The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Post Qantas Breach What Happens Now

Post Qantas Breach What Happens Now

​Months after a breach hit Qantas Airways, the airline recently confirmed that stolen customer information has now been released publicly by cybercriminals. This is despite the airline’s legal efforts to prevent the stolen data from being accessed, shared, and published. Experts are now helping Qantas to establish what data has been leaked, but early ...
Oracle is All in on AI Everything

Oracle is All in on AI Everything

Oracle is keeping up with the AI moment, like the rest of Silicon Valley. The database company, as we know it, is aware they need to move down the AI path to keep relevant and to keep up with customer demands. Well, truth be told, Oracle is betting big and is going all in on defining AI. Oracle’s big bet on ‘AI Native Data’ is their newest release, as ...
How the Financial Sector Is Battling New Cyber Threats

How the Financial Sector Is Battling New Cyber Threats

Graph databases are already proving their worth across fraud detection, compliance, and AI enablement. Their promise, however, extends further to a future where financial institutions can act not just faster, but smarter.
Turning Hesitation into Action

Turning Hesitation into Action

Unpacking Cisco and Governance Institute’s AI Risk Report at Cisco Live! 2025
A Polycrisis of AI Cyberattacks is Approaching. Are You Breach Ready Yet?

A Polycrisis of AI Cyberattacks is Approaching. Are You Breach Ready Yet?

Unless you have been living under a rock in the past few days, you would have seen that cybersecurity headlines have been overshadowed by reports that hackers fooled artificial intelligence agents into automating break-ins into major corporations. Anthropic, the makers of the artificial intelligence (AI) chatbot Claude, claim to run an investigation ...
The Hidden Cost of Cybersecurity Inefficiency

The Hidden Cost of Cybersecurity Inefficiency

Leaders must rethink how their teams manage data, automate response and validate defences. Consolidating platforms, investing in real-time analytics, and embedding AI into workflows can deliver both faster protection and meaningful cost reduction.
There’s No Physical and Cyber, It’s Just ‘Security’

There’s No Physical and Cyber, It’s Just ‘Security’

Christian Morin, Chief Security Officer at Genetec, knows the convergence in this space better than most. The adage of “set and forget” is the norm and the line between physical and cybersecurity blurs with every connected device in the industry as we know it, is shifting. The main question isn’t whether organisations can respond to breaches, but ...
Standing Privilege Is Silent Security Debt Carried By Many Australian Organisations

Standing Privilege Is Silent Security Debt Carried By Many Australian Organisations

By combining JIT, CIEM and ITDR, Australian organisations can drastically minimise their exposure to the risks of stolen credentials, data breaches, and privilege abuse.
No results found.

In The News

Kinetic IT Appoints Dean Langenbach as CEO to Accelerate Sovereign Technology Leadership and Drive National Growth

Kinetic IT Appoints Dean Langenbach as CEO to Accelerate Sovereign Technology Leadership and Drive National Growth

13 March 2026 – Kinetic IT, a leading Australian-owned technology services partner, today announced Dean Langenbach as its new Chief Executive Officer to shape the company’s next phase of growth and drive technology-driven transformation. The appointment underscores Kinetic IT’s continued momentum as it strengthens its position as the trusted ...
Kyndryl Confirms Converging Quantum, Data Sovereignty and Network Demands Expose Enterprise Readiness Gap

Kyndryl Confirms Converging Quantum, Data Sovereignty and Network Demands Expose Enterprise Readiness Gap

Kyndryl Readiness Report reveals misalignment between infrastructure investment and preparedness for converging modernisation demands
Telstra Joins Forces With Major Banks to Tackle Money Laundering

Telstra Joins Forces With Major Banks to Tackle Money Laundering

Recent pilot reports potential to bring forward detection of suspected money mule activity by as much as 90 days, as cross-industry collaboration takes on growing threat.
Equinix Unveils the Distributed AI Hub to Simplify and Secure Enterprise AI Infrastructure

Equinix Unveils the Distributed AI Hub to Simplify and Secure Enterprise AI Infrastructure

Equinix has launched the Distributed AI Hub, a unified framework designed to help organisations scale AI efficiently, run workloads closer to data, and overcome the challenges of distributed intelligence.
Motorola Solutions Helps Victorian Search and Rescue Dog Teams Perform Safe and Successful Missions

Motorola Solutions Helps Victorian Search and Rescue Dog Teams Perform Safe and Successful Missions

Robust radio technology supports interagency collaboration in the state’s most rugged and remote terrain
Palo Alto Networks Unit 42 Uncovers Vulnerability in Google Chrome’s Gemini AI Panel

Palo Alto Networks Unit 42 Uncovers Vulnerability in Google Chrome’s Gemini AI Panel

Google confirmed the findings and released a fix in early January 2026
ControlPlane Launches Enterprise Support For OpenBao To Strengthen Secrets Security

ControlPlane Launches Enterprise Support For OpenBao To Strengthen Secrets Security

ControlPlane, a specialist AI Security and DevSecOps consultancy, today announced the launch of ControlPlane Enterprise for OpenBao, a new offering designed to help organisations across Asia Pacific and globally to securely adopt and operate the OpenBao secrets management platform.
KnowBe4 Research Reveals Over Half of Australians Prioritise Work Accounts Over Personal Security

KnowBe4 Research Reveals Over Half of Australians Prioritise Work Accounts Over Personal Security

New study finds 76% of Australians feel confident spotting cyber threats, but risky habits like password reuse and credential sharing remain widespread  
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This