The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

No Breach Doesn’t Mean No Risk: Rethinking Cybersecurity Metrics in the Boardroom

No Breach Doesn’t Mean No Risk: Rethinking Cybersecurity Metrics in the Boardroom

“Measuring peace by the absence of war is a flawed benchmark, so is judging cybersecurity solely by a lack of incidents.” In boardrooms across industries, directors increasingly grapple with one of the most misunderstood performance indicators in modern governance: cybersecurity effectiveness. At first glance, it’s tempting to celebrate a spotless ...
Enhancing Software Development the EveryOps Way

Enhancing Software Development the EveryOps Way

Software has become the undisputed driver of business today. As the reliance on software has grown, so have the moving parts needed to make it, especially amid the rise of generative artificial intelligence (GenAI). As a result, software development has become a complex process, potentially hampering innovation.  According to Deloitte, GenAI usage ...
Why Agentic Automation Is the Next Evolution in Advanced Manufacturing

Why Agentic Automation Is the Next Evolution in Advanced Manufacturing

Policy efforts like Future Made in Australia emphasise a renewed national commitment to rebuilding sovereign capability and invigorating advanced manufacturing. One of the most promising developments enabling this shift is agentic automation – a new frontier in intelligent enterprise automation that is already beginning to reshape how leading ...
The Blur Between Cloud, OT, and Critical Infrastructure

The Blur Between Cloud, OT, and Critical Infrastructure

Cordant’s DevSecOops podcast brings together trio Tom, Scott, and James for what turned into a timely, thoughtful discussion about the intersections of cloud technology, operational technology (OT), and critical infrastructure. With recent news out of the US and Australia about the US regulatory crackdown on Chinese smart vehicle tech due to ...
Shaping The Future Of AI: How Australia’s National AI Capability Plan Sets The Stage For Ethical And Secure AI Adoption

Shaping The Future Of AI: How Australia’s National AI Capability Plan Sets The Stage For Ethical And Secure AI Adoption

As artificial intelligence (AI) continues to revolutionise industries worldwide, its rapid advancement brings both vast opportunities and significant responsibilities. AI has the potential to transform sectors like healthcare, finance, manufacturing, and education, driving innovation and efficiency in unprecedented ways. However, as AI becomes embedded ...
How a Veteran Project Manager Tames Cyber Chaos

How a Veteran Project Manager Tames Cyber Chaos

Recently, on DevSecOops podcast; Hosts Tom Walker, James Vincent, and Scott Fletcher bring on a special guest, Natalie Haslam, an industry veteran with 25 years of project management experience within traditional IT, application development, and more recently, cybersecurity. Natalie’s reflection on the challenges of delivering cyber projects in the ...
What in the Cloud?

What in the Cloud?

DevSecOops podcast hosts Tom Walker, James Vincent, and Scott Fletcher debate which cloud platform reigns supreme. Choosing between major cloud providers can get overwhelming. The three Co-Hosts set aside their usual neutrality to champion AWS (Amazon Web Services), Microsoft Azure, and Oracle Cloud Infrastructure (OCI), diving deep into what each ...
How Analysing 700,000 Security Incidents Helped Our Understanding of Living Off the Land Tactics

How Analysing 700,000 Security Incidents Helped Our Understanding of Living Off the Land Tactics

This article shares initial findings from internal Bitdefender Labs research into Living off the Land (LOTL) techniques. Our team at Bitdefender Labs, comprised of hundreds of security researchers with close ties to academia, conducted this analysis as foundational research during the development of our GravityZone Proactive Hardening and Attack ...
No results found.

In The News

DriveSavers Partners with Computer Troubleshooters Australia to Provide Industry-Leading Data Recovery and Ransomware Response Services

DriveSavers Partners with Computer Troubleshooters Australia to Provide Industry-Leading Data Recovery and Ransomware Response Services

Melbourne, October 7, 2025 – In an era marked by rising cyber threats and growing data loss incidents, DriveSavers has officially announced a strategic partnership with Computer Troubleshooters Australia, one of the country’s most trusted IT franchise service networks. With a focus on servicing the small-to-medium business market this collaboration ...
Quorum Cyber Is A Proud Participant In The Microsoft Sentinel Partner Ecosystem

Quorum Cyber Is A Proud Participant In The Microsoft Sentinel Partner Ecosystem

Quorum Cyber is working with Microsoft product teams to shape Sentinel product development, including validation of new scenarios, feedback on product operations, and API extensibility - while also extending Sentinel’s capabilities as part of the partner ecosystem. By creating solutions such as connectors, analytics, playbooks, hunting queries, Jupyter ...
Fastly Recognised as a Gartner® Peer Insights™ Customer’s Choice for Seventh Consecutive Year, Trusted By Customers for Cloud Web Application and API Protection

Fastly Recognised as a Gartner® Peer Insights™ Customer’s Choice for Seventh Consecutive Year, Trusted By Customers for Cloud Web Application and API Protection

Sydney, 3 October 2025 - Fastly, Inc. (NYSE: FSLY), a leader in global edge cloud platforms, has announced that it was named a 2025 Gartner® Peer Insights™ Customers’ Choice for Cloud Web Application and API Protection (WAAP). Fastly received overall high ratings and is the only vendor to earn this recognition for seven consecutive years. The ...
New Infoblox Research Uncovers DNS TXT Abuse in Stealth Malware Campaign Infecting Thousands of Sites

New Infoblox Research Uncovers DNS TXT Abuse in Stealth Malware Campaign Infecting Thousands of Sites

New Infoblox Threat Intel research reveals that a long-running threat actor compromising websites, coined as “Detour Dog,” has evolved from scam redirects to deliver information stealing malware. This allows compromised sites to fetch and relay malicious execution output without any visible cues to the user, all using the domain name system (DNS) for ...
Genetec Continues To Expand Its Share Of The Global Access Control Software Market, According To Latest Omdia Report

Genetec Continues To Expand Its Share Of The Global Access Control Software Market, According To Latest Omdia Report

Company records strong organic market share gain worldwide, reflecting 20 years of access control innovation and rapid adoption of ACaaS solutions
Sophos Launches Advisory Services To Deliver Proactive Cybersecurity Resilience

Sophos Launches Advisory Services To Deliver Proactive Cybersecurity Resilience

Sophos today announced the launch of Sophos Advisory Services, a suite of security testing services designed to identify gaps in organisations’ security programs. These offerings – External Penetration Testing, Internal Penetration Testing, Wireless Network Penetration Testing, and Web Application Security Assessment – help fortify an organisation’s ...
Exabeam Delivers First Configurable Peer Benchmarking for CISO Decision-Making

Exabeam Delivers First Configurable Peer Benchmarking for CISO Decision-Making

New capabilities in the Exabeam Nova Advisor Agent and Outcomes Navigator operationalise benchmarking for proactive security operations
Ping Identity Survey Reveals Australian Consumer Trust Plummeting as Security Concerns Soar

Ping Identity Survey Reveals Australian Consumer Trust Plummeting as Security Concerns Soar

With only 20% confident in spotting scams, Australians demand stronger AI security and regulation
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This