The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Continuous Compliance Isn’t an Option
Discover why CISOs must lead the shift to continuous compliance—boosting security, reducing risk, and aligning with evolving regulatory demands.

Trust, Power, People: Hybrid AI’s 2026 Imperative
Over the past year across Asia Pacific, conversations with customers, from fast-growing digital natives to highly regulated banks and healthcare providers, all have shared a common thread: AI has moved from experimentation to execution. The question is no longer “if” but “how” to scale responsibly, efficiently, and with clear business outcomes. As we ...

97% of Australian Companies Are Sitting Ducks for the Next Major Cybersecurity Attack
Only 3% of Australian organisations claim to be ‘mature’ in their cybersecurity stance, according to Cisco’s 2025 Cybersecurity Readiness Index report. Seventy-five percent expect a major business disruption within two years due to a cyber incident.
From 8000 companies across 30 countries, only ~3% rate themselves as mature. CTO of ...

Why AWS Security Is the Middleman, Which Is What Regulators Need
Regulators want certainty. Engineers want velocity. Cloud providers are expected to satisfy both simultaneously, globally, and at scale. Tough job, but not for Mark Ryland, Director of Security at AWS.
Ryland's day to day to role is being the intermediate between all parties to ensure things get done and to make it happen. The function is underpinned ...

Can AI Ever Really Outpace AI-Powered Cyberattacks?
Introduction
There's this question that keeps coming up in cybersecurity circles, and honestly, it feels a bit like asking whether we can outrun our own shadow. Can defensive AI actually stay ahead of AI-powered attacks? The short answer is probably not in any permanent way, but that doesn't mean we're doomed to lose this fight.
The thing about AI ...
Putting Your Money Where Your Money Is
Introduction
Fintech companies occupy a unique position at the intersection of finance and technology. They handle extremely sensitive customer information, personal identities, payment data, transaction histories, and therefore represent a high‑value target for cyber‑criminals. In the Asia‑Pacific region, nearly 80 percent of executives anticipate ...

ISACA Sydney Conference 2025 – Event Recap
Overview
Walking into the ISACA Sydney Chapter Conference as “the student voice”, I knew I was surrounded by some of the heaviest hitters in cyber, audit and technology leadership. My job for the day was simple but huge: ask the questions students and early-career professionals are scared to ask and bring those answers back to our community.
By the ...

Kaseya Connect APAC 2025 – Event Recap
Introduction
Kaseya Connect APAC 2025 delivered a message that went beyond product releases: MSP cybersecurity is entering an era where resilience, automation and identity-level defences matter more than point solutions. While most coverage will focus on the Datto SIRIS 6 appliance and Kaseya’s acquisition of INKY, what stood out inside the rooms at ...
No results found.
In the News
DroneShield Quarterly Activities/Appendix 4c Cash Flow Report
DroneShield Limited (ASX:DRO) has released its business update and Appendix 4C for the three-month period ended 31 March 2026 (1Q2026).
The Company started 2026 with strong momentum, delivering the highest ever customer cash receipts in a quarter and the second‑highest revenue in a quarter. These results continue the positive trajectory from 2025, ...
Entrust Expands Identity Verification to Support Australia’s AML/CTF Reforms
Australia’s evolving Anti-Money Laundering and Counter-Terrorism Financing (AML/CTF) framework is reshaping how organisations approach identity verification.
With Tranche 2 reforms set to extend compliance obligations across new industries, businesses are under increasing pressure to strengthen customer due diligence processes while maintaining ...
CrowdStrike Accelerates SMB Cybersecurity Transformation Across JAPAC With Expanded Distributor-Led Services
Expanded go-to-market empowers distributors to recruit and onboard MSSPs, increasing SMBs access and adoption of the Falcon platform
Research Reveals “Trust Gap” Threatening Agentic AI Adoption: 66% of Organisations Say Real-Time Data Is Non-Negotiable
New Global Study of 850 Executives Also Finds That Fragmented Data Sources and Lack of Governance Are Stalling the Shift from AI Insights to AI Action
Kinetic IT Appoints Chief Transformation Officer to Accelerate Growth and Sovereign Technology Innovation
April 20, 2026 - Kinetic IT, a leading Australian-owned technology services partner, today announced the appointment of Kishore Jayaram as Chief Transformation Officer.
This newly created executive role reflects Kinetic IT's next phase of evolution - building on its strong trusted managed services foundation to become a more diversified, ...
As Agentic AI Adoption Accelerates, Rubrik Warns of Growing Security Gaps
New research from Rubrik Zero Labs highlights a critical lack of identity governance as organisations race to adopt autonomous systems they cannot fully observe or restore.
TrendAI™ Partners With Anthropic to Extend Leadership in AI Security
Trend Micro’s enterprise business accelerates its transformation as AI security category leader
Bitdefender Launches Powerful Email Security Solution for Businesses and MSPs
Unified Email and Endpoint Security Detects and Stops Phishing, BEC, Ransomware, and Other Evolving Threats Across the Full Email Attack Chain
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
- 353
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
