The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Cybersecurity Paradox: Mastering a Game That Has Already Changed

The Cybersecurity Paradox: Mastering a Game That Has Already Changed

For decades, enterprises have invested billions into mastering the art of cybersecurity firewalls, antivirus programs, perimeter defenses, and compliance checklists. Many have grown adept, even excellent, at these measures. However, excellence is a moving target in a world of relentless digital transformation. What if the tools we have perfected are no ...
How Unchecked Third-Party Access is Undermining Supply Chains

How Unchecked Third-Party Access is Undermining Supply Chains

As supply chains continue to evolve, so too must the frameworks that secure them. In an era where every digital interaction carries risk, identity is not just a technical concern: it’s the foundation of trust in the modern enterprise.
Why Securing Digital Identities Is Now a Business-Wide Imperative

Why Securing Digital Identities Is Now a Business-Wide Imperative

In the face of rising cyber risks, businesses that embed identity security into the fabric of their cybersecurity strategy will be better positioned to defend against attacks, protect data, and ensure operational resilience.
The Top Cyber Movies that Shaped our View for Better or for Worse?

The Top Cyber Movies that Shaped our View for Better or for Worse?

From flickering CRT monitors to sophisticated cyber heists, the proliferation of cyber films that mirrors our growing anxiety and fascination with life online. Hollywood has long toyed with the tension between human curiosity and digital dystopia. While some cyber films exaggerate for dramatic flair, others eerily foreshadow real world breaches, hacks, ...
7 Reasons Certifications Are Critical to Secure Communications

7 Reasons Certifications Are Critical to Secure Communications

Picture this scenario. You’re a government leader or a critical infrastructure operator. Suddenly, your communication systems go dark. The network has been breached, and sensitive information is exposed. Foreign adversaries are listening, decisions are delayed, and operations are paralyzed. Worse yet, you have no way of getting in touch with your ...
EOFY 2025: Australian Businesses Need To Mount Defences Against Rising Threat Of Cyberwarfare

EOFY 2025: Australian Businesses Need To Mount Defences Against Rising Threat Of Cyberwarfare

Modern cyberwarfare is a rising threat for Australian organisations and requires proactive exposure management for businesses to harden their defence against AI-enabled attacks.
Overcoming The Complexity And Security Issues Posed By AI Coding Tools

Overcoming The Complexity And Security Issues Posed By AI Coding Tools

The advantages AI tools deliver in speed and efficiency are impossible for time-crunched developers to resist. But the complexity and risk created by AI-generated code can’t be ignored either. Organisations need to thoroughly upskill their developers so that they can work with security professionals to nip software security problems in the bud. Only by ...
Insider Threats: The Silent Cybersecurity Crisis Facing Australian Businesses

Insider Threats: The Silent Cybersecurity Crisis Facing Australian Businesses

In a climate where data is currency and trust is critical, defending against insider threats is not just a technical necessity - it’s a business imperative.
No results found.

In The News

Infoblox Surpasses 200 Customers in Breakout Year for Universal DDI™ and Announces New Capabilities for Network Transformation

Infoblox Surpasses 200 Customers in Breakout Year for Universal DDI™ and Announces New Capabilities for Network Transformation

Delivering the industry’s first and only protective DDI platform, which achieved rapid adoption and impact in just one year. Simplifying hybrid multi-cloud operations, breaking down silos and accelerating deployments with new integrations across Akamai, Cloudflare, Google Cloud and Microsoft. Delivering the foundational, critical network services that ...
Cisco Simplifies Security for Managed Service Providers, Accelerating Their Hybrid Mesh Firewall Deployments and Business Growth

Cisco Simplifies Security for Managed Service Providers, Accelerating Their Hybrid Mesh Firewall Deployments and Business Growth

Cisco introduces foundational multi-customer management capabilities within Cisco Security Cloud Control, purpose-built for Managed Service Providers (MSPs). | The innovation streamlines operations, significantly reduces costs, and accelerates time-to-value for MSPs to deliver advanced managed security services. | MSPs can efficiently deploy and manage ...
Cisco Debuts New Unified Edge Platform for Distributed Agentic AI Workloads

Cisco Debuts New Unified Edge Platform for Distributed Agentic AI Workloads

Cisco Unified Edge extends data center power and scale to the edge, enabling real-time applications and AI inferencing where data is generated. | Cisco is first-to-market with an edge optimized platform that’s more than a server - integrating compute, networking, and storage into a single system backed by an extensive partner ecosystem. | The new ...
Ping Identity Strengthens Defence Against AI-Driven Impersonation with Privacy-Preserving Biometrics

Ping Identity Strengthens Defence Against AI-Driven Impersonation with Privacy-Preserving Biometrics

Signs agreement to acquire Keyless, expanding privacy-first authentication across the entire user journey.
Kaseya Connect APAC 2025 Awards Celebrate Regional MSP Excellence

Kaseya Connect APAC 2025 Awards Celebrate Regional MSP Excellence

The awards recognise outstanding innovation and service excellence from MSPs and IT professionals across the Asia Pacific region.
Camelot Secure CEO Stan Oliver Named One of The Daily Record’s 2025 Most Admired CEOs

Camelot Secure CEO Stan Oliver Named One of The Daily Record’s 2025 Most Admired CEOs

Oliver’s recognition reflects a career defined by both innovation and inclusivity. Since founding Camelot Secure in 2022, he has spearheaded pioneering work in Advanced Persistent Threat (APT) Hunting, Attack Surface Management, Penetration Testing, and Threat Detection & Incident Response. Under his leadership, the company has also developed ...
Lakera Launches Open-Source Security Benchmark for LLM backends in AI Agents

Lakera Launches Open-Source Security Benchmark for LLM backends in AI Agents

SAN FRANCISCO and ZURICH - October 27, 2025 – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, and Lakera, a world leading AI-native security platform for Agentic AI applications, with researchers from The UK AI Security Institute (AISI), have announced the release of the backbone breaker ...
Tech Professionals In Oceania Brace For A Year Of AI Risks, Regulation And A Focus On Business Continuity

Tech Professionals In Oceania Brace For A Year Of AI Risks, Regulation And A Focus On Business Continuity

ISACA’s 2026 Tech Trends & Priorities Pulse Poll reveals the top threats and pressures keeping Oceania’s digital trust professionals awake at night
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This