The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Why AWS Security Is the Middleman, Which Is What Regulators Need
Regulators want certainty. Engineers want velocity. Cloud providers are expected to satisfy both simultaneously, globally, and at scale. Tough job, but not for Mark Ryland, Director of Security at AWS.
Ryland's day to day to role is being the intermediate between all parties to ensure things get done and to make it happen. The function is underpinned ...

Can AI Ever Really Outpace AI-Powered Cyberattacks?
Introduction
There's this question that keeps coming up in cybersecurity circles, and honestly, it feels a bit like asking whether we can outrun our own shadow. Can defensive AI actually stay ahead of AI-powered attacks? The short answer is probably not in any permanent way, but that doesn't mean we're doomed to lose this fight.
The thing about AI ...
Putting Your Money Where Your Money Is
Introduction
Fintech companies occupy a unique position at the intersection of finance and technology. They handle extremely sensitive customer information, personal identities, payment data, transaction histories, and therefore represent a high‑value target for cyber‑criminals. In the Asia‑Pacific region, nearly 80 percent of executives anticipate ...

ISACA Sydney Conference 2025 – Event Recap
Overview
Walking into the ISACA Sydney Chapter Conference as “the student voice”, I knew I was surrounded by some of the heaviest hitters in cyber, audit and technology leadership. My job for the day was simple but huge: ask the questions students and early-career professionals are scared to ask and bring those answers back to our community.
By the ...

Kaseya Connect APAC 2025 – Event Recap
Introduction
Kaseya Connect APAC 2025 delivered a message that went beyond product releases: MSP cybersecurity is entering an era where resilience, automation and identity-level defences matter more than point solutions. While most coverage will focus on the Datto SIRIS 6 appliance and Kaseya’s acquisition of INKY, what stood out inside the rooms at ...

Disruption Demands Coordination: Why Secure Communications Solutions Are Key to Disrupting the Illegal Fentanyl Trade
Introduction
The Government of Canada is taking concrete and bold action to strengthen border security and disrupt the illegal fentanyl trade. It has announced an investment of $1.3 billion to enhance operations. The funding will support hiring additional personnel and purchasing advanced technology and equipment. This includes state-of-the-art ...

Failure Isn’t an Option Says CISO at Amazon
Security teams must move faster because attackers already are, according to Amazon’s CISO, CJ Moses.
His key tenet is to cut the friction, build the right systems, and make security so seamless that nobody has to think twice.
“If you make someone’s job easier AND more secure, they’ll do it,” Moses comments.
✔️ Stop begging engineers
✔️ Stop ...

Shifting the Burden of ID Crime From Victims to Institutions
As Australia’s digital economy deepens its reliance on data, the stakes are rising for both consumers and organisations. Identity crime can no longer be treated as an unfortunate by-product of cyber incidents; it is a systemic risk demanding systemic solutions.
No results found.
In the News
BeyondTrust’s 13th Annual Microsoft Vulnerabilities Report Reveals Drop in Total Volume, but Surge in Critical Risk
Critical vulnerabilities doubled year-over-year, signalling rising risk severity as AI-driven discovery and expanding attack surfaces reshape the Microsoft security landscape | Elevation of Privilege vulnerabilities accounted for 40% of all flaws, continuing to dominate threat actor pathways and reinforcing identity as the primary attack vector | Azure ...
Companies Rushing to Scale AI Are Running Into Operational Limits, DataDog Report Finds
Nearly 1 in 20 AI requests fail in production as capacity limits become the primary bottleneck to scaling AI reliably
Elastic Delivers First Embedded AI Experiences for Observability and Security Inside Third-Party AI Tools
MCP Apps bring Elastic’s security and observability workflows into third-party AI tools, enabling teams to act on data directly where they work, with additional capabilities for search and data exploration
Snowflake Expands Snowflake Intelligence and Cortex Code to Power the Control Plane for the Agentic Enterprise
Snowflake Intelligence transforms how business users turn insights into action through a personalised, context-aware AI agent grounded in enterprise data, while Cortex Code enables builders to move faster from code to production with AI-powered development across systems, tools, or environments
DroneShield Quarterly Activities/Appendix 4c Cash Flow Report
DroneShield Limited (ASX:DRO) has released its business update and Appendix 4C for the three-month period ended 31 March 2026 (1Q2026).
The Company started 2026 with strong momentum, delivering the highest ever customer cash receipts in a quarter and the second‑highest revenue in a quarter. These results continue the positive trajectory from 2025, ...
Entrust Expands Identity Verification to Support Australia’s AML/CTF Reforms
Australia’s evolving Anti-Money Laundering and Counter-Terrorism Financing (AML/CTF) framework is reshaping how organisations approach identity verification.
With Tranche 2 reforms set to extend compliance obligations across new industries, businesses are under increasing pressure to strengthen customer due diligence processes while maintaining ...
CrowdStrike Accelerates SMB Cybersecurity Transformation Across JAPAC With Expanded Distributor-Led Services
Expanded go-to-market empowers distributors to recruit and onboard MSSPs, increasing SMBs access and adoption of the Falcon platform
Research Reveals “Trust Gap” Threatening Agentic AI Adoption: 66% of Organisations Say Real-Time Data Is Non-Negotiable
New Global Study of 850 Executives Also Finds That Fragmented Data Sources and Lack of Governance Are Stalling the Shift from AI Insights to AI Action
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
- 353
- 354
- 355
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
