The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Australia’s Cyber Laws Just Changed on Who Takes the Hit
There’s a new kind of tension creeping into Australian boardrooms. For years, when cyber incidents hit, accountability had a familiar landing zone to fob off and ‘talk to security’. Well, those days are over.
With new federal cyber legislation now placing personal liability on company directors, responsibility has shifted upstream and everyone feels ...

How to Build Secure Communications Beyond “End-to-End” Network Encryption
For governments and critical infrastructure operators, secure communications are essential to national governance, operational continuity, and crisis response.
Secure communication is the process of safeguarding communication channels and taking full control over critical information. It involves methods and technologies to ensure that all data ...

NIAP-Certified Security – a Foundation for Trusted Communications
In government and critical infrastructure, security is not an optional feature, it is the foundation of operational integrity. For organizations responsible for protecting sensitive data and ensuring mission continuity, trust in communication systems must be earned through independent, rigorous validation. Relying on unvetted software introduces ...
Streamlining Cyber Operations
Introduction
As businesses scale and digital ecosystems grow more and more complex, security teams face increasing pressure to protect, adapt, and enable innovation. For many organisations, cyber operations are buckling under the weight of manual tasks, legacy tools, and cross-functional bottlenecks. The result is a reactive security posture that ...

Australia’s AI Future Is Being Built in the Cloud
When Amazon Web Services, more commonly known as AWS, planted their flag on Australian soil 13 years ago, cloud computing was still emerging. Today, it powers almost everything we do day to day; consumer banking, enterprise platforms as well as systems tied to national security. AI adoption accelerates across Australia and New Zealand, the question is ...

Containing the Inevitable: What Cyber Leaders Must Prepare for in 2026
As we head into 2026, I am thinking of a Japanese idiom, Koun Ryusui (行雲流水), to describe how enterprises should behave when facing a cyberattack. Koun Ryusui means “to drift like clouds and flow like water.” It reflects calm movement, adaptability, and resilience. For enterprises, this is an operating requirement. Cyber incidents are no longer isolated ...
Continuous Compliance Isn’t an Option
Discover why CISOs must lead the shift to continuous compliance—boosting security, reducing risk, and aligning with evolving regulatory demands.

Trust, Power, People: Hybrid AI’s 2026 Imperative
Over the past year across Asia Pacific, conversations with customers, from fast-growing digital natives to highly regulated banks and healthcare providers, all have shared a common thread: AI has moved from experimentation to execution. The question is no longer “if” but “how” to scale responsibly, efficiently, and with clear business outcomes. As we ...
No results found.
In the News
Elastic Delivers First Embedded AI Experiences for Observability and Security Inside Third-Party AI Tools
MCP Apps bring Elastic’s security and observability workflows into third-party AI tools, enabling teams to act on data directly where they work, with additional capabilities for search and data exploration
Snowflake Expands Snowflake Intelligence and Cortex Code to Power the Control Plane for the Agentic Enterprise
Snowflake Intelligence transforms how business users turn insights into action through a personalised, context-aware AI agent grounded in enterprise data, while Cortex Code enables builders to move faster from code to production with AI-powered development across systems, tools, or environments
DroneShield Quarterly Activities/Appendix 4c Cash Flow Report
DroneShield Limited (ASX:DRO) has released its business update and Appendix 4C for the three-month period ended 31 March 2026 (1Q2026).
The Company started 2026 with strong momentum, delivering the highest ever customer cash receipts in a quarter and the second‑highest revenue in a quarter. These results continue the positive trajectory from 2025, ...
Entrust Expands Identity Verification to Support Australia’s AML/CTF Reforms
Australia’s evolving Anti-Money Laundering and Counter-Terrorism Financing (AML/CTF) framework is reshaping how organisations approach identity verification.
With Tranche 2 reforms set to extend compliance obligations across new industries, businesses are under increasing pressure to strengthen customer due diligence processes while maintaining ...
CrowdStrike Accelerates SMB Cybersecurity Transformation Across JAPAC With Expanded Distributor-Led Services
Expanded go-to-market empowers distributors to recruit and onboard MSSPs, increasing SMBs access and adoption of the Falcon platform
Research Reveals “Trust Gap” Threatening Agentic AI Adoption: 66% of Organisations Say Real-Time Data Is Non-Negotiable
New Global Study of 850 Executives Also Finds That Fragmented Data Sources and Lack of Governance Are Stalling the Shift from AI Insights to AI Action
Kinetic IT Appoints Chief Transformation Officer to Accelerate Growth and Sovereign Technology Innovation
April 20, 2026 - Kinetic IT, a leading Australian-owned technology services partner, today announced the appointment of Kishore Jayaram as Chief Transformation Officer.
This newly created executive role reflects Kinetic IT's next phase of evolution - building on its strong trusted managed services foundation to become a more diversified, ...
As Agentic AI Adoption Accelerates, Rubrik Warns of Growing Security Gaps
New research from Rubrik Zero Labs highlights a critical lack of identity governance as organisations race to adopt autonomous systems they cannot fully observe or restore.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
- 353
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
