The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Why Agentic Automation Is the Next Evolution in Advanced Manufacturing
Policy efforts like Future Made in Australia emphasise a renewed national commitment to rebuilding sovereign capability and invigorating advanced manufacturing. One of the most promising developments enabling this shift is agentic automation – a new frontier in intelligent enterprise automation that is already beginning to reshape how leading ...

The Blur Between Cloud, OT, and Critical Infrastructure
Cordant’s DevSecOops podcast brings together trio Tom, Scott, and James for what turned into a timely, thoughtful discussion about the intersections of cloud technology, operational technology (OT), and critical infrastructure.
With recent news out of the US and Australia about the US regulatory crackdown on Chinese smart vehicle tech due to ...

Shaping The Future Of AI: How Australia’s National AI Capability Plan Sets The Stage For Ethical And Secure AI Adoption
As artificial intelligence (AI) continues to revolutionise industries worldwide, its rapid advancement brings both vast opportunities and significant responsibilities. AI has the potential to transform sectors like healthcare, finance, manufacturing, and education, driving innovation and efficiency in unprecedented ways. However, as AI becomes embedded ...

How a Veteran Project Manager Tames Cyber Chaos
Recently, on DevSecOops podcast; Hosts Tom Walker, James Vincent, and Scott Fletcher bring on a special guest, Natalie Haslam, an industry veteran with 25 years of project management experience within traditional IT, application development, and more recently, cybersecurity.
Natalie’s reflection on the challenges of delivering cyber projects in the ...

What in the Cloud?
DevSecOops podcast hosts Tom Walker, James Vincent, and Scott Fletcher debate which cloud platform reigns supreme. Choosing between major cloud providers can get overwhelming. The three Co-Hosts set aside their usual neutrality to champion AWS (Amazon Web Services), Microsoft Azure, and Oracle Cloud Infrastructure (OCI), diving deep into what each ...
How Analysing 700,000 Security Incidents Helped Our Understanding of Living Off the Land Tactics
This article shares initial findings from internal Bitdefender Labs research into Living off the Land (LOTL) techniques. Our team at Bitdefender Labs, comprised of hundreds of security researchers with close ties to academia, conducted this analysis as foundational research during the development of our GravityZone Proactive Hardening and Attack ...

Postmortem: Australian Retailer, The Iconic Incident Review
In 2024, a sophisticated credential stuffing attack targeted The Iconic, a leading Australian online fashion retailer. This breach compromised customer accounts, raising serious concerns about cybersecurity measures within the retail industry. Affected individuals faced unauthorized transactions and potential data exposure. The Iconic has initiated a ...

What Makes You Board Ready?
Discover why serving on a corporate board might be more than just a career milestone. Dr. Keith Dorsey challenges conventional thinking, urging reflection and strategic planning. Learn what boards now seek: unique skills and genuine purpose. Are you ready to add real value?
No results found.
In The News
Trend Micro Awards Over USD$1,000,000 to Ethical Hackers
Participants at Pwn2Own Ireland discovered scores of zero-day vulnerabilities
Organisations That Delay Responding to Email Breaches are 79% More Likely to Suffer a Ransomware Hit
· New research shows 76% of Australian respondents experienced an email security breach in the previous 12 months · The average cost of recovering from a single email security breach in Australia exceeds $280,000 USD (approx. $430,000 AUD). · Smaller companies are hit hardest with recovery costs of nearly $2,000 USD per employee
Nozomi Networks Innovates to Automate Cybersecurity Defences for Critical Infrastructure
Nozomi Networks Inc., the leader in OT, IoT and CPS security today announced the industry’s first cybersecurity solution to safely automate threat responses in operational environments. With the latest release of Nozomi Arc, users gain robust, automated threat prevention capabilities for OT endpoints.
First launched in 2023, Nozomi Arc is the ...
Trend Micro Launches End-to-End Protection for Agentic AI Systems with NVIDIA
Extends Agentic AI Safety from infrastructure to application with agentless EDR and integrated guardrails to secure next-generation AI factories
Check Point Redefines AI Security for Enterprises with AI Cloud Protect Powered by NVIDIA BlueField
Redwood City, CA – October 28, 2025 – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced it is working with NVIDIA to deliver an integrated security solution built for AI factories. AI Cloud Protect is now available for on-premises enterprise deployments to secure AI model ...
CrowdStrike and NVIDIA Redefine Cybersecurity with Always-On AI Agents Protecting the Nation’s Digital Infrastructure
Always-on agents built with CrowdStrike Charlotte AI AgentWorks and integrated with NVIDIA Nemotron and NVIDIA NIM microservices will enable real-time threat detection and response across cloud, data center, and edge environments
Palo Alto Networks and Cyberlite Partner to Launch AI Safety in the Classroom Toolkit, a Landmark Resource to Equip Students with Critical Generative AI Skills
New modular resource empowers non-experts, educators, parents, and instructors to teach students critical thinking for safe and ethical AI use
DigiCert Launches Inaugural RADAR Brief
New Cyber Intelligence Reveals ‘Internet Tsunami’ Attacks and Rising Automation in Global Attacks
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
