The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

From Chaos to Command: Secure Communications at Scale for Public Safety

From Chaos to Command: Secure Communications at Scale for Public Safety

Introduction When it comes to public safety, every second counts. If communication breaks down, so does the response - leading to losses in time, coordination, effectiveness, and public trust. During large-scale incidents, a persistent “communications gap” emerges: the critical distance between information being available and that same information ...
Securing Australian Organisations in the Quantum Era

Securing Australian Organisations in the Quantum Era

Australian organisations are under-prepared for the cybersecurity threat of quantum and should take these steps to minimise disruption as the technology takes hold.
Deepfakes are Spiralling Out of Control, But How Far Will It Go?

Deepfakes are Spiralling Out of Control, But How Far Will It Go?

David Wiseman, Vice President of Secure Communications at BlackBerry spoke with me about the increase of deepfakes which are our own voices and countenance that can be fabricated to present like it's us. But its not us. “Anyone’s voice can be deep faked at this point,” warned Wiseman. “Anyone with some basic set of tooling can generate that deep ...
The Hidden Costs To Consider When Selecting A Cyber Security Vendor

The Hidden Costs To Consider When Selecting A Cyber Security Vendor

Evaluating cyber security vendors through the lens of their vulnerability management practices - including frequency, severity, and time-to-patch - is no longer optional. It’s an essential part of any strategic approach to risk mitigation and long-term operational resilience.
The CEO’s Cyber Equation – Can Your Business Outpace the Attacker?

The CEO’s Cyber Equation – Can Your Business Outpace the Attacker?

"It takes years to build trust, but only minutes for a breach to break it." Cybersecurity is no longer only a technical concern. It is a leadership imperative that has a direct impact on trust, reputation, and business survival. Even if your company has never experienced a breach, attackers are continually probing your systems, seeking weaknesses. ...
A CISO’s Love Letter to The Board – Cyber Risk Quantified

A CISO’s Love Letter to The Board – Cyber Risk Quantified

Cybersecurity has a communication problem: CISOs still speak in technical jargon while boards listen for financial impact. This byline reframes cyber risk as a business language of dollars and cents — the true “love language” of executives. Drawing on new research, it argues that risk quantification is the CISO’s secret weapon, shifting the focus from ...
The New Normal – Ransomware as a Service

The New Normal – Ransomware as a Service

Introduction Gone are the days that cyber threats and attacks are the work of elite hackers, or those who have deep coding skills, nation state support, and unique access to high-level tools. In 2025, and accelerating in coming years, it’s disturbingly easy to launch an attack. With ready-made malware or custom code sold on the dark web, anyone ...
Why Measuring The Right Threat Intelligence Metrics Is Key To SOC Success

Why Measuring The Right Threat Intelligence Metrics Is Key To SOC Success

Organisations must detect, investigate, and respond to threats faster than ever. Success depends on measuring the right threat intelligence metrics which are those that can separate meaningful insights from overwhelming noise. For businesses, failing to do so risks reputational damage and financial loss.
No results found.

In The News

Fortinet Expands FortiCNAPP Cloud Risk Management with Network, Data, and Unified Risk Context

Fortinet Expands FortiCNAPP Cloud Risk Management with Network, Data, and Unified Risk Context

New enhancements integrate network security posture, native data security posture management, and runtime validation to help security teams prioritise real-world cloud risk 
Silvus Technologies Unveils StreamCaster MINI 5200 Tactical MANET Radio

Silvus Technologies Unveils StreamCaster MINI 5200 Tactical MANET Radio

Silvus Technologies, a Motorola Solutions company and a global leader in advanced tactical wireless communications, today announced the StreamCaster® MINI 5200 (SM5200). It is Silvus’ smallest, fully featured mobile ad hoc network (MANET) radio, designed to equip ground forces with next-generation mesh networking to securely share voice, video, and ...
DigiCert Named a Leader in IDC MarketScape for Worldwide Certificate Lifecycle Management 2026 

DigiCert Named a Leader in IDC MarketScape for Worldwide Certificate Lifecycle Management 2026 

Sydney, AUSTRALIA -- January 28, 2026 — DigiCert, a global leader in intelligent trust, today announced that the company has been named a Leader in the IDC MarketScape: Worldwide Certificate Lifecycle Management (CLM) Vendor Assessment (doc #US52990725, January 2026).  The recognition highlights DigiCert’s leadership in helping organisations ...
Achieving Remote Code Execution on n8n Via Sandbox Escape – CVE-2026-1470 & CVE-2026-0863

Achieving Remote Code Execution on n8n Via Sandbox Escape – CVE-2026-1470 & CVE-2026-0863

The JFrog Security Research team recently discovered and disclosed two vulnerabilities in n8n’s sandbox mechanism: CVE-2026-1470, rated 9.9 Critical, impacting the expression evaluation engine, and CVE-2026-0863, rated 8.5 High, affecting Python execution in the Code node (“Internal” mode). n8n is a popular AI workflow automation platform that ...
Tenable Extends Exposure Management to AI Attack Surface

Tenable Extends Exposure Management to AI Attack Surface

Tenable One unifies AI discovery, protection and governance within a single exposure management platform
Cythera Appoints Industry Leader Jason Whyte as Managing Director to Drive Australian Expansion and Group Integration

Cythera Appoints Industry Leader Jason Whyte as Managing Director to Drive Australian Expansion and Group Integration

MELBOURNE, AUSTRALIA — January 27, 2026 — Cythera, a leading Australian cybersecurity provider and a Bastion Group company, today announced the appointment of Jason Whyte as Managing Director for Australia. In this pivotal role, Whyte will oversee the group’s overall Australian operations, including the strategic integration of Seamless Intelligence ...
Tecala Strengthens Cyber Security Leadership with Microsoft Solutions Partner Designation for Security and Expanded ISO 27001:2022 Certification

Tecala Strengthens Cyber Security Leadership with Microsoft Solutions Partner Designation for Security and Expanded ISO 27001:2022 Certification

Sydney, 27 January 2026 - Leading technology service provider, Tecala, today announced that the company has achieved two significant security milestones that reinforce its position as one of Australia’s most trusted technology partners. The company has been awarded the Microsoft Solutions Partner Designation for Security and successfully completed ...
Genetec Outlines Data Privacy Best Practices For Physical Security Teams Ahead Of Data Protection Day

Genetec Outlines Data Privacy Best Practices For Physical Security Teams Ahead Of Data Protection Day

Recommendations help organisations safeguard sensitive data while maintaining effective security operations
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This