The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Claroty Team82 Uncovers Critical Vulnerabilities in Axis Video Surveillance Products

Claroty Team82 Uncovers Critical Vulnerabilities in Axis Video Surveillance Products

Turning Camera Surveillance on its Axis
Why Asia Pacific Organisations Must Rethink Inline Security After a Wave of Data Breaches

Why Asia Pacific Organisations Must Rethink Inline Security After a Wave of Data Breaches

Asia Pacific is in the midst of a cybersecurity reckoning following a spate of major data breaches including Qantas and Louis Vuitton in Australia, attacks on Singapore’s critical infrastructure, a surge of ransomware threats in India, and most recently a successful attack on Google. While most organisations are focused on enhancing cybersecurity, one ...
Unmasking Identity Risks Before They Become Breaches

Unmasking Identity Risks Before They Become Breaches

An effective identity security strategy must move beyond siloed tools and reactive policies. It requires unified visibility across all users and assets, contextual understanding of privilege, and automated enforcement of least-privilege principles.
Cyber-securing Enterprises, the AI Way

Cyber-securing Enterprises, the AI Way

“...Therefore, send not to know For whom the bell tolls, It tolls for thee.” John Donne, “No man is an island” Introduction No enterprise is an island of security when it comes to cyber-attacks. Australia suffered a staggering 47 million data breaches in 2024 — equivalent to one attack every second — representing a twelvefold increase ...
The Empty Boat Mindset – Rethinking Australia’s Cyber Defenses

The Empty Boat Mindset – Rethinking Australia’s Cyber Defenses

As cyberattacks rise across Australia's critical infrastructure, from airlines to superannuation funds, a quiet storm is forming beneath the surface, not just in code or firewalls, but in the mindsets shaping our national response. Surprisingly, a solution to our cybersecurity maturity might not be in quantum encryption or artificial intelligence but ...
AI Coding Assistants Boost Productivity … But At What Cost to Security?

AI Coding Assistants Boost Productivity … But At What Cost to Security?

As the pressure mounts to ship faster and innovate more aggressively, development teams must remember that code security is no longer optional but a business-critical necessity.
Baseline Compliance Is Just The Starting Line

Baseline Compliance Is Just The Starting Line

For years, compliance has been the word that quickly put anyone on the back foot. Compliance is one of those words that often carries a negative connotation, but it doesn’t have to. Some forward-thinking leaders are looking to rewrite the compliance script entirely. Jadee Hanson, Chief Information Security Officer at Vanta, has no patience for ...
How Emerging Technologies In Critical Infrastructure Are Expanding Cyber Risks

How Emerging Technologies In Critical Infrastructure Are Expanding Cyber Risks

Introduction Emerging technologies like industrial Internet of Things, unified platform architectures, and cloud-integrated operational technology are transforming the critical infrastructure landscape. This transformation, driven by the need for greater agility and pursuit of competitive advantage, is unlocking unprecedented levels of automation, ...
No results found.

In The News

Check Point Software’s 2026 Cyber Security Report Shows Global Attacks Reach Record Levels as AI Accelerates the Threat Landscape

Check Point Software’s 2026 Cyber Security Report Shows Global Attacks Reach Record Levels as AI Accelerates the Threat Landscape

Organisations face nearly 2,000 cyber attacks per week as attackers combine automation, AI, and social engineering across multiple channels
Mesh Security Raises $12 Million Series A to Power Autonomous Execution for Cybersecurity Mesh at Enterprise Scale

Mesh Security Raises $12 Million Series A to Power Autonomous Execution for Cybersecurity Mesh at Enterprise Scale

PALO ALTO, Calif., Jan. 28, 2026 -- Mesh Security, the company delivering the world's first Cybersecurity Mesh Architecture (CSMA) platform, today announced a $12 million Series A funding round led by Lobby Capital, with participation from S Ventures (SentinelOne CVC), and Bright Pixel Capital. Mesh provides the execution layer for modern security ...
Fortinet Expands FortiCNAPP Cloud Risk Management with Network, Data, and Unified Risk Context

Fortinet Expands FortiCNAPP Cloud Risk Management with Network, Data, and Unified Risk Context

New enhancements integrate network security posture, native data security posture management, and runtime validation to help security teams prioritise real-world cloud risk 
Silvus Technologies Unveils StreamCaster MINI 5200 Tactical MANET Radio

Silvus Technologies Unveils StreamCaster MINI 5200 Tactical MANET Radio

Silvus Technologies, a Motorola Solutions company and a global leader in advanced tactical wireless communications, today announced the StreamCaster® MINI 5200 (SM5200). It is Silvus’ smallest, fully featured mobile ad hoc network (MANET) radio, designed to equip ground forces with next-generation mesh networking to securely share voice, video, and ...
DigiCert Named a Leader in IDC MarketScape for Worldwide Certificate Lifecycle Management 2026 

DigiCert Named a Leader in IDC MarketScape for Worldwide Certificate Lifecycle Management 2026 

Sydney, AUSTRALIA -- January 28, 2026 — DigiCert, a global leader in intelligent trust, today announced that the company has been named a Leader in the IDC MarketScape: Worldwide Certificate Lifecycle Management (CLM) Vendor Assessment (doc #US52990725, January 2026).  The recognition highlights DigiCert’s leadership in helping organisations ...
Achieving Remote Code Execution on n8n Via Sandbox Escape – CVE-2026-1470 & CVE-2026-0863

Achieving Remote Code Execution on n8n Via Sandbox Escape – CVE-2026-1470 & CVE-2026-0863

The JFrog Security Research team recently discovered and disclosed two vulnerabilities in n8n’s sandbox mechanism: CVE-2026-1470, rated 9.9 Critical, impacting the expression evaluation engine, and CVE-2026-0863, rated 8.5 High, affecting Python execution in the Code node (“Internal” mode). n8n is a popular AI workflow automation platform that ...
Tenable Extends Exposure Management to AI Attack Surface

Tenable Extends Exposure Management to AI Attack Surface

Tenable One unifies AI discovery, protection and governance within a single exposure management platform
Cythera Appoints Industry Leader Jason Whyte as Managing Director to Drive Australian Expansion and Group Integration

Cythera Appoints Industry Leader Jason Whyte as Managing Director to Drive Australian Expansion and Group Integration

MELBOURNE, AUSTRALIA — January 27, 2026 — Cythera, a leading Australian cybersecurity provider and a Bastion Group company, today announced the appointment of Jason Whyte as Managing Director for Australia. In this pivotal role, Whyte will oversee the group’s overall Australian operations, including the strategic integration of Seamless Intelligence ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This