The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Cyber and Physical Worlds Collide in Critical Infrastructure
The convergence of cyber and physical security is no longer a hypothetical future; it’s the present reality for critical infrastructure operators worldwide. Sam Mackenzie, cybersecurity committee member at the Australian Computer Society (ACS), spoke intelligently about the challenges, demands, and culture shifts now facing organisations on the ...

Why CISOs Are Now Strategic Leaders in Cyber Preparedness
Operational resilience is no longer a niche concern for the IT department. It is a strategic imperative, one that can safeguard business continuity, protect brand reputation, and maintain customer trust.

Why Digital Identity Is the Key to a Fairer, Safer Financial System
Beyond convenience, the integration tackles real-world friction, the kind that costs both time and trust. Prior to ConnectID, if someone’s details didn’t align with outdated government records, we’d get stuck in a frustrating cycle of manual reviews, long phone calls, and delays. Now, we validate identities quickly using dynamic, bank-held data.
The Guardians that Safeguard our Critical Infrastructure
Introduction
Every day, critical industry sectors like healthcare, government and utilities services rely on digital systems that are mission-critical but vulnerable to cyber threats. Yet, the professionals safeguarding these systems often go unrecognised. Imagine a hospital's life-support systems faltering during critical surgery, a school building’s ...

The Unseen Price of ‘Going Faster’
The constant talk of ‘seamless migration’ and ‘cloud first strategy’ can sometimes result in burnt out engineering teams and security risks nobody wants to look at. Iress, a leading tech company in financial services, decided to embark on decade long push to transform, accelerate, and above all, stay relevant. Technical debt, too many tools, and the ...
Shifting Left to Tap Into Untapped Revenue
Introduction
In the past, security and revenue were considered two sides of a coin; one a business enabler, the other a compliance necessity. But that mindset is quickly becoming obsolete. The most forward-thinking software companies are now embedding security into their go-to-market strategies early and often. By “shifting left”, they’re not only ...

Beyond Cleanup: Why Executive Cyber Literacy Is Australia’s Missing Link
Introduction
“The adversary doesn’t need a new attack vector, just an old weakness you never fixed.”
Over the past 12 months, Australia has experienced a surge of high-profile cyberattacks impacting industries such as aviation, superannuation, and higher education. While each incident is individually significant, together they reveal a deeper issue, ...

The Hidden Cost of Technology Evolution
Enterprise technology is often defined by speed, new platforms, and better systems. But for Matt Watts, a Data Expert, the space’s obsession with what’s next has created a blind spot. Behind every step forward lies obsolete systems, forgotten data, and unfinished ideas powering on in limbo. As the pace accelerates, so does the urgency to rethink how we ...
No results found.
In The News
Rapid7 Q3 Threat Report Reveals Ransomware Alliances, AI Weaponisation, and the Obsolescence of “Time to Patch”
Rapid7’s latest Q3 2025 Threat Landscape Report reveals how cybercriminals are accelerating exploitation timelines, consolidating ransomware alliances, and weaponising AI to outpace defenders.
42% Of Australians Targeted by Job Scams and Nearly One In Three Hit by Financial Fraud Amid Cost-Of-Living Crunch
New Trend Micro research finds half of Australians are under financial strain, with economic stress driving riskier behaviour online
Elastic Redefines Observability with AI-Powered Streams
Streams presents a unified intelligence layer for extracting structure from messy, unstructured logs, enabling rapid root cause identification and remediation
VAST Data Partners with Google Cloud to Enable Enterprise AI at Scale Across Hybrid Cloud Environments
VAST Data today announced an expanded partnership with Google Cloud, enabling customers to deploy the VAST AI Operating System (AI OS) as a fully managed service and extend a unified global namespace across hybrid environments. Powered by the VAST DataSpace, enterprises can seamlessly connect clusters running in Google Cloud and on-premises locations, ...
Datadog Launches Storage Management to Help Teams Eliminate Unnecessary Cloud Object Storage
New product delivers granular visibility, proactive anomaly detection and targeted recommendations to optimise cloud object storage costs
Cybertify Secures Arni Hardarson as Head of Offensive Security Bolstering Elite Cyber Squad
Fast-growth elite cyber squad Cybertify has announced the appointment of Mr Arni Hardarson, one of Australia's most senior cybersecurity leaders and an internationally recognised industry icon, as Head of Offensive Security.
Bitdefender Launches GravityZone Security Data Lake Transforming How Security Telemetry Is Collected, Analysed, and Applied in Modern Businesses
Bitdefender has announced Bitdefender GravityZone Security Data Lake and Data Lake for Managed Detection and Response (MDR), solutions that help organisations cut through alert overload and complexity by unifying security telemetry from multiple tools into a single, intelligent platform. The new offering simplifies security operations with advanced ...
AI’s Risk vs Reward: Cisco & Governance Institute Urge Risk Leaders to Help Unlock Australia’s AI Potential
AI’s Risk vs Reward: Cisco & Governance Institute Urge Risk Leaders to Help Unlock Australia’s AI Potential | A new Cisco and Governance Institute report highlights Chief Risk Officers as catalysts for unlocking AI’s potential through safe, secure and strategic adoption | Reveals four critical roadblocks stalling AI adoption: ethical and reputational, ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
