The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Executive Search Disruptors, Hit one year Milestone as North Star Partners Gains Traction

Executive Search Disruptors, Hit one year Milestone as North Star Partners Gains Traction

​One year in - Josh Hill and Luca Marzorati’s Quiet Build at North Star Partners is Turning Heads In an industry we know for churn, ego and constant movement, most firms spend their first year trying to prove they belong. Recently, the pair hit one year since the launch of North Star Partners, the executive search firm which was founded in 2024 to ...
Florida’s Cyber Boom. Sunshine State Emerges as Unlikely Powerhouse in America

Florida’s Cyber Boom. Sunshine State Emerges as Unlikely Powerhouse in America

​Move over Silicon Valley, a new contender is stepping into the cybersecurity spotlight and it’s not where most people expected. Florida, long dismissed as a playground for tourists and retirees, is quickly transforming into a serious force in the tech and cyber arena, turning up the heat on Silicon Valley’s traditional turf. ​When people think of ...
Communication As Infrastructure – Why Dialogue Is A Business Advantage

Communication As Infrastructure – Why Dialogue Is A Business Advantage

Why global tech fails in APJ and how treating communication as infrastructure unlocks adoption and scale.
Australia Moves to Honour its Secret Holders. Starting With a Crowdfunding Campaign

Australia Moves to Honour its Secret Holders. Starting With a Crowdfunding Campaign

Australia’s intelligence community has long operated in the shadows, but now, a bold push is underway to bring those stories into the light. But instead of a government backed rollout, it’s starting with a GoFundMe page ahead of its major raise. Australia, unlike allies such as the United States and the United Kingdom, ...
Three Critical Actions for Achieving An Optimal SAP Cybersecurity Budget

Three Critical Actions for Achieving An Optimal SAP Cybersecurity Budget

Any enterprise is subject to cyberattacks. The details about incidents concerning critical enterprise applications like SAP S/4HANA are often internal, and hence, public awareness is not up to the mark of malware and phishing. As the attacks become more sophisticated, it is important to understand what your optimal budget should be to protect ...
From 398 to 200 Days: Understanding the TLS Certificate Lifespan Reduction

From 398 to 200 Days: Understanding the TLS Certificate Lifespan Reduction

Digital trust is entering a new phase, and on March 15, 2026, a policy change will take effect that reshapes how organisations approach security. In 2025, the CA/Browser Forum, a consortium of browser vendors and certificate authorities, approved revisions to public TLS standards, introducing a phased reduction in certificate lifespans to better ...
Cybersecurity Leader Sean Duca exits Vendor Land after 25 years, Launches Boutique Executive Advisory Firm

Cybersecurity Leader Sean Duca exits Vendor Land after 25 years, Launches Boutique Executive Advisory Firm

​After more than two decades inside the global technology vendor ecosystem, cybersecurity heavyweight Sean Duca is stepping out on his own. Duca, most recently Chief Technology Officer for Customer Experience at Cisco, has officially launched The Duca Group, a boutique executive advisory firm designed to help boards, C-suite leaders and Founders make ...
Reducing Cyber and Physical Risks: What Every IT Manager Should Know About Access Control

Reducing Cyber and Physical Risks: What Every IT Manager Should Know About Access Control

Access control has long been treated as a function of facilities teams, focused on unlocking and locking doors. As digital systems and physical spaces become more interconnected, that point of view needs to be rethought. Access control is now playing an added role to cybersecurity and operational strategy. The systems that determine who can enter ...
No results found.

In The News

Suspected North Korean Actor Linked to Major NPM Supply Chain Attack, Google Warns

Suspected North Korean Actor Linked to Major NPM Supply Chain Attack, Google Warns

A recent software supply chain attack involving the widely used axios npm package has been attributed to a suspected North Korean threat actor, underscoring growing concerns about the security of open-source ecosystems relied on by Australian organisations. According to the Google Threat Intelligence Group (GTIG), the attack is not connected to the ...
ESET Launches AI-Powered MDR Service in APAC with Industry-Leading 6-Minute Response Time

ESET Launches AI-Powered MDR Service in APAC with Industry-Leading 6-Minute Response Time

ESET MDR delivers industry-leading real-time detection and a mean-time-to-respond | (MTTR) of 6 minutes to keep businesses secure
Dataiku Appoints Andrew Boyd as Senior Vice President and General Manager for Asia Pacific and Japan

Dataiku Appoints Andrew Boyd as Senior Vice President and General Manager for Asia Pacific and Japan

Seasoned enterprise technology leader Andrew Boyd to drive Dataiku’s next phase of growth across Asia Pacific and Japan as organisations scale AI from experimentation to impact.
AI Acceleration in APAC Exposes Growing API Security Gap, Akamai Research Finds

AI Acceleration in APAC Exposes Growing API Security Gap, Akamai Research Finds

As organisations across Asia-Pacific adopt AI-first strategies, APIs emerge as the primary attack surface
CrowdStrike and HCLTech Expand Strategic Partnership with AI-Powered Continuous Threat Exposure Management Services

CrowdStrike and HCLTech Expand Strategic Partnership with AI-Powered Continuous Threat Exposure Management Services

March 31, 2026, CrowdStrike (NASDAQ: CRWD) and HCLTech today announced an expansion of their strategic partnership with the launch of Continuous Threat Exposure Management (CTEM) services. This joint offering enables continuous, intelligence-led identification, prioritisation, and remediation of exposure across endpoints, cloud, identity, applications, ...
Bitdefender Launches Complimentary Internal Attack Surface Assessment to Help Organisations Uncover Hidden Cyber Risk

Bitdefender Launches Complimentary Internal Attack Surface Assessment to Help Organisations Uncover Hidden Cyber Risk

Program Helps Organisations Discover and Reduce Risk Caused by Unnecessary Access to Applications, Tools, and System Utilities Commonly Exploited in Modern Attacks
Kaseya Unveils Next-generation Innovations In Cyber Resilience

Kaseya Unveils Next-generation Innovations In Cyber Resilience

AI-powered tools set new industry standards for backup and recovery.
ExpressVPN Launches ExpressAI, An AI Platform Built For True Privacy

ExpressVPN Launches ExpressAI, An AI Platform Built For True Privacy

Global privacy and security company ExpressVPN today announced ExpressAI, a new private-by-design AI platform designed for people who want the power of modern AI without being profiled or having their prompts and files fed back into training pipelines. As more people use AI to draft emails, summarise documents, and troubleshoot everyday problems, ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This