The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

How Wargaming is Shaping Business Resilience and Cyber Security Strategies
Once the preserve of military strategy rooms and war colleges, wargaming is now being used across government, critical infrastructure, and enterprise to build clarity in the face of uncertainty. Nowhere is this more urgent than in cyber security and business resilience, where the cost of guessing wrong can be catastrophic.

Five Essential Factors to Future-Proof Physical Access Control Systems
As digital and physical workplaces continue to converge, Australian organisations face challenges with maintaining the safety of both work environments. For example, while an abundance of cloud-based services and AI agents makes updating security systems faster and easier than ever, many physical access control solutions (PACS) may struggle to ...

Fortifying Australia’s Data Centres: A Cybersecurity Imperative
As AI accelerates digital transformation, Australia’s booming data centre industry must embed cyber resilience into its infrastructure design to defend against increasingly complex and converging threats across IT, OT, and physical systems.
The Future of Access Control: Embracing Edge Intelligence, Cyber Hardened Hardware and Ecosystem Resilience
As global security threats evolve, so must the approach to access control. According to the 2025 Trends in Access Controllers Report conducted by Mercury Security, a subsidiary of HID, three transformational currents emerged: edge intelligence and embedded applications; rigorous cybersecurity hardening; and an expanding ecosystem that values openness, ...

Why Separation of Duties Is Vital to Cybersecurity
By embedding Separation of Duties into the fabric of their operations, businesses position themselves to respond confidently to evolving threats while meeting the demands of regulators, partners, and customers alike.

Cyber and Physical Worlds Collide in Critical Infrastructure
The convergence of cyber and physical security is no longer a hypothetical future; it’s the present reality for critical infrastructure operators worldwide. Sam Mackenzie, cybersecurity committee member at the Australian Computer Society (ACS), spoke intelligently about the challenges, demands, and culture shifts now facing organisations on the ...

Why CISOs Are Now Strategic Leaders in Cyber Preparedness
Operational resilience is no longer a niche concern for the IT department. It is a strategic imperative, one that can safeguard business continuity, protect brand reputation, and maintain customer trust.

Why Digital Identity Is the Key to a Fairer, Safer Financial System
Beyond convenience, the integration tackles real-world friction, the kind that costs both time and trust. Prior to ConnectID, if someone’s details didn’t align with outdated government records, we’d get stuck in a frustrating cycle of manual reviews, long phone calls, and delays. Now, we validate identities quickly using dynamic, bank-held data.
No results found.
In The News
DroneShield Secures $5.2M European Military Contract
DroneShield Limited has announced it has received a follow-on contract for $5.2 million from an in-country European reseller, that is contractually required to distribute the products to a European military customer. The contract is for handheld counter-drone systems and associated accessories. DroneShield has all stock on-the-shelf to deliver this ...
Genetec Predicts Top Physical Security Trends for 2026
Organisations will focus on flexibility, responsible AI, and unified connected systems to strengthen security and operational performance
MONTRÉAL, November 24, 2025 — Genetec Inc. (“Genetec”), the global leader in enterprise physical security software, today shared its top predictions for the physical security industry in 2026.
Choice and ...
Trend Micro to Introduce Most Comprehensive Offering for Enterprise AI Risk Management
AI Application Security will accompany a package of new solution capabilities at AWS re:Invent
Big Sales, Small Tells: Staying Safe From Online Scams This Black Friday And Cyber Monday
With the year’s biggest shopping event right around the corner, Microsoft's National Security Officer, Mark Anderson, shares tips on how consumers can protect themselves from online scams
Palo Alto Networks Forecasts 6 Predictions on Securing the New AI Economy for 2026
2026 will be the “Year of the Defender,” where autonomous AI defence is the only way to combat AI-driven identity attacks, data poisoning and quantum risks
Palo Alto Networks Announces New Prisma AIRS Integrations With Factory, Glean, IBM and ServiceNow to Secure the AI Agent Boom
Allowing customers to safely accelerate AI agent adoption across the enterprise while removing security roadblocks
BioCatch Connect 2.0 Delivers Advanced Fraud and Financial Crime-fighting Capabilities to World’s Banks
BioCatch, which prevents financial crime by recognising patterns in human behaviour, today announced a major upgrade to its market-leading digital fraud- and financial crime-detection platform. BioCatch Connect 2.0 features both BioCatch Align, a singular, next-generation software development kit (SDK) that unifies signal collection (behaviour, device, ...
Check Point Software Collaborates with Microsoft to Deliver Enterprise-Grade AI Security for Microsoft Copilot Studio
As AI reshapes enterprise workflows, Check Point works with Microsoft to enable secure agent innovation powered by real-time guardrails, DLP, and threat prevention
REDWOOD CITY, CA. November 18, 2025 -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced it is collaborating ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
