The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why Australia’s AI Ambitions Depend on Smarter Networks

Why Australia’s AI Ambitions Depend on Smarter Networks

Australia’s ambition to be a global leader in artificial intelligence (AI) is clear—from sovereign AI strategies to booming enterprise deployment. But underneath the promise lies a pressing energy challenge. Data centres already account for approximately 5% of Australia’s electricity supply today, and according to reports could consume as much as 8% by ...
Decrypting the Future: Why Post-Quantum Security Must Start Today

Decrypting the Future: Why Post-Quantum Security Must Start Today

Introduction Australia is standing at the edge of a technological shift that could redefine cyber resilience. With quantum computing on the horizon, the very foundations of data security are under threat. While this technology promises enormous advances in areas like medical research, logistics and AI, it also has the potential to break the ...
Ransomware Protection Advisory: From Cisco Flaws to SonicWall Breaches

Ransomware Protection Advisory: From Cisco Flaws to SonicWall Breaches

“Please wait, your document is loading.” That’s the message victims saw right before their systems got hijacked. Behind that digital curtain, crypto miners and information stealers worked stealthily to infiltrate networks, exfiltrate sensitive data, and plant persistent malware. In the latest ColorTokens Threat Advisory, we tracked how threat ...
Caught in the Middle – How Diverse Cyber Laws Affect Global Organisations

Caught in the Middle – How Diverse Cyber Laws Affect Global Organisations

Regulatory fragmentation has become one of the most pressing yet overlooked concerns for global organisations, particularly as governments introduce differing cybersecurity laws. The issue lies not in the creation per se, but in the fact that these rules and regulations are developed in silos. Every country has its own perspective, shaped by the ...
Overcoming the Security Risks of Using AI in Software Development

Overcoming the Security Risks of Using AI in Software Development

Development teams face relentless pressure to deliver, yet they must continue to prioritise building secure, high-quality software. Leaders play a crucial role in reinforcing how a Secure by Design approach, supported by observability, benchmarking, and ongoing education, directly enhances code quality. By embedding these practices, organisations can ...
Speed, Identity, and AI: Redefining Cybersecurity for Australian Organisations

Speed, Identity, and AI: Redefining Cybersecurity for Australian Organisations

Speed, Identity, and AI: Redefining Cybersecurity for Australian Organisations Cybersecurity teams have always grappled with emerging technologies, increasingly sophisticated attacks and new regulations. However, as organisations accelerate AI and cloud adoption, digitise services, and adapt to evolving compliance regulations, security challenges ...
How to Invest in AI to Overcome the Challenges of Identity-based Security

How to Invest in AI to Overcome the Challenges of Identity-based Security

AI is reshaping what’s possible when it comes to protecting organisations against identity-based attacks. By offering prescriptive recommendations on how to harden identity security, together with advanced detection of evolving threats, organisations can improve their ability to operate now and into the future.
How One Vendor Breach Becomes a Global Risk

How One Vendor Breach Becomes a Global Risk

Today, businesses run on an invisible thread: supply chain. It links industries and consumers through numerous pathways, whether physical or digital. From ports to airlines to healthcare and finances, organisations rely on these networks to operate efficiently and at scale. But here’s the catch, recent events revealed that the same interdependence and ...
No results found.

In the News

$12.5M Investment: GitHub and Other Industry Leaders Join Forces for Open Source Security

$12.5M Investment: GitHub and Other Industry Leaders Join Forces for Open Source Security

Investing in the People Shaping Open Source and Securing the Future Together See how GitHub is investing in open source security funding maintainers, partnering with Alpha-Omega, and expanding access to help reduce burden and strengthen software supply chains. Open source has always been about community. It’s about maintainers who review pull ...
CrowdStrike and Nebius Partner to Unify Security Across the Next Generation of AI Cloud Infrastructure

CrowdStrike and Nebius Partner to Unify Security Across the Next Generation of AI Cloud Infrastructure

CrowdStrike’s Falcon platform extends enterprise-grade cybersecurity to Nebius’s AI cloud platform, supporting high-performance environments built for AI innovators  March 17, 2026 CrowdStrike (NASDAQ: CRWD) and Nebius (NASDAQ: NBIS) today announced a major global partnership to bring the CrowdStrike Falcon® platform to Nebius AI Cloud, extending ...
World Wide Technology and CrowdStrike Launch Securing AI Lab Within WWT’s AI Proving Ground

World Wide Technology and CrowdStrike Launch Securing AI Lab Within WWT’s AI Proving Ground

The Securing AI Lab, built on NVIDIA AI factories within WWT’s AI Proving Ground, provides enterprises a validated path to secure, production-ready AI March 17, 2026 World Wide Technology (WWT) and CrowdStrike (NASDAQ: CRWD) today announced the launch of the Securing AI with CrowdStrike Lab within WWT’s AI Proving Ground. Built on NVIDIA AI ...
HPE Threat Labs Report Reveals Cyber Adversaries Are Morphing Their Business Model to Scale and Accelerate Attacks

HPE Threat Labs Report Reveals Cyber Adversaries Are Morphing Their Business Model to Scale and Accelerate Attacks

Cyber adversaries adopt business-like models to target every major sector, HPE finds Generative AI used to produce synthetic voices, images and videos for targeted impersonation fraud campaigns World-class network threat research expertise and experience brought together in new HPE Threat Labs Sydney, AUSTRALIA – March 18, 2026 – HPE (NYSE: ...
Check Point Enables Email Security Telemetry to Flow Into CrowdStrike Falcon Next-Gen SIEM

Check Point Enables Email Security Telemetry to Flow Into CrowdStrike Falcon Next-Gen SIEM

REDWOOD CITY, CA. – March 17, 2026 – Check Point Software Technologies Ltd. (NASDAQ: CHKP) today announced a new integration that enables email security telemetry from Check Point Email Security to flow into CrowdStrike Falcon® Next-Gen SIEM.  The integration allows security teams to ingest and correlate email-based activity with downstream identity ...
Ping Identity: Only 9% of Organisations Are Prepared for Continuous AI-Driven Identity Threats

Ping Identity: Only 9% of Organisations Are Prepared for Continuous AI-Driven Identity Threats

An independent global study finds that organisations meeting verified trust criteria achieve 51% higher transaction conversion and 43% lower fraud losses. DENVER, March 17, 2026 – Ping Identity, a leader in securing digital identities for the world's largest enterprises, released independent research showing that organisations that have ...
Genetec Enables Enterprise Cloud Modernisation With New Access Control Capabilities in Security Center SaaS

Genetec Enables Enterprise Cloud Modernisation With New Access Control Capabilities in Security Center SaaS

Updates simplify visitor workflows, accelerate daily operations, and expand enterprise hardware support. MONTRÉAL, March 17, 2026 — Genetec Inc. (“Genetec”), the global leader in enterprise physical security software, today announced new access control enhancements to Security Center SaaS. The updates simplify day-to-day operations for security teams ...
Saviynt Appoints Alex Lei to Drive Identity Security Growth Across Asia Pacific and Japan

Saviynt Appoints Alex Lei to Drive Identity Security Growth Across Asia Pacific and Japan

Enterprise security veteran to lead regional sales strategy as organisations across APJ strengthen identity-first cybersecurity Key Highlights: The appointment comes as organisations across APJ increase investment in identity security to support cloud adoption, AI initiatives, and evolving cyber risks Lei will oversee customer acquisition, ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This