The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why US Government Innovation might Surprise you, According to Oracle’s Vice President

Why US Government Innovation might Surprise you, According to Oracle’s Vice President

It’s easy to not associate the US Government with innovation. The word ‘bureaucracy’ is often associated with Government combining images of endless paperwork and red tape. However, during a recent conversation at Oracle AI World, in Las Vegas with Rand Waldron, Vice President at Oracle, it became clear that this stereotype is a misconception and we ...
How Ransomware Economics Drives the Global Cybercrime Industry

How Ransomware Economics Drives the Global Cybercrime Industry

Introduction Cybercrime has matured into a highly structured global economy, rivalling legitimate industries in sophistication and profitability. The World Economic Forum projects that cybercrime will cost the global economy $10.5 trillion in 2025, effectively making it one of the largest economies in the world. (1) Ransomware is a key growth driver ...
AI Governance in the Age of Relentless Adoption

AI Governance in the Age of Relentless Adoption

AI is no longer a future concept. It is already reshaping how we work, how decisions are made, and how organisations operate. The pace of adoption is relentless. In many organisations, AI is embedded into workflows even when no formal policy or governance exists. This gap between adoption and oversight is one of the most pressing issues in technology ...
Why Australia’s AI Ambitions Depend on Smarter Networks

Why Australia’s AI Ambitions Depend on Smarter Networks

Australia’s ambition to be a global leader in artificial intelligence (AI) is clear—from sovereign AI strategies to booming enterprise deployment. But underneath the promise lies a pressing energy challenge. Data centres already account for approximately 5% of Australia’s electricity supply today, and according to reports could consume as much as 8% by ...
Decrypting the Future: Why Post-Quantum Security Must Start Today

Decrypting the Future: Why Post-Quantum Security Must Start Today

Introduction Australia is standing at the edge of a technological shift that could redefine cyber resilience. With quantum computing on the horizon, the very foundations of data security are under threat. While this technology promises enormous advances in areas like medical research, logistics and AI, it also has the potential to break the ...
Ransomware Protection Advisory: From Cisco Flaws to SonicWall Breaches

Ransomware Protection Advisory: From Cisco Flaws to SonicWall Breaches

“Please wait, your document is loading.” That’s the message victims saw right before their systems got hijacked. Behind that digital curtain, crypto miners and information stealers worked stealthily to infiltrate networks, exfiltrate sensitive data, and plant persistent malware. In the latest ColorTokens Threat Advisory, we tracked how threat ...
Caught in the Middle – How Diverse Cyber Laws Affect Global Organisations

Caught in the Middle – How Diverse Cyber Laws Affect Global Organisations

Regulatory fragmentation has become one of the most pressing yet overlooked concerns for global organisations, particularly as governments introduce differing cybersecurity laws. The issue lies not in the creation per se, but in the fact that these rules and regulations are developed in silos. Every country has its own perspective, shaped by the ...
Overcoming the Security Risks of Using AI In Software Development

Overcoming the Security Risks of Using AI In Software Development

Development teams face relentless pressure to deliver, yet they must continue to prioritise building secure, high-quality software. Leaders play a crucial role in reinforcing how a Secure by Design approach, supported by observability, benchmarking, and ongoing education, directly enhances code quality. By embedding these practices, organisations can ...
No results found.

In The News

New Elastic Tools Aim to Fix Why Security Agents Fail When Data is Scattered Across Dozens of Systems

New Elastic Tools Aim to Fix Why Security Agents Fail When Data is Scattered Across Dozens of Systems

New Elastic tools aim to fix why security agents fail when data is scattered across dozens of systems
CrowdStrike Achieves ISO 42001 Certification for Responsible AI-Powered Cybersecurity

CrowdStrike Achieves ISO 42001 Certification for Responsible AI-Powered Cybersecurity

Certification accelerates leadership in trusted AI governance, enabling organizations to outpace AI-accelerated threats with speed and control
Rapid7 MDR Integrates Microsoft Defender Signals to Create Tangible Security Outcomes

Rapid7 MDR Integrates Microsoft Defender Signals to Create Tangible Security Outcomes

Rapid7 announces the availability of Rapid7 MDR for Microsoft – a pre-emptive threat detection, investigation, and response service that brings together Rapid7’s global SOC, our market-leading SIEM technology, and deeper bi-directional Microsoft Defender integrations.
Check Point Introduces AI-Driven Exposure Management to Close the Cyber Security Remediation Gap

Check Point Introduces AI-Driven Exposure Management to Close the Cyber Security Remediation Gap

Designed for AI-era attacks, Exposure Management helps organisations reduce risk faster using existing security controls 
Black Kite’s 2026 Wholesale & Retail Report Reveals Over 70% of Major Retailers, Nearly 60% of Wholesalers, and 52% of the Supply Chain Have Exposed Credentials

Black Kite’s 2026 Wholesale & Retail Report Reveals Over 70% of Major Retailers, Nearly 60% of Wholesalers, and 52% of the Supply Chain Have Exposed Credentials

Report finds the sectors’ shared supply chain is the greatest risk, as attackers view wholesale and retail as an interconnected target landscape
Hiring Season Is Scam Season: How Fake Recruiters Exploit Job Seekers with Trusted Brand Names

Hiring Season Is Scam Season: How Fake Recruiters Exploit Job Seekers with Trusted Brand Names

According to Bitdefender’s Antispam Lab latest data, a wave of fake recruitment emails is actively circulating, timed to coincide with the early-year hiring surge. These scams impersonate well-known employers and staffing companies, promising easy jobs, fast interviews, and flexible work. ‘Your interview is confirmed’ These scams open with good ...
Total Economic Impact Study: JFrog Unifies and Accelerates the Secure Software Supply Chain from Code to AI

Total Economic Impact Study: JFrog Unifies and Accelerates the Secure Software Supply Chain from Code to AI

New Industry Analyst Study Shows that JFrog Delivered 282% ROI in Three Years, Reducing Risk While Accelerating Safer Software Releases for Enterprises
Check Point Software Technologies Reinforces New Zealand Presence with Local Check Point Harmony SASE Data Residency Instance

Check Point Software Technologies Reinforces New Zealand Presence with Local Check Point Harmony SASE Data Residency Instance

New Point of Presence Enhances Web application and API protection with low latency and delivers Industry-Leading Threat Prevention and Cloud-Ready Security Architecture
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This