The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How to Build Secure Communications Beyond “End-to-End” Network Encryption

How to Build Secure Communications Beyond “End-to-End” Network Encryption

For governments and critical infrastructure operators, secure communications are essential to national governance, operational continuity, and crisis response. Secure communication is the process of safeguarding communication channels and taking full control over critical information. It involves methods and technologies to ensure that all data ...
NIAP-Certified Security – a Foundation for Trusted Communications

NIAP-Certified Security – a Foundation for Trusted Communications

In government and critical infrastructure, security is not an optional feature, it is the foundation of operational integrity. For organizations responsible for protecting sensitive data and ensuring mission continuity, trust in communication systems must be earned through independent, rigorous validation. Relying on unvetted software introduces ...
Streamlining Cyber Operations

Streamlining Cyber Operations

Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing pressure to protect, adapt, and enable innovation. For many organisations, cyber operations are buckling under the weight of manual tasks, legacy tools, and cross-functional bottlenecks. The result is a reactive security posture that ...
Australia’s AI Future Is Being Built in the Cloud

Australia’s AI Future Is Being Built in the Cloud

When Amazon Web Services, more commonly known as AWS, planted their flag on Australian soil 13 years ago, cloud computing was still emerging. Today, it powers almost everything we do day to day; consumer banking, enterprise platforms as well as systems tied to national security. AI adoption accelerates across Australia and New Zealand, the question is ...
Containing the Inevitable: What Cyber Leaders Must Prepare for in 2026

Containing the Inevitable: What Cyber Leaders Must Prepare for in 2026

As we head into 2026, I am thinking of a Japanese idiom, Koun Ryusui (行雲流水), to describe how enterprises should behave when facing a cyberattack. Koun Ryusui means “to drift like clouds and flow like water.” It reflects calm movement, adaptability, and resilience. For enterprises, this is an operating requirement. Cyber incidents are no longer isolated ...
Continuous Compliance Isn’t an Option

Continuous Compliance Isn’t an Option

Discover why CISOs must lead the shift to continuous compliance—boosting security, reducing risk, and aligning with evolving regulatory demands.
Trust, Power, People: Hybrid AI’s 2026 Imperative 

Trust, Power, People: Hybrid AI’s 2026 Imperative 

Over the past year across Asia Pacific, conversations with customers, from fast-growing digital natives to highly regulated banks and healthcare providers, all have shared a common thread: AI has moved from experimentation to execution. The question is no longer “if” but “how” to scale responsibly, efficiently, and with clear business outcomes. As we ...
97% of Australian Companies Are Sitting Ducks for the Next Major Cybersecurity Attack

97% of Australian Companies Are Sitting Ducks for the Next Major Cybersecurity Attack

Only 3% of Australian organisations claim to be ‘mature’ in their cybersecurity stance, according to Cisco’s 2025 Cybersecurity Readiness Index report. Seventy-five percent expect a major business disruption within two years due to a cyber incident.   From 8000 companies across 30 countries, only ~3% rate themselves as mature. CTO of ...
No results found.

In the News

SA Power Networks Deploys Tanium to Boost Cyber Resilience

SA Power Networks Deploys Tanium to Boost Cyber Resilience

South Australian electricity distributor relies on the Tanium Autonomous IT platform for more efficient and effective endpoint and exposure management
VAST Data Hits $30 Billion Valuation as AI Drives a New Infrastructure Stack

VAST Data Hits $30 Billion Valuation as AI Drives a New Infrastructure Stack

AI operating system company VAST Data today announced the closing of its Series F financing at a US$30 billion valuation, representing more than a threefold increase from its US$9.1 billion Series E valuation in late 2023. The latest round was led by Drive Capital, with Access Industries acting as co-lead, and included participation from existing ...
Check Point to Integrate AI Defense Plane With Google Cloud to Help Secure AI Agents With Integrated Discovery, Governance, and Runtime Protection

Check Point to Integrate AI Defense Plane With Google Cloud to Help Secure AI Agents With Integrated Discovery, Governance, and Runtime Protection

REDWOOD CITY, CA. – April 22, 2026 -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced that it will serve as a launch partner with Google Cloud to integrate Check Point's AI Defense Plane with Google Cloud's Gemini Enterprise Agent Platform. The integration will combine ...
Exabeam Extends Agent Behaviour Analytics to the Google Cloud Agent Ecosystem

Exabeam Extends Agent Behaviour Analytics to the Google Cloud Agent Ecosystem

Comprehensive visibility and anomaly detection now available for agents built with Google Cloud’s Agent Development Kit and multi-agent workflows via the upcoming Google Agent Gateway
DataDog Announces GPU Monitoring to Help Businesses Optimise Spend and Performance as They Aim to Scale AI Projects

DataDog Announces GPU Monitoring to Help Businesses Optimise Spend and Performance as They Aim to Scale AI Projects

The launch of Datadog’s GPU Monitoring helps teams plan capacity, troubleshoot issues quickly, prevent costly failures and avoid wasted spend
NinjaOne Unified Backup Surpasses Fifteen Thousand Customers

NinjaOne Unified Backup Surpasses Fifteen Thousand Customers

Today, NinjaOne announced strong momentum for its NinjaOne Backup product, with more than 15,000 customers now relying on the solution to protect their endpoints, servers, and SaaS applications. The growth reflects increasing demand from IT teams and managed service providers (MSPs) for backup and recovery to be embedded within a unified IT operations ...
Defender’s Guide to the Frontier AI Impact on Cybersecurity

Defender’s Guide to the Frontier AI Impact on Cybersecurity

The release of the newest frontier AI models marks a turning point for cybersecurity. Palo Alto Networks has conducted early testing of the latest frontier AI models, including Anthropic’s Mythos model as part of Project Glasswing and OpenAI’s latest models as part of Trusted Access for Cyber program. The conclusion is clear: They are extraordinarily ...
Arctic Wolf Introduces Decipio, a Community Tool to Catch Credential Theft With Defense‑First AI

Arctic Wolf Introduces Decipio, a Community Tool to Catch Credential Theft With Defense‑First AI

Community beta tool invites defenders to collaborate and help shape a new approach to exposing credential‑stealing attacks
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This