The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Securing Society: Cyber-Physical Safety in Australia’s Critical Infrastructure

Securing Society: Cyber-Physical Safety in Australia’s Critical Infrastructure

Why Cyber-Physical Security Must Be a Leadership Priority   Australia’s critical infrastructure faces escalating cyber-physical threats, with adversaries targeting industrial control systems, operational technology (OT) and critical medical services. Security failures in these environments don’t just disrupt operations; they pose real risks to ...
Are Defenders Prepped for the Next Cyber Chapter?

Are Defenders Prepped for the Next Cyber Chapter?

Securing AI isn’t just about defending against cyber threats - it’s about establishing governance frameworks that ensure AI is used responsibly. With AI adoption accelerating, organisations are needing to align leadership, compliance teams, and IT security to manage risks without stifling innovation. Janice Le, General Manager of Microsoft Security, ...
Zero Trust – The Secret Sauce Behind Breach Readiness

Zero Trust – The Secret Sauce Behind Breach Readiness

Discover how ColorTokens' integrated Zero Trust solution enhances security by unifying Identity Governance, Microsegmentation, and Software-Defined Perimeters.
Cooperate or Collapse: The Prisoner’s Dilemma in Cybersecurity Strategy

Cooperate or Collapse: The Prisoner’s Dilemma in Cybersecurity Strategy

Introduction In the interconnected world of cybersecurity, organisations, nations, and individuals constantly confront strategic decisions regarding resource allocation, information sharing, and defence against cyber threats. One of the most compelling frameworks for analysing these challenges is the Prisoner’s Dilemma, a foundational game theory ...
Generative AI: Striking a Balance between Innovation and Overreliance

Generative AI: Striking a Balance between Innovation and Overreliance

The threats posed by AI are distinct in many ways from those that target user identity, software code, or business data. While traditional cybersecurity risks often focus on protecting specific assets, AI introduces new challenges - such as hallucinations, deepfakes, and ethical concerns - that can impact decision-making and public trust. The key for ...
Bridging AI Readiness in Australia

Bridging AI Readiness in Australia

With AI reshaping industries at unprecedented rates, findings from the 2024 CISCO Live Report suggest Australian companies are trailing, with only four percent ready to leverage the technology, a decline from the previous year. Here's how we bridge the gap to AI readiness for Australian companies.
Private Satellites, Public Dangers: Be Alarmed!

Private Satellites, Public Dangers: Be Alarmed!

Introduction Can governments and large businesses rely on private Starlink-type networks? In pursuing global connectivity and broader reach, many may overlook the risks associated with private satellite networks. The emergence of private satellite internet networks, led by Starlink and its expanding roster of competitors, has sparked debate about ...
How To Foster An Inclusive and Empowering Workplace This International Women’s Day 2025

How To Foster An Inclusive and Empowering Workplace This International Women’s Day 2025

Ruma Balasubramanian at Check Point Software Technologies provides advice on fostering an inclusive workplace this International Women's Day 2025.
No results found.

In The News

Datadog Bolsters A/NZ Presence with Roz Gregory Appointment

Datadog Bolsters A/NZ Presence with Roz Gregory Appointment

Gregory to steer multi-year growth plans following strong local expansion and opening of Datadog’s first Australian data centre presence
Elastic Delivers New ES|QL Features for Cross-Cluster Scale, Data Enrichment, and Performance

Elastic Delivers New ES|QL Features for Cross-Cluster Scale, Data Enrichment, and Performance

New capabilities enhance ES|QL with production-ready lookup joins, cross-cluster query execution, observability, and over 30 performance optimisations
Check Point Software Leads Email Security Rankings in 2025 GigaOm Radar Anti-Phishing Report

Check Point Software Leads Email Security Rankings in 2025 GigaOm Radar Anti-Phishing Report

Check Point stands out for its advanced phishing and malware prevention capabilities, driven by innovations like Infinity AI Copilot and a forward-looking security roadmap
Digital Resilience Launches SecMatters

Digital Resilience Launches SecMatters

A New Model for Client-Led Security Operations
Trend Micro Warns of Thousands of Exposed AI Servers

Trend Micro Warns of Thousands of Exposed AI Servers

Latest research reveals mounting infrastructure-level risks from diverse components
Nozomi Networks Labs Report Finds Australia the fourth most targeted country

Nozomi Networks Labs Report Finds Australia the fourth most targeted country

The latest Nozomi Networks Labs OT & IoT Security Report released today finds Australia the fourth most targeted country. The report assesses the operational technology (OT) and Internet of Things (IoT) threat landscape to provide insights into how industrial organisations and critical infrastructure are being targeted by cyberattacks. Leveraging a ...
Tenable One Surpasses 300 Integrations, Delivering the Security Industry’s Most Open Exposure Management Platform

Tenable One Surpasses 300 Integrations, Delivering the Security Industry’s Most Open Exposure Management Platform

Tenable One now connects more of the security stack than any other exposure management platform, empowering customers with unmatched context into their cyber exposure
FieldEx Leverages Datadog to Enhance Resilience and Operational Efficiency

FieldEx Leverages Datadog to Enhance Resilience and Operational Efficiency

Malaysian startup scaled operations and streamlined issue detection and alerting using Datadog’s comprehensive cloud observability platform
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This