The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

What Happens When the World’s Biggest Vulnerability Database Goes Dark?

What Happens When the World’s Biggest Vulnerability Database Goes Dark?

MITRE, the cornerstone of global vulnerability tracking, announcing it could go dark. For years, the field had relied on this single repository, the bedrock for tracking software vulnerabilities. What happens when that rug is pulled from beneath an entire industry? Tal Zarfati, Architect Lead at JFrog Security, still recalls the tremor this news sent ...
Minimising Third-party Risk

Minimising Third-party Risk

Minimise third-party risk with smart vendor management. Learn how to protect data, ensure compliance, and streamline reviews with automation.
The Blind Spot In Your Cyber Strategy

The Blind Spot In Your Cyber Strategy

 Recently on the DevSecOops podcast, Hosts Tom Walker, James Vincent, and Scott Fletcher unpacked the modern threats in the cybersecurity space. With years of experience in IT and cybersecurity, the hosts shared real world experiences, from everyday technical mishaps to nation sponsored cyberattacks, offering practical advice for staying secure amid ...
How Wiz Is Rewriting the Cloud Security Story

How Wiz Is Rewriting the Cloud Security Story

In Episode 7 of the DevSecOops podcast, hosts Tom Walker, Scott Fletcher, and James Vincent sat down with Matt Preswick, Principal Solutions Engineer at Wiz APJ, to unpack how Wiz has become an emerging favourite of both engineering teams and the executive suite. Beyond that, they also discussed the broader issue of the everyday realities of cloud ...
What Australian Businesses Need To Do To Bolster Their Cyber Defences During the EOFY

What Australian Businesses Need To Do To Bolster Their Cyber Defences During the EOFY

Introduction With the end of the financial year (EOFY) fast approaching, it’s more important now than ever for businesses to be even more vigilant and take stock of their online security. Tax season is a time of increased cyber threats and is ripe for cybercriminals and scammers to strike. Ways AI Is Being Utilised In EOFY Scams While the ...
WTF is Happening in Tech?

WTF is Happening in Tech?

In the latest episode of the DevSecOops podcast, hosts Tom Walker and Scott Fletcher discussed three of the most talked about topics in enterprise IT including Kubernetes, the March 2025 Oracle Cloud security breach, and how AI is reshaping both productivity and cybersecurity. Kubernetes - Necessary Evolution or Needless Complexity? Tom did not ...
Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets

Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets

Computer Emergency Response Teams (CERTs) are the unsung heroes of cybersecurity. There are many myths about their role and function. Contrary to popular belief they don’t certify cybersecurity professionals, and many don’t do emergency response.  Operating in the background, CERTs provide vital functions in anticipating and reducing the impact of ...
Don’t Let Generative AI And LLMs Become A Third-Party Vulnerability

Don’t Let Generative AI And LLMs Become A Third-Party Vulnerability

As Large language models (LLMs) are increasingly being embedded into software development, organisations must ensure they understand the cyber security risks that come with it. Developer tools that have generative AI capability integrated to assist developers when writing code are on the rise. But the LLMs they rely on could be altered by threat actors.  
No results found.

In The News

CyberArk Introduces First Identity Security Solution Purpose-Built to Protect AI Agents with Privilege Controls

CyberArk Introduces First Identity Security Solution Purpose-Built to Protect AI Agents with Privilege Controls

Delivers privilege controls, visibility and compliance for the new class of AI agent identities. | Extends CyberArk’s identity security capabilities to secure AI-driven automation at enterprise scale.
KnowBe4 Research Reveals Personalised Phishing Emails Using the Company Name Dominate

KnowBe4 Research Reveals Personalised Phishing Emails Using the Company Name Dominate

The Q3 2025 Phishing Simulation Roundup reveals people interacted most with emails that impersonated colleagues or referenced internal systems or topics 
Critical RCE Vulnerability Discovered in React Native Community CLI NPM Package with 2M Weekly Downloads

Critical RCE Vulnerability Discovered in React Native Community CLI NPM Package with 2M Weekly Downloads

JFrog Security Research team demonstrates CVE-2025-11953 allows unauthenticated attackers to remotely execute code on developers’ machines, putting organisations at risk
SAP and Snowflake Unleash the Power of Data and Enterprise AI Across the Business Data Fabric

SAP and Snowflake Unleash the Power of Data and Enterprise AI Across the Business Data Fabric

New partnership empowers organisations with access to rich data insights required to power AI apps that accelerate businesses outcomes
Delinea Expands OEM Agreement with IBM to Deliver Privileged Identity and Access Management Capabilities

Delinea Expands OEM Agreement with IBM to Deliver Privileged Identity and Access Management Capabilities

AUSTRALIA – 5 November, 2025 – Delinea, a pioneering provider of solutions for securing human and machine identities through centralised authorisation, today announced the expansion of its OEM agreement with IBM to make the full Delinea Platform available to IBM customers. This new agreement deepens a strategic collaboration that began between the two ...
More than Half (58%) of Retailers hit by Ransomware Pay the Ransom, Sophos Finds

More than Half (58%) of Retailers hit by Ransomware Pay the Ransom, Sophos Finds

Sophos today released its fifth annual Sophos State of Ransomware in Retail report, a vendor-agnostic survey of IT and cybersecurity leaders across 16 countries. This year’s report reveals that nearly half (46%) of retail ransomware incidents were traced to an unknown security gap, underscoring ongoing visibility challenges across the retail attack ...
Snowflake Announces New Product Innovations to Accelerate the Development of Enterprise-Grade Agentic AI Apps

Snowflake Announces New Product Innovations to Accelerate the Development of Enterprise-Grade Agentic AI Apps

• Snowflake Intelligence is now generally available, equipping organisations to democratise data and AI across their business • New advancements to Snowflake Horizon Catalog and Snowflake Openflow enable enterprises to make all their data accessible for AI agents • New suite of developer tools to supercharge agentic AI, enabling developers to deploy AI ...
Cisco 360 Partner Program Empowers Partners to Drive Profitability in an AI Era

Cisco 360 Partner Program Empowers Partners to Drive Profitability in an AI Era

• Program Evolution: Launching January 25, 2026, the Cisco 360 Partner Program builds on 20+ years of industry-leading partnerships and was co-designed with partners to enhance customer value. • Profitability: New Cisco Partner Incentive bonuses reward portfolio breadth and depth of specialized expertise, with the Partner Value Index and enhanced ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This