The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Disruption Demands Coordination: Why Secure Communications Solutions Are Key to Disrupting the Illegal Fentanyl Trade

Disruption Demands Coordination: Why Secure Communications Solutions Are Key to Disrupting the Illegal Fentanyl Trade

Introduction The Government of Canada is taking concrete and bold action to strengthen border security and disrupt the illegal fentanyl trade. It has announced an investment of $1.3 billion to enhance operations. The funding will support hiring additional personnel and purchasing advanced technology and equipment. This includes state-of-the-art ...
Failure Isn’t an Option Says CISO at Amazon

Failure Isn’t an Option Says CISO at Amazon

Security teams must move faster because attackers already are, according to Amazon’s CISO, CJ Moses. His key tenet is to cut the friction, build the right systems, and make security so seamless that nobody has to think twice. “If you make someone’s job easier AND more secure, they’ll do it,” Moses comments. ✔️ Stop begging engineers ✔️ Stop ...
Shifting the Burden of ID Crime From Victims to Institutions

Shifting the Burden of ID Crime From Victims to Institutions

As Australia’s digital economy deepens its reliance on data, the stakes are rising for both consumers and organisations. Identity crime can no longer be treated as an unfortunate by-product of cyber incidents; it is a systemic risk demanding systemic solutions.
“Trust Is Built in a Day,” Said No One Ever – Especially Danielle Sheer, Chief Trust Officer at Commvault

“Trust Is Built in a Day,” Said No One Ever – Especially Danielle Sheer, Chief Trust Officer at Commvault

Nothing is more exciting than when companies throw around terms, and the operative term at the moment is trust. There’s a public perception that trust is fluffy, but it's more than that, says Chief Trust Officer at Commvault, Danielle Sheer. “Just because you say it doesn’t mean you have it,” Sheer fires off. Trust amongst other buzz words are the ...
Avoiding Security Operation Chokepoints

Avoiding Security Operation Chokepoints

Introduction Security operations often become inadvertent chokepoints. When every vendor relationship triggers an extensive security review, and teams rely on spreadsheets and email chains to gather responses, progress grinds to a halt. For resource‑constrained organisations, particularly in the fintech, SaaS and technology spaces, these bottlenecks ...
2026 Predictions: The Year Identity Becomes the Ultimate Control Point for an Autonomous World

2026 Predictions: The Year Identity Becomes the Ultimate Control Point for an Autonomous World

Jeffrey Kok, Vice President, Solution Engineers, Asia Pacific & Japan at CyberArk shares his 2026 predictions for the cybersecurity industry - outlining why identity and innovation in governance will be key to organisational survival as organisations face the risks of autonomous AI agents and shrinking certificate lifespans.
Hybrid Mesh Security in the Age of AI and Ransomware

Hybrid Mesh Security in the Age of AI and Ransomware

By adopting hybrid mesh security principles and embracing AI-enhanced controls, security leaders can effectively disrupt the sophisticated ransomware attack chain and establish resilient, future-proof defences against the evolving threats of the digital age.
Why 9 in 10 IT Teams Overestimate Their Operational Resilience

Why 9 in 10 IT Teams Overestimate Their Operational Resilience

Australian IT leaders report strong confidence in their organisation’s resilience — yet the SolarWinds 2025 IT Trends Report shows a more complicated reality. While most believe they can withstand today’s demands, that confidence drops when facing challenges like AI adoption, cyber threats, or evolving regulations such as CPS 230. Nearly half of IT ...
No results found.

In the News

ESET Launches eCrime Reports to Give Security Teams a Strategic Edge Against Modern Cybercriminal Groups

ESET Launches eCrime Reports to Give Security Teams a Strategic Edge Against Modern Cybercriminal Groups

ESET’s standalone eCrime reports provide security teams with curated, high‑quality insights into incidents, including key lessons, IoCs, hunting rules, and guidance to strengthen resilience | ESET Threat Intelligence eCrime Reports deliver a clear, operational view into real-world intrusions and uncover hidden clusters of activity, including TTPs and ...
Cloudflare Partners With Wiz to Secure the Global AI Attack Surface, Eliminating Blind Spots Caused by Shadow AI

Cloudflare Partners With Wiz to Secure the Global AI Attack Surface, Eliminating Blind Spots Caused by Shadow AI

New integration gives organisations a clear path from identifying AI risks to stopping attacks in real-time 
Tenable Expands Exposure Management With Instant OT Discovery to Secure Cyber-Physical Systems

Tenable Expands Exposure Management With Instant OT Discovery to Secure Cyber-Physical Systems

New asset discovery engine significantly accelerates AI-powered exposure management maturity
AI Emerges as the Key to Scaling MSP Operations as Growth Gets Harder

AI Emerges as the Key to Scaling MSP Operations as Growth Gets Harder

Kaseya’s 2026 State of the MSP Report finds 48% of MSPs rank AI as the number one client need, while shrinking deals and a widening talent gap make AI-driven efficiency essential to protecting margins.
Claroty Bridges Gap Between Asset Visibility and Actionable Risk Reduction With Industry-First Visibility Orchestration Capabilities

Claroty Bridges Gap Between Asset Visibility and Actionable Risk Reduction With Industry-First Visibility Orchestration Capabilities

Claroty xDome’s New Visibility Orchestration Transforms Incomplete Asset Data into Prioritised Security Actions for Complex Cyber-Physical Systems Environments
WatchGuard and Halo Announce Partnership to Deliver MSP Automation From Alert to Invoice

WatchGuard and Halo Announce Partnership to Deliver MSP Automation From Alert to Invoice

Integration embeds WatchGuard security operations inside HaloPSA, streamlining ticketing, provisioning, and billing workflows for MSPs 
Kyndryl Introduces Sovereignty Readiness Assessment and Solutioning to Support Business Continuity

Kyndryl Introduces Sovereignty Readiness Assessment and Solutioning to Support Business Continuity

New sovereignty services help organisations identify dependencies, risks and options to support continuity across complex IT environments
Commvault Targets AI Risk With New Platform Capabilities for Governance, Recovery and Control

Commvault Targets AI Risk With New Platform Capabilities for Governance, Recovery and Control

Commvault has launched a new set of AI-driven capabilities aimed at helping organisations adopt agentic AI while maintaining control over data, governance, and cyber resilience. Delivered through Commvault Cloud, the new offerings—Data Activate, AI Protect, and AI Studio—are designed to address one of the biggest challenges facing enterprises today: ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This