The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

No Breach Doesn’t Mean No Risk: Rethinking Cybersecurity Metrics in the Boardroom
“Measuring peace by the absence of war is a flawed benchmark, so is judging cybersecurity solely by a lack of incidents.”
In boardrooms across industries, directors increasingly grapple with one of the most misunderstood performance indicators in modern governance: cybersecurity effectiveness. At first glance, it’s tempting to celebrate a spotless ...

Enhancing Software Development the EveryOps Way
Software has become the undisputed driver of business today. As the reliance on software has grown, so have the moving parts needed to make it, especially amid the rise of generative artificial intelligence (GenAI). As a result, software development has become a complex process, potentially hampering innovation.
According to Deloitte, GenAI usage ...

Why Agentic Automation Is the Next Evolution in Advanced Manufacturing
Policy efforts like Future Made in Australia emphasise a renewed national commitment to rebuilding sovereign capability and invigorating advanced manufacturing. One of the most promising developments enabling this shift is agentic automation – a new frontier in intelligent enterprise automation that is already beginning to reshape how leading ...

The Blur Between Cloud, OT, and Critical Infrastructure
Cordant’s DevSecOops podcast brings together trio Tom, Scott, and James for what turned into a timely, thoughtful discussion about the intersections of cloud technology, operational technology (OT), and critical infrastructure.
With recent news out of the US and Australia about the US regulatory crackdown on Chinese smart vehicle tech due to ...

Shaping The Future Of AI: How Australia’s National AI Capability Plan Sets The Stage For Ethical And Secure AI Adoption
As artificial intelligence (AI) continues to revolutionise industries worldwide, its rapid advancement brings both vast opportunities and significant responsibilities. AI has the potential to transform sectors like healthcare, finance, manufacturing, and education, driving innovation and efficiency in unprecedented ways. However, as AI becomes embedded ...

How a Veteran Project Manager Tames Cyber Chaos
Recently, on DevSecOops podcast; Hosts Tom Walker, James Vincent, and Scott Fletcher bring on a special guest, Natalie Haslam, an industry veteran with 25 years of project management experience within traditional IT, application development, and more recently, cybersecurity.
Natalie’s reflection on the challenges of delivering cyber projects in the ...

What in the Cloud?
DevSecOops podcast hosts Tom Walker, James Vincent, and Scott Fletcher debate which cloud platform reigns supreme. Choosing between major cloud providers can get overwhelming. The three Co-Hosts set aside their usual neutrality to champion AWS (Amazon Web Services), Microsoft Azure, and Oracle Cloud Infrastructure (OCI), diving deep into what each ...
How Analysing 700,000 Security Incidents Helped Our Understanding of Living Off the Land Tactics
This article shares initial findings from internal Bitdefender Labs research into Living off the Land (LOTL) techniques. Our team at Bitdefender Labs, comprised of hundreds of security researchers with close ties to academia, conducted this analysis as foundational research during the development of our GravityZone Proactive Hardening and Attack ...
No results found.
In The News
BeyondTrust Experts Reveal Top Cybersecurity Predictions for 2026 and Beyond
From AI fragmentation and identity debt to biological computing, BeyondTrust forecasts the technologies and threats that will shape the next decade. | Experts predict a surge in agentic AI adoption, identity exploitation, and global regulatory shifts redefining digital trust.
New Bitdefender and NETGEAR Report Reveals Rising Threats Across the Connected Home Landscape
Bitdefender today released new joint research with NETGEAR titled the 2025 IoT Security Landscape Report, providing a comprehensive analysis of the growing threats targeting connected devices in modern homes. The research highlights how the expanding Internet of Things (IoT) ecosystem, spanning everything from smart TVs and streaming boxes to routers ...
Akamai Inference Cloud Transforms AI from Core to Edge with NVIDIA
Akamai Technologies, Inc. (NASDAQ:AKAM) today launched Akamai Inference Cloud, a platform that redefines where and how AI is used by expanding inference from core data centres to the edge of the internet.
Akamai Inference Cloud enables intelligent, agentic AI inference at the edge, close to users and devices. Unlike traditional systems this platform ...
Palo Alto Networks Unveils Cortex AgentiX to Build, Deploy and Govern the Agentic Workforce of the Future
Enhanced platform combines the power of agentic AI with the safety of enterprise-grade guardrails
GitHub Evolves Platform Into Agent HQ As Developer Growth Hits Record Highs
Sydney, 29 October 2025 — At GitHub Universe 2025, GitHub announced Agent HQ—its vision for the next evolution of its platform. Agent HQ transforms GitHub into an open ecosystem that unites every agent on a single platform. Over the coming months, coding agents from Anthropic, OpenAI, Google, Cognition, xAI, and more, will become available directly ...
GitHub Reveals Australian Growth Data and Developer Insights
Over 2 million Aussies are now coding software, as AI lowers barriers to entry worldwide
Trend Micro Awards Over USD$1,000,000 to Ethical Hackers
Participants at Pwn2Own Ireland discovered scores of zero-day vulnerabilities
Organisations That Delay Responding to Email Breaches are 79% More Likely to Suffer a Ransomware Hit
· New research shows 76% of Australian respondents experienced an email security breach in the previous 12 months · The average cost of recovering from a single email security breach in Australia exceeds $280,000 USD (approx. $430,000 AUD). · Smaller companies are hit hardest with recovery costs of nearly $2,000 USD per employee
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
