The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Hidden Cost of Cybersecurity Inefficiency

The Hidden Cost of Cybersecurity Inefficiency

Leaders must rethink how their teams manage data, automate response and validate defences. Consolidating platforms, investing in real-time analytics, and embedding AI into workflows can deliver both faster protection and meaningful cost reduction.
There’s No Physical and Cyber, It’s Just ‘Security’

There’s No Physical and Cyber, It’s Just ‘Security’

Christian Morin, Chief Security Officer at Genetec, knows the convergence in this space better than most. The adage of “set and forget” is the norm and the line between physical and cybersecurity blurs with every connected device in the industry as we know it, is shifting. The main question isn’t whether organisations can respond to breaches, but ...
Standing Privilege Is Silent Security Debt Carried by Many Australian Organisations

Standing Privilege Is Silent Security Debt Carried by Many Australian Organisations

By combining JIT, CIEM and ITDR, Australian organisations can drastically minimise their exposure to the risks of stolen credentials, data breaches, and privilege abuse.
Crisis Leadership in Uncertain Times: Why People, Practice, and Policy Matter Most

Crisis Leadership in Uncertain Times: Why People, Practice, and Policy Matter Most

We live in times like we are always on the edge of a crisis. Whether it is due to public health issues, geopolitical instability, economic volatility, or an increase in sophisticated cyber threats, uncertainty has become our constant companion. Effective leadership in this kind of environment is a fundamental shift not just in our leadership ...
Awareness to Action – Building a Culture of Cybersecurity at SMBs

Awareness to Action – Building a Culture of Cybersecurity at SMBs

While large enterprises often have the financial resources and personnel to build robust cyber defences, SMBs are still disproportionately exposed. With tighter budgets and fewer dedicated staff, smaller organisations can find it challenging to prioritise cybersecurity alongside other pressing business needs. Therefore as we progress through 2025, the ...
Why Australia Must Shift From Reactive to Resilient Cybersecurity

Why Australia Must Shift From Reactive to Resilient Cybersecurity

Recent data highlights that the old playbook of manual threat hunting for organisations is over. Traditional defences are no longer effective and organisations need to expand on the ASD's mandate and adopt a new mindset to build true cyber resilience.
Fortinet CISO’s 2026 Cybersecurity Predictions: Artificial Intelligence, Geopolitics, and the New Era of Resilience

Fortinet CISO’s 2026 Cybersecurity Predictions: Artificial Intelligence, Geopolitics, and the New Era of Resilience

CISO predictions for 2026 | Artificial intelligence, geopolitics, and the new era of cyber resilience
The Identity Crisis CISOs Can No Longer Ignore

The Identity Crisis CISOs Can No Longer Ignore

As 2026 budgeting ramps up, CISOs are under renewed pressure to cut costs without compromising security. Boards are demanding measurable ROI, while digital transformation efforts, increasingly driven by AI, continue to accelerate. Yet one critical area remains overlooked. Identity security is too often seen as a technical layer, rather than what it ...
No results found.

In the News

Tanium Autonomous IT Platform Delivered 235% ROI, According to Recent Study

Tanium Autonomous IT Platform Delivered 235% ROI, According to Recent Study

The Total Economic Impact (TEI) of Tanium Autonomous IT study reveals 75% reduction in MTTR, 95% greater workstation patching efficiency and 70% productivity boost by year three with Tanium
ManageEngine Endpoint Central Advances Towards Autonomous Endpoint Security With EDR and Secure Private Access

ManageEngine Endpoint Central Advances Towards Autonomous Endpoint Security With EDR and Secure Private Access

Company Unveils the First Natively Built Platform Combining UEM, Endpoint Security (EPP with EDR), Digital Employee Experience (DEX), and Secure Private Access
Delinea Finds 90% of Australian Organisations Pressure Security Teams to Loosen Identity Controls for AI

Delinea Finds 90% of Australian Organisations Pressure Security Teams to Loosen Identity Controls for AI

New research highlights visibility gaps around AI-driven identities, rising NHI risks, and an AI security confidence paradox 
Rapid7 2026 Global Threat Landscape Report Shows Exploited High and Critical-Severity Vulnerabilities Surged 105% as Attack Timelines Collapsed

Rapid7 2026 Global Threat Landscape Report Shows Exploited High and Critical-Severity Vulnerabilities Surged 105% as Attack Timelines Collapsed

Released today, the Rapid7 2026 Global Threat Landscape Report: Decoding the Accelerated Cyber Attack Cycle, finds that the window between vulnerability disclosure and confirmed exploitation continues to collapse, leaving organisations with dramatically less time to assess risk, prioritise remediation, and contain threats before impact.
NetApp Sets the Game Plan for AI-Ready Data Operations Across Australia and New Zealand

NetApp Sets the Game Plan for AI-Ready Data Operations Across Australia and New Zealand

NetApp’s vision to help organisations like the National Football League (NFL) bring intelligence to their data and reduce IT complexities  
Claroty Announces Cybercriminals Are Increasingly Targeting Global Critical Infrastructure via CPS

Claroty Announces Cybercriminals Are Increasingly Targeting Global Critical Infrastructure via CPS

New research finds cybercriminals are increasingly targeting global critical infrastructure via direct access to cyber-physical systems | Claroty’s Team82 Investigated Hundreds of Politically, Socially Motivated Attacks on Exposed Internet-Facing Devices Including HMI and SCADA Assets
JFrog Unveils Universal MCP Registry, Delivering a Secure System of Record for the AI-Driven Software Supply Chain

JFrog Unveils Universal MCP Registry, Delivering a Secure System of Record for the AI-Driven Software Supply Chain

SYDNEY, Australia. – March 19, 2026 –  JFrog Ltd (Nasdaq: FROG), the Liquid Software company and creators of the JFrog Software Supply Chain Platform, the system of record for software artifacts, binaries, and AI assets, today introduced its JFrog MCP Registry. Expanding on current capabilities in JFrog AI Catalog, the new registry acts as a single ...
UiPath Collaborates With Microsoft to Accelerate Security and Confidence for Automated Workflows

UiPath Collaborates With Microsoft to Accelerate Security and Confidence for Automated Workflows

Integration demonstrates the power of agentic automation and security platforms working together to protect modern enterprises
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This