The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Caught in the Middle – How Diverse Cyber Laws Affect Global Organisations

Caught in the Middle – How Diverse Cyber Laws Affect Global Organisations

Regulatory fragmentation has become one of the most pressing yet overlooked concerns for global organisations, particularly as governments introduce differing cybersecurity laws. The issue lies not in the creation per se, but in the fact that these rules and regulations are developed in silos. Every country has its own perspective, shaped by the ...
Overcoming the Security Risks of Using AI In Software Development

Overcoming the Security Risks of Using AI In Software Development

Development teams face relentless pressure to deliver, yet they must continue to prioritise building secure, high-quality software. Leaders play a crucial role in reinforcing how a Secure by Design approach, supported by observability, benchmarking, and ongoing education, directly enhances code quality. By embedding these practices, organisations can ...
Speed, Identity, and AI: Redefining Cybersecurity for Australian Organisations

Speed, Identity, and AI: Redefining Cybersecurity for Australian Organisations

Speed, Identity, and AI: Redefining Cybersecurity for Australian Organisations Cybersecurity teams have always grappled with emerging technologies, increasingly sophisticated attacks and new regulations. However, as organisations accelerate AI and cloud adoption, digitise services, and adapt to evolving compliance regulations, security challenges ...
How to Invest in AI to Overcome the Challenges of Identity-based Security

How to Invest in AI to Overcome the Challenges of Identity-based Security

AI is reshaping what’s possible when it comes to protecting organisations against identity-based attacks. By offering prescriptive recommendations on how to harden identity security, together with advanced detection of evolving threats, organisations can improve their ability to operate now and into the future.
How One Vendor Breach Becomes a Global Risk

How One Vendor Breach Becomes a Global Risk

Today, businesses run on an invisible thread: supply chain. It links industries and consumers through numerous pathways, whether physical or digital. From ports to airlines to healthcare and finances, organisations rely on these networks to operate efficiently and at scale. But here’s the catch, recent events revealed that the same interdependence and ...
How Drawing On The Power Of AI Technology Can Help Your Institution Stay A Step Ahead Of Scammers And Fraudsters In 2026

How Drawing On The Power Of AI Technology Can Help Your Institution Stay A Step Ahead Of Scammers And Fraudsters In 2026

Shielding customers from scams and fraud and providing a safe online experience is paramount. Institutions that fail to do so will find themselves punished financially and reputationally, as regulators continue to bear down and consumers and businesses take their accounts elsewhere.
Resilience, Not Just Compliance: A Zero Trust Perspective for Federal Cybersecurity

Resilience, Not Just Compliance: A Zero Trust Perspective for Federal Cybersecurity

Introduction For decades, cybersecurity in government has been defined by a familiar cycle: secure the perimeter, block the intruders, respond to the audits. That model no longer works. As adversaries grow more sophisticated and resources remain tight, the federal community needs a new mindset. Prevention still matters, but resilience must come ...
Breaking the Mold: How the CISO Role Has Outgrown Its Technical Roots

Breaking the Mold: How the CISO Role Has Outgrown Its Technical Roots

​Recently on the DevSecOops podcast, hosts Tom Walker and Scott Fletcher sat down with George Abraham, CISO at Influx, to discuss the changing nature of cybersecurity leadership, the human challenges of leading teams, and the complex security risks emerging from new technologies. George began with a note that cybersecurity careers rarely follow a ...
No results found.

In The News

VAST Data Unveils a Platform for Secure, Trusted, and Self-Learning Agentic AI Systems

VAST Data Unveils a Platform for Secure, Trusted, and Self-Learning Agentic AI Systems

VAST Data has announced the VAST Data PolicyEngine and VAST Data TuningEngine, two new computing services that will allow the next generation of the VAST AI Operating System to deliver key requirements for organisations looking to scale their mission-critical AI initiatives. Specifically, PolicyEngine and TuningEngine work in tandem within the VAST ...
DroneShield Secures $21.7M Western Military Contracts

DroneShield Secures $21.7M Western Military Contracts

DroneShield Limited (ASX:DRO) has announced that it has received a package of six standalone contracts for $21.7 million from an in-country reseller for delivery to a western military end-customer. The contracts are for the supply of dismounted counter-drone systems, spare kits, and software subscriptions. All items ae readily available from ...
VAST Data Introduces End-to-End Fully Accelerated AI Data Stack with NVIDIA

VAST Data Introduces End-to-End Fully Accelerated AI Data Stack with NVIDIA

Today at VAST Forward 2026, VAST Data, the AI Operating System company, announced an end-to-end, fully CUDA accelerated AI data stack, delivered through an expanded collaboration with NVIDIA. With the VAST AI Operating System now running directly on NVIDIA-powered servers, customers can eliminate data bottlenecks across the AI pipeline and deliver ...
CIOs Accelerate AI-Driven Transformation Amid Rising Threat Complexity

CIOs Accelerate AI-Driven Transformation Amid Rising Threat Complexity

New report finds just 20 per cent of CIOs feel highly effective at defending against AI-enabled adversaries  February 26, 2026 – LevelBlue, the world’s largest pure-play provider of managed security services, has released Persona Spotlight: CIO (Chief Information Officer), the latest report in its ongoing research examining how technology leaders ...
New Malicious npm Package Highlights the Speed at Which Supply Chain Risks Propagate

New Malicious npm Package Highlights the Speed at Which Supply Chain Risks Propagate

Tenable Research investigated a malicious package in the npm public registry named “amber-src” that underscores the rapid nature of modern supply chain attacks. The package, which was downloaded approximately 50,000 times before its removal, was designed to mimic a popular package “ember-source”, to infect developers’ systems across Windows, macOS, and ...
WatchGuard Marks 30 Years of Setting the MSP Security Standard

WatchGuard Marks 30 Years of Setting the MSP Security Standard

Cybersecurity leader has helped MSPs reduce complexity, scale protection, and profitably grow through every market shift  SYDNEY – February 25, 2026 — WatchGuard® Technologies, a global leader in unified cybersecurity for managed service providers (MSPs), celebrates 30 years this month of helping MSPs protect businesses through every era of threat ...
Firmus Technologies Group Selects VAST AI Operating System to Power Sovereign, Energy-Efficient AI Factories in Asia Pacific

Firmus Technologies Group Selects VAST AI Operating System to Power Sovereign, Energy-Efficient AI Factories in Asia Pacific

VAST Data today announced that Firmus Technologies Group, an AI infrastructure specialist founded in Australia with operations across Asia Pacific, has selected the VAST AI Operating System as a foundational data layer for its next generation of sovereign, energy-efficient AI factories.   Firmus, a NVIDIA Cloud Partner (NCP), is building ...
2026 CrowdStrike Global Threat Report: AI Accelerates Adversaries and Reshapes the Attack Surface

2026 CrowdStrike Global Threat Report: AI Accelerates Adversaries and Reshapes the Attack Surface

AI-enabled attacks surge 89% as breakout time falls to 29 minutes; AI tools and development platforms are actively exploited
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This