The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Avoiding Security Operation Chokepoints
Introduction
Security operations often become inadvertent chokepoints. When every vendor relationship triggers an extensive security review, and teams rely on spreadsheets and email chains to gather responses, progress grinds to a halt. For resource‑constrained organisations, particularly in the fintech, SaaS and technology spaces, these bottlenecks ...

2026 Predictions: The Year Identity Becomes the Ultimate Control Point for an Autonomous World
Jeffrey Kok, Vice President, Solution Engineers, Asia Pacific & Japan at CyberArk shares his 2026 predictions for the cybersecurity industry - outlining why identity and innovation in governance will be key to organisational survival as organisations face the risks of autonomous AI agents and shrinking certificate lifespans.

Hybrid Mesh Security in the Age of AI and Ransomware
By adopting hybrid mesh security principles and embracing AI-enhanced controls, security leaders can effectively disrupt the sophisticated ransomware attack chain and establish resilient, future-proof defences against the evolving threats of the digital age.

Why 9 in 10 IT Teams Overestimate Their Operational Resilience
Australian IT leaders report strong confidence in their organisation’s resilience — yet the SolarWinds 2025 IT Trends Report shows a more complicated reality. While most believe they can withstand today’s demands, that confidence drops when facing challenges like AI adoption, cyber threats, or evolving regulations such as CPS 230. Nearly half of IT ...

Cybersecurity in Manufacturing: Why It’s More Important Now Than Ever
Manufacturing has always depended on stable operations. That used to mean keeping machines running, maintaining quality, and hitting delivery schedules. Today it also means defending the environment from attacks that can shut down production, corrupt data, or compromise customer trust. Plants are now connected in ways they weren’t ten years ago, and ...

AI to Supercharge Cyber Threats Across Australia
AI is fundamentally changing the economics of cyberattacks in Australia. Adversaries are no longer scaling through the workforce, but rather through automation. Leaders can’t rely on human-paced defences in a machine-paced threat environment.
Here are the top security trends to watch out for in 2026 and beyond:
Compressed Attack Timelines Due to ...

Why Fighting Fraud Requires a Real-time Foundation
Introduction
Australia is fast becoming a hotspot for AI-generated cybercrime. Risks that were once theoretical are now costing businesses millions, even as security teams deploy advanced analytics, AI, and new approaches to keep pace.
Consider this case in 2024. A finance employee in Hong Kong wired US$25 million during what appeared to be a ...

‘Tis the Season to Stay Secure: Safeguarding Your Business This Festive Period
This holiday shopping season can make or break many Australian businesses. While consumers are shopping for bargains, attackers are searching for vulnerabilities.
The surge in shopping traffic during Black Friday, Cyber Monday and Christmas sales provides cybercriminals with the perfect cover to launch scams and fraud campaigns, exploiting the rise ...
No results found.
In the News
Organisations Overlook AI Risk as Governance Fails to Keep Up
TrendAI™ research reveals pressure to deploy AI for business speed is outpacing control, visibility and accountability
Mandiant Report – Why Identity and Cloud Missteps Are Fuelling Australia’s Next Wave of Cyber Attacks
Australian organisations are facing a subtle but significant shift in cyber risk — one where attackers no longer need to break in, because they can simply log in.
According to the latest M-Trends report from Google Cloud’s Mandiant division, the global threat landscape is being reshaped by a combination of credential theft, cloud misconfigurations and ...
ESET Launches Cloud Workload Protection and AI Enhancements for ESET PROTECT Customers
● ESET to protect cloud virtual machines (VMs) from advanced threats with its new ESET Cloud Workload Protection module.
● While competitors often offer cloud workload protection as a stand-alone offering, ESET includes it at no additional cost for ESET PROTECT customers.
● Other updates include advanced AI reporting for ESET’s cloud sandboxing ...
DigiCert Releases Latest Tools to Secure Digital Documents and Mitigate AI Fraud
Updates to Document Trust Manager streamline signing and centralise key management
Tanium Accelerates Autonomous IT With AI and Security Innovations
New platform capabilities unveiled at RSAC 2026 conference span Security Operations, Exposure Management and Endpoint Management – driven by AI and real-time intelligence
CrowdStrike Launches the Charlotte AI AgentWorks Ecosystem for Building Secure Agents
Collaboration partners including Accenture, AWS, Anthropic, Deloitte, Kroll, NVIDIA, OpenAI, Salesforce, and Telefónica Tech accelerate agentic SOC transformation for customers with CrowdStrike’s no-code security agent development platform
WatchGuard Expands NDR Capabilities, Making Advanced Network Threat Detection Practical for MSPs and Midmarket Organisations
SYDNEY – 26 March, 2026: WatchGuard® Technologies, a global leader in unified cybersecurity for MSPs, today announced new WatchGuard NDR for Firebox, Managed NDR and Total NDR offerings for organisations to easily deploy and scale AI-powered threat detection that uncovers, investigates and contains malicious activity without added complexity. This ...
Geopolitical Tensions Drive Sustained Surge in Cyber Attacks
Bitdefender has today released new research revealing that cyber attacks linked to geopolitical conflict are escalating in both volume and sophistication, with a 130% increase in phishing and malware campaigns targeting Gulf countries following the recent escalation involving Iran, Israel and the United States.
The research shows a clear inflection ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
