini Enterprise speeds insights without writing SQL
Rubrik Secures and Accelerates AI Agents on Google Cloud

Rubrik Secures and Accelerates AI Agents on Google Cloud

New Rubrik Agent Cloud Integration with Gemini Enterprise Agent Platform provides a unified control layer for AI agent operations
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This