The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How a Veteran Project Manager Tames Cyber Chaos

How a Veteran Project Manager Tames Cyber Chaos

Recently, on DevSecOops podcast; Hosts Tom Walker, James Vincent, and Scott Fletcher bring on a special guest, Natalie Haslam, an industry veteran with 25 years of project management experience within traditional IT, application development, and more recently, cybersecurity. Natalie’s reflection on the challenges of delivering cyber projects in the ...
What in the Cloud?

What in the Cloud?

DevSecOops podcast hosts Tom Walker, James Vincent, and Scott Fletcher debate which cloud platform reigns supreme. Choosing between major cloud providers can get overwhelming. The three Co-Hosts set aside their usual neutrality to champion AWS (Amazon Web Services), Microsoft Azure, and Oracle Cloud Infrastructure (OCI), diving deep into what each ...
How Analysing 700,000 Security Incidents Helped Our Understanding of Living Off the Land Tactics

How Analysing 700,000 Security Incidents Helped Our Understanding of Living Off the Land Tactics

This article shares initial findings from internal Bitdefender Labs research into Living off the Land (LOTL) techniques. Our team at Bitdefender Labs, comprised of hundreds of security researchers with close ties to academia, conducted this analysis as foundational research during the development of our GravityZone Proactive Hardening and Attack ...
Postmortem: Australian Retailer, The Iconic Incident Review

Postmortem: Australian Retailer, The Iconic Incident Review

In 2024, a sophisticated credential stuffing attack targeted The Iconic, a leading Australian online fashion retailer. This breach compromised customer accounts, raising serious concerns about cybersecurity measures within the retail industry. Affected individuals faced unauthorized transactions and potential data exposure. The Iconic has initiated a ...
What Makes You Board Ready?

What Makes You Board Ready?

Discover why serving on a corporate board might be more than just a career milestone. Dr. Keith Dorsey challenges conventional thinking, urging reflection and strategic planning. Learn what boards now seek: unique skills and genuine purpose. Are you ready to add real value?
The Cybersecurity Professionalisation Debate, are we at a Crossroads?

The Cybersecurity Professionalisation Debate, are we at a Crossroads?

The annual AUSCERT conference, a major gathering for cybersecurity professionals, industry leaders, and academics, unfolded last week at the Star Casino on the sunny Gold Coast. AUSCERT’s General Manager, Ivano Bongiovanni, spoke with me about the heated debate around professionalising the field. Traditionally, cybersecurity has been seen as a ...
Why Australian Boards Need to Rethink Risk in the Age of AI

Why Australian Boards Need to Rethink Risk in the Age of AI

The nature of corporate risk in Australia is evolving rapidly at a strategic, reputational, and liability level. As the next five years shape up to be even more disruptive in the world of risk management, Australian boards need to begin paying swift attention not only to how artificial intelligence (AI) is going to reshape the risk environment itself, ...
Why Deepfakes Are A Growing Threat To Financial Services

Why Deepfakes Are A Growing Threat To Financial Services

To defend against deepfakes, financial institutions must treat identity and access management (IAM) as strategic infrastructure, not just a compliance function
No results found.

In The News

DevSecOps in the AI Era: JFrog Powers Agentic Remediation with Self-Healing Software Supply Chain

DevSecOps in the AI Era: JFrog Powers Agentic Remediation with Self-Healing Software Supply Chain

New JFrog Platform MCP connections with GitHub Copilot deliver autonomous security resolution capabilities directly into developer workflows
JFrog Unveils Industry’s First Agentic Repository, Revolutionising How Developers Deliver AI-Native Software

JFrog Unveils Industry’s First Agentic Repository, Revolutionising How Developers Deliver AI-Native Software

JFrog Fly delivers a zero-config, fully transparent agentic repository for accelerating modern, AI-driven software delivery
JFrog Unveils AppTrust: “DevGovOps” Solution to Redefine Software Release Governance

JFrog Unveils AppTrust: “DevGovOps” Solution to Redefine Software Release Governance

Platform-native, secure, release management solution delivers evidence-based insights for software supply chain security, compliance, and integrity
Kyndryl Survey Reveals That Mainframe Modernisation Projects Deliver 2-3X Return on Investment

Kyndryl Survey Reveals That Mainframe Modernisation Projects Deliver 2-3X Return on Investment

Respondents expect AI will drive billions in cost savings and increased revenues. The mainframe powers AI innovation across hybrid IT environments.
KnowBe4 Defines a Holistic Approach to Human Risk Management

KnowBe4 Defines a Holistic Approach to Human Risk Management

KnowBe’s new HRM framework guides organisations to transform employees into an active layer of defence through data-driven insights, cultural understanding and targeted interventions
Cohesity Appoints Greg Statton as Chief Technology Officer, Asia Pacific and Japan

Cohesity Appoints Greg Statton as Chief Technology Officer, Asia Pacific and Japan

SYDNEY – September 10 2025 – Cohesity, a leader in AI-powered data security, today announced the appointment of Greg Statton as Chief Technology Officer for the Asia Pacific and Japan (APJ) region. In this newly created role, Statton will lead technology strategy and innovation initiatives across APJ, supporting Cohesity’s mission to deliver ...
Secure Code Warrior Expands Commitment to Secure by Design Best Practices with Free Secure Code Video Series for Developers

Secure Code Warrior Expands Commitment to Secure by Design Best Practices with Free Secure Code Video Series for Developers

Launch of new 12-week video series on AI/LLM security empowers developers to safely adopt AI coding and mitigate emerging security risks 
Exabeam Extends Proven Insider Threat Detection to AI Agents with Google Cloud

Exabeam Extends Proven Insider Threat Detection to AI Agents with Google Cloud

Exabeam unlocks visibility into AI agent behaviour to detect intent, drift, and compromise where legacy tools fail
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This