The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Tanium Names Satyen Desai Regional VP for ASEAN, as Company Doubles Down on Growth in the Region

Tanium Names Satyen Desai Regional VP for ASEAN, as Company Doubles Down on Growth in the Region

Cybersecurity and endpoint management firm Tanium has appointed Satyen Desai as the new Regional Vice President for ASEAN, signalling the company’s continued push to expand its presence across one of the world’s fastest growing economies. Desai announced the move while attending Tanium’s global Sales Kickoff (SKO) in Dallas, describing the opportunity ...
What Einstein would say about AI

What Einstein would say about AI

Einstein was talking about the concept of “technological unemployment,” the idea that technology will destroy jobs and lead to disaster. Will AI cause mass unemployment? Probably not, because when it comes to economics, Einstein was no Einstein. The vast majority of economists, including me, do not think that automation was an important cause of the ...
The AI Edge in Edge Security

The AI Edge in Edge Security

As Australian organisations expand into hybrid cloud and edge environments, their attack surface is rapidly growing beyond the traditional perimeter. This byline explores how AI-first, platform-led security enables real-time threat detection at the edge, strengthens Zero Trust enforcement and unifies protection across cloud, OT and endpoints. It argues ...
AI Versus AI: Why The Next Cyber Security Battle Will Be Fought By Machines

AI Versus AI: Why The Next Cyber Security Battle Will Be Fought By Machines

Artificial intelligence has evolved from being a technical novelty into a powerful business tool with remarkable speed. Companies are embedding generative AI into customer service, software development, and finance operations to unlock efficiency gains and accelerate innovation. However, as adoption deepens, cyber security leaders are confronting a new ...
Eliminating the Technical Debt Caused by AI-Assisted Software Development

Eliminating the Technical Debt Caused by AI-Assisted Software Development

The software development community is experiencing a near ubiquitous usage of AI coding tools as teams face pressure to generate more output in less time. While the huge efficiency gains from the tools help significantly, teams too often fail to incorporate adequate safety controls and practices into AI deployments. Industry leaders are pushing for ...
Why Identity Security Is Breaking Under the Weight of Silos

Why Identity Security Is Breaking Under the Weight of Silos

Identity has become the connective tissue of the modern enterprise, and the connective tissue of modern attacks. As digital environments grow more complex and AI-driven identities multiply, the cost of managing identity security in silos will only rise.
Inside the DIY Scam Economy

Inside the DIY Scam Economy

Introduction The headquarters of the scam economy have always been elusive, shifting between countries, towns and cities like a shadow. Western Africa, once heralded as a hotbed for digital fraud operations, has now been superseded by Southeast Asia, where hundreds of major scam centres are scattered. The operations of these criminal groups transcend ...
Closing the Human Gap in SAP Security: The Case for Cybersecurity Training

Closing the Human Gap in SAP Security: The Case for Cybersecurity Training

Cyber threats are happening at an overwhelming pace, and organizations using SAP systems have become favorite targets for cybercriminals. While specialized tools exist, there is a shortage of skilled professionals with expertise in SAP security. The need for training individuals in this area has never been greater.
No results found.

In The News

CrowdStrike Delivers Agentic MDR to Stop Breaches at Machine Speed

CrowdStrike Delivers Agentic MDR to Stop Breaches at Machine Speed

Falcon Complete’s elite security analysts build and orchestrate intelligent agents to stop AI-accelerated threats, while new services help organisations operationalise the agentic SOC
The State of Cloud-native Security 2026: Maturity Gaps and the Automation Mandate

The State of Cloud-native Security 2026: Maturity Gaps and the Automation Mandate

Red Hat, the world's leading provider of open source solutions, today releases data from its 2026 State of Cloud-Native Security Report, revealing that 97% of organisations reported at least one cloud-native security incident in the past year. These are not just sophisticated, one-off attacks, but rather often the result of "everyday lapses.” Hybrid ...
CrowdStrike Delivers Industry’s First Adversary-Informed Cloud Risk Prioritisation to Stop AI-Powered Adversaries

CrowdStrike Delivers Industry’s First Adversary-Informed Cloud Risk Prioritisation to Stop AI-Powered Adversaries

New Falcon Cloud Security innovations unify application behaviour and adversary tradecraft to eliminate the exposures AI-fortified attackers exploit
HPE Introduces Sweeping Security Advancements to Secure AI Adoption and Strengthen Enterprise Resiliency

HPE Introduces Sweeping Security Advancements to Secure AI Adoption and Strengthen Enterprise Resiliency

New HPE Juniper Networking SRX400 Series Firewalls extend consistent protection from core to edge as AI expands across distributed sites Expanded hybrid mesh firewall puts enterprise guardrails around AI to reduce exposure without slowing productivity Built-in security enhancements support resilience as a core business requirement across the ...
KnowBe4 Accelerates the Future of Human Risk Management with Expanding Suite of AI Agents

KnowBe4 Accelerates the Future of Human Risk Management with Expanding Suite of AI Agents

AI Defence Agents reduce administrative burden and transform security operations from a cost centre to a competitive advantage 
Saviynt Unveils Industry’s First Identity Control Plane for AI Agents

Saviynt Unveils Industry’s First Identity Control Plane for AI Agents

Saviynt delivers the first enterprise-grade platform with the full capabilities to govern AI agents from discovery through runtime
Phantom Labs Analysis of BeyondTrust’s Identity Security Insights Data Finds Enterprise AI Agents Growing 466.7% Year Over Year

Phantom Labs Analysis of BeyondTrust’s Identity Security Insights Data Finds Enterprise AI Agents Growing 466.7% Year Over Year

BeyondTrust researchers warn of a rapidly expanding “shadow AI workforce” creating new identity security risks, based on data uncovered through Identity Security Insights® | Some organisations operate well over 1,000 AI agents, many of which security teams were not aware existed within their environments
Ping Identity Defines the Runtime Identity Standard for Autonomous AI

Ping Identity Defines the Runtime Identity Standard for Autonomous AI

General Availability of Identity for AI establishes continuous, contextual enforcement and real-time control over AI agents 
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This