The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Shifting the Burden of ID Crime From Victims to Institutions

Shifting the Burden of ID Crime From Victims to Institutions

As Australia’s digital economy deepens its reliance on data, the stakes are rising for both consumers and organisations. Identity crime can no longer be treated as an unfortunate by-product of cyber incidents; it is a systemic risk demanding systemic solutions.
“Trust Is Built in a Day,” Said No One Ever – Especially Danielle Sheer, Chief Trust Officer at Commvault

“Trust Is Built in a Day,” Said No One Ever – Especially Danielle Sheer, Chief Trust Officer at Commvault

Nothing is more exciting than when companies throw around terms, and the operative term at the moment is trust. There’s a public perception that trust is fluffy, but it's more than that, says Chief Trust Officer at Commvault, Danielle Sheer. “Just because you say it doesn’t mean you have it,” Sheer fires off. Trust amongst other buzz words are the ...
Avoiding Security Operation Chokepoints

Avoiding Security Operation Chokepoints

Introduction Security operations often become inadvertent chokepoints. When every vendor relationship triggers an extensive security review, and teams rely on spreadsheets and email chains to gather responses, progress grinds to a halt. For resource‑constrained organisations, particularly in the fintech, SaaS and technology spaces, these bottlenecks ...
2026 Predictions: The Year Identity Becomes the Ultimate Control Point for an Autonomous World

2026 Predictions: The Year Identity Becomes the Ultimate Control Point for an Autonomous World

Jeffrey Kok, Vice President, Solution Engineers, Asia Pacific & Japan at CyberArk shares his 2026 predictions for the cybersecurity industry - outlining why identity and innovation in governance will be key to organisational survival as organisations face the risks of autonomous AI agents and shrinking certificate lifespans.
Hybrid Mesh Security in the Age of AI and Ransomware

Hybrid Mesh Security in the Age of AI and Ransomware

By adopting hybrid mesh security principles and embracing AI-enhanced controls, security leaders can effectively disrupt the sophisticated ransomware attack chain and establish resilient, future-proof defences against the evolving threats of the digital age.
Why 9 in 10 IT Teams Overestimate Their Operational Resilience

Why 9 in 10 IT Teams Overestimate Their Operational Resilience

Australian IT leaders report strong confidence in their organisation’s resilience — yet the SolarWinds 2025 IT Trends Report shows a more complicated reality. While most believe they can withstand today’s demands, that confidence drops when facing challenges like AI adoption, cyber threats, or evolving regulations such as CPS 230. Nearly half of IT ...
Cybersecurity in Manufacturing: Why It’s More Important Now Than Ever

Cybersecurity in Manufacturing: Why It’s More Important Now Than Ever

Manufacturing has always depended on stable operations. That used to mean keeping machines running, maintaining quality, and hitting delivery schedules. Today it also means defending the environment from attacks that can shut down production, corrupt data, or compromise customer trust. Plants are now connected in ways they weren’t ten years ago, and ...
AI to Supercharge Cyber Threats Across Australia

AI to Supercharge Cyber Threats Across Australia

AI is fundamentally changing the economics of cyberattacks in Australia. Adversaries are no longer scaling through the workforce, but rather through automation. Leaders can’t rely on human-paced defences in a machine-paced threat environment.  Here are the top security trends to watch out for in 2026 and beyond: Compressed Attack Timelines Due to ...
No results found.

In the News

WatchGuard Disrupts Endpoint Pricing to Give MSPs Competitive Edge 

WatchGuard Disrupts Endpoint Pricing to Give MSPs Competitive Edge 

Enterprise-grade product features, combined with agile and aggressive licensing model, offer MSPs maximum agility in competitive Endpoint Detection and Response (EDR) market 
LevelBlue Research Finds CTOs Push for Enterprise Alignment as Human Factors Undermine Cyber Resilience

LevelBlue Research Finds CTOs Push for Enterprise Alignment as Human Factors Undermine Cyber Resilience

New report finds 75 per cent of CTOs say unclear ownership impairs cyber resilience strategy 
Nutanix to Extend Nutanix Agentic AI, Empowering Neoclouds to Deliver Higher Value AI Services

Nutanix to Extend Nutanix Agentic AI, Empowering Neoclouds to Deliver Higher Value AI Services

Designed to complement AI infrastructure automation and AI platform services with a new multitenant and AI management portal Will enable secure, governed self-service consumption by AI engineers and agentic AI developers
New Darktrace Research Shows Evolution of Chinese-Nexus Cyber Operations Into Long-Term Strategic Statecraft, Centered on Critical Infrastructure

New Darktrace Research Shows Evolution of Chinese-Nexus Cyber Operations Into Long-Term Strategic Statecraft, Centered on Critical Infrastructure

• 88% of observed incidents targeted organizations in critical infrastructure sectors, including transportation, telecommunications, healthcare, and manufacturing. • Nearly 63% of compromises began with exploitation of internet-facing systems, reinforcing the risk of exposed digital infrastructure. • Over half of observed activity impacted Western ...
Qualys TRU Research Finds Manual Remediation Can’t Keep up as Exploitation Hits ‘Negative One Day’

Qualys TRU Research Finds Manual Remediation Can’t Keep up as Exploitation Hits ‘Negative One Day’

Qualys, Inc. (NASDAQ: QLYS), a leading provider of cloud-based IT, security and compliance solutions, today released a new research report, The Broken Physics of Remediation, revealing how exploitation timelines are outpacing human-scale remediation, and why traditional patch metrics can no longer describe true business exposure. Conducted by the ...
GigaOm Names Check Point Software a Leader and Fast Mover in Application and API Security

GigaOm Names Check Point Software a Leader and Fast Mover in Application and API Security

Check Point WAF recognised for industry‑leading detection and a unified platform that protects modern web and AI‑driven applications with simplicity and speeds
Commvault Extends Enterprise Resilience to Structured and AI Data With Real-Time Governance Controls

Commvault Extends Enterprise Resilience to Structured and AI Data With Real-Time Governance Controls

Sydney, Australia – April 2026 – Commvault (NASDAQ: CVLT), a leader in unified resilience at enterprise scale, today announced an expansion of its data and AI security capabilities within Commvault Cloud, enabled through its recent acquisition of Satori. The enhancements extend data discovery, classification and risk assessment into structured data ...
Genetec Highlights Why Governance Defines Secure Cloud Adoption in Enterprise Physical Security

Genetec Highlights Why Governance Defines Secure Cloud Adoption in Enterprise Physical Security

Sydney, April 7, 2026 — Genetec Inc. (“Genetec”), the global leader in enterprise physical security software, is highlighting a disconnect between cloud adoption models in physical security and the governance and operational demands of large enterprises. Large organisations need to approach cloud adoption through the lens of governance, risk ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This