The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Standing Privilege Is Silent Security Debt Carried by Many Australian Organisations
By combining JIT, CIEM and ITDR, Australian organisations can drastically minimise their exposure to the risks of stolen credentials, data breaches, and privilege abuse.

Crisis Leadership in Uncertain Times: Why People, Practice, and Policy Matter Most
We live in times like we are always on the edge of a crisis. Whether it is due to public health issues, geopolitical instability, economic volatility, or an increase in sophisticated cyber threats, uncertainty has become our constant companion.
Effective leadership in this kind of environment is a fundamental shift not just in our leadership ...

Awareness to Action – Building a Culture of Cybersecurity at SMBs
While large enterprises often have the financial resources and personnel to build robust cyber defences, SMBs are still disproportionately exposed. With tighter budgets and fewer dedicated staff, smaller organisations can find it challenging to prioritise cybersecurity alongside other pressing business needs. Therefore as we progress through 2025, the ...

Why Australia Must Shift From Reactive to Resilient Cybersecurity
Recent data highlights that the old playbook of manual threat hunting for organisations is over. Traditional defences are no longer effective and organisations need to expand on the ASD's mandate and adopt a new mindset to build true cyber resilience.

Fortinet CISO’s 2026 Cybersecurity Predictions: Artificial Intelligence, Geopolitics, and the New Era of Resilience
CISO predictions for 2026 | Artificial intelligence, geopolitics, and the new era of cyber resilience

The Identity Crisis CISOs Can No Longer Ignore
As 2026 budgeting ramps up, CISOs are under renewed pressure to cut costs without compromising security. Boards are demanding measurable ROI, while digital transformation efforts, increasingly driven by AI, continue to accelerate. Yet one critical area remains overlooked. Identity security is too often seen as a technical layer, rather than what it ...

From Boring Storage to Cyber Resilience
Technology vendors are definitely in their new eras and we’re here for it. Jeff Baxter, Vice President of Product Marketing at NetApp, announced NetApp’s campaign to move the needle towards four critical customer requirements which include data infrastructure modernisation, cloud transformation, artificial intelligence, and cyber resilience.
“We’re ...
Curly COMrades: Evasion and Persistence via Hidden Hyper-V Virtual Machines
Bitdefender first documented the Curly COMrades threat actor, operating to support Russian interests in geopolitical hotbeds, in August 2025. Since that initial discovery, subsequent forensics and incident response efforts have revealed critical new tools and techniques. Valuable support was provided by the Georgian CERT, whose collaboration ...
No results found.
In the News
Nutanix to Extend Nutanix Agentic AI, Empowering Neoclouds to Deliver Higher Value AI Services
Designed to complement AI infrastructure automation and AI platform services with a new multitenant and AI management portal
Will enable secure, governed self-service consumption by AI engineers and agentic AI developers
New Darktrace Research Shows Evolution of Chinese-Nexus Cyber Operations Into Long-Term Strategic Statecraft, Centered on Critical Infrastructure
• 88% of observed incidents targeted organizations in critical infrastructure sectors, including transportation, telecommunications, healthcare, and manufacturing. • Nearly 63% of compromises began with exploitation of internet-facing systems, reinforcing the risk of exposed digital infrastructure. • Over half of observed activity impacted Western ...
Qualys TRU Research Finds Manual Remediation Can’t Keep up as Exploitation Hits ‘Negative One Day’
Qualys, Inc. (NASDAQ: QLYS), a leading provider of cloud-based IT, security and compliance solutions, today released a new research report, The Broken Physics of Remediation, revealing how exploitation timelines are outpacing human-scale remediation, and why traditional patch metrics can no longer describe true business exposure.
Conducted by the ...
GigaOm Names Check Point Software a Leader and Fast Mover in Application and API Security
Check Point WAF recognised for industry‑leading detection and a unified platform that protects modern web and AI‑driven applications with simplicity and speeds
Commvault Extends Enterprise Resilience to Structured and AI Data With Real-Time Governance Controls
Sydney, Australia – April 2026 – Commvault (NASDAQ: CVLT), a leader in unified resilience at enterprise scale, today announced an expansion of its data and AI security capabilities within Commvault Cloud, enabled through its recent acquisition of Satori. The enhancements extend data discovery, classification and risk assessment into structured data ...
Genetec Highlights Why Governance Defines Secure Cloud Adoption in Enterprise Physical Security
Sydney, April 7, 2026 — Genetec Inc. (“Genetec”), the global leader in enterprise physical security software, is highlighting a disconnect between cloud adoption models in physical security and the governance and operational demands of large enterprises.
Large organisations need to approach cloud adoption through the lens of governance, risk ...
Vulnetix Named Australia’s First GCVE Numbering Authority, Brings Real-time Vulnerability Intelligence Into AI Coding Workflows
Australian-owned cyber security company opens local developer community with free database access
Exabeam Confronts AI Insider Threats Extending Behaviour Detection and Response to OpenAI ChatGPT and Microsoft Copilot
Applies behaviour profiling and analytics to the digital workforce, giving security teams full visibility into how users and AI agents interact across the enterprise
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
- 353
- 354
- 355
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
