The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

AI Coding Assistants Boost Productivity … But At What Cost to Security?

AI Coding Assistants Boost Productivity … But At What Cost to Security?

As the pressure mounts to ship faster and innovate more aggressively, development teams must remember that code security is no longer optional but a business-critical necessity.
Baseline Compliance Is Just The Starting Line

Baseline Compliance Is Just The Starting Line

For years, compliance has been the word that quickly put anyone on the back foot. Compliance is one of those words that often carries a negative connotation, but it doesn’t have to. Some forward-thinking leaders are looking to rewrite the compliance script entirely. Jadee Hanson, Chief Information Security Officer at Vanta, has no patience for ...
How Emerging Technologies In Critical Infrastructure Are Expanding Cyber Risks

How Emerging Technologies In Critical Infrastructure Are Expanding Cyber Risks

Introduction Emerging technologies like industrial Internet of Things, unified platform architectures, and cloud-integrated operational technology are transforming the critical infrastructure landscape. This transformation, driven by the need for greater agility and pursuit of competitive advantage, is unlocking unprecedented levels of automation, ...
Privacy by Design: Future-proofing Data Security From the Ground Up

Privacy by Design: Future-proofing Data Security From the Ground Up

Introduction As AI reshapes how many of today’s enterprises operate, concerns over data privacy are accelerating. The pace of innovation is outstripping the capabilities of many legacy systems, and Australian businesses are grappling with issues related to transparency, access control and data security as a result. The core issue isn’t just the ...
The Price of Going Mobile App Viral

The Price of Going Mobile App Viral

The Tea app, a platform for women to rate and review dating experiences, recently went viral on the US App Store but suffered a severe data breach. Due to insecure Firebase storage and poor application security hygiene, over 72,000 private images including ID cards and selfies were exposed, with no access control or rate limiting in place. Metadata ...
Database 23ai: Innovation or Mere Iteration?

Database 23ai: Innovation or Mere Iteration?

Discover how Oracle's Database 23ai is transforming business data by integrating AI, bridging the gap traditional databases couldn’t. Unlock personalized, context-aware insights effortlessly with cutting-edge technology.
Repatriating the Cloud – Why Cybersecurity Must Now Take Center Stage

Repatriating the Cloud – Why Cybersecurity Must Now Take Center Stage

“The cloud is just someone else’s computer,” goes the old tech joke, and like many good jokes, it conceals a sobering truth. For years, organizations eagerly adopted public cloud platforms for the sake of agility, cost savings, and unlimited scalability. But today, that enthusiasm is being tempered by a harsh reality: those “someone else’s” computers ...
Rethinking Security: Why Ethical Curiosity Belongs at the Core of Cyber Defence

Rethinking Security: Why Ethical Curiosity Belongs at the Core of Cyber Defence

Introduction  In 2023, the Latitude Financial cyberattack exposed over 14 million customer records, including driver  licences, passport numbers, and financial details. While remediation focused on containment and  response, one quiet question lingered for many defenders:  "Why didn’t we ask, 'what if?' sooner?"  That single moment underscores ...
No results found.

In The News

Infoblox Streamlines IP Address Management Across Hybrid Cloud Environments with AWS

Infoblox Streamlines IP Address Management Across Hybrid Cloud Environments with AWS

Infoblox, the leader in uniting networking, security and cloud with a protective DDI platform, today announced a new integration between Infoblox Universal IP Address Management™ (Universal IPAM) and Amazon Virtual Private Cloud IP Address Manager (Amazon VPC IPAM). The integration is designed to accelerate application rollouts and updates by ...
Rubrik Agent Cloud Enhances Trusted Agentic AI Deployments for Microsoft Copilot Studio

Rubrik Agent Cloud Enhances Trusted Agentic AI Deployments for Microsoft Copilot Studio

Rubrik (NYSE: RBRK), the Security and AI Operations company, today announced that Rubrik Agent Cloud will integrate with Microsoft Copilot Studio to accelerate trusted enterprise AI agent adoption. As AI transformation expands across organisations, Rubrik Agent Cloud helps them to adopt agents at scale with the ability to monitor, govern, and ...
Darktrace’s APJ Threat Report Shows North Korea and China-nexus Groups’ Advanced AI Capabilities to Hit Email, Cloud and Third-party Vendors

Darktrace’s APJ Threat Report Shows North Korea and China-nexus Groups’ Advanced AI Capabilities to Hit Email, Cloud and Third-party Vendors

Geopolitical tensions, rapid digital transformation, and deeper integration of generative AI have seen a sharp rise in the volume and sophistication of attacks across the region.
Fortinet and Crime Stoppers International Launch Global Cybercrime Bounty Program

Fortinet and Crime Stoppers International Launch Global Cybercrime Bounty Program

First-of-its-kind initiative incentivises deterrence and disruption of cybercrime through anonymous tips and rewards 
Claroty Releases New AI-powered CPS Library, Setting Revolutionary New Standards for Asset Visibility and Vulnerability Attribution

Claroty Releases New AI-powered CPS Library, Setting Revolutionary New Standards for Asset Visibility and Vulnerability Attribution

OEM partners including Rockwell Automation and Schneider Electric help drive the fundamental shift in asset identification
Exabeam and Recorded Future Partner to Power Intelligence-Led Threat Detection and Response

Exabeam and Recorded Future Partner to Power Intelligence-Led Threat Detection and Response

Strategic integration enables security teams to move from reactive to proactive with real-time threat context and automated response
Check Point Software Technologies Completes Australian Information Security Registered Assessors Program Assessment

Check Point Software Technologies Completes Australian Information Security Registered Assessors Program Assessment

Sydney, 19 November 2025 — Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced the successful completion and delivery of an Australian Government Information Security Registered Assessors Program (IRAP) assessment Report for its Check Point Cloud Infinity products, at the ...
Sophos Integrates Advanced Cyber Intelligence into Microsoft Security Copilot and Microsoft 365 Copilot

Sophos Integrates Advanced Cyber Intelligence into Microsoft Security Copilot and Microsoft 365 Copilot

Sophos has announced its robust repository of cyber threat intelligence, with Microsoft Security Copilot and Microsoft 365 Copilot. Introduced at the Microsoft Ignite Conference in San Francisco, organisations of all sizes gain real-time access to Sophos threat intelligence within Microsoft’s AI-powered environments, helping them strengthen defences ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This