The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Deepfakes Are Spiralling out of Control, but How Far Will IT Go?

Deepfakes Are Spiralling out of Control, but How Far Will IT Go?

David Wiseman, Vice President of Secure Communications at BlackBerry spoke with me about the increase of deepfakes which are our own voices and countenance that can be fabricated to present like it's us. But its not us. “Anyone’s voice can be deep faked at this point,” warned Wiseman. “Anyone with some basic set of tooling can generate that deep ...
The Hidden Costs to Consider When Selecting a Cyber Security Vendor

The Hidden Costs to Consider When Selecting a Cyber Security Vendor

Evaluating cyber security vendors through the lens of their vulnerability management practices - including frequency, severity, and time-to-patch - is no longer optional. It’s an essential part of any strategic approach to risk mitigation and long-term operational resilience.
The CEO’s Cyber Equation – Can Your Business Outpace the Attacker?

The CEO’s Cyber Equation – Can Your Business Outpace the Attacker?

"It takes years to build trust, but only minutes for a breach to break it." Cybersecurity is no longer only a technical concern. It is a leadership imperative that has a direct impact on trust, reputation, and business survival. Even if your company has never experienced a breach, attackers are continually probing your systems, seeking weaknesses. ...
A CISO’s Love Letter to the Board – Cyber Risk Quantified

A CISO’s Love Letter to the Board – Cyber Risk Quantified

Cybersecurity has a communication problem: CISOs still speak in technical jargon while boards listen for financial impact. This byline reframes cyber risk as a business language of dollars and cents — the true “love language” of executives. Drawing on new research, it argues that risk quantification is the CISO’s secret weapon, shifting the focus from ...
The New Normal – Ransomware as a Service

The New Normal – Ransomware as a Service

Introduction Gone are the days that cyber threats and attacks are the work of elite hackers, or those who have deep coding skills, nation state support, and unique access to high-level tools. In 2025, and accelerating in coming years, it’s disturbingly easy to launch an attack. With ready-made malware or custom code sold on the dark web, anyone ...
Why Measuring the Right Threat Intelligence Metrics Is Key to SOC Success

Why Measuring the Right Threat Intelligence Metrics Is Key to SOC Success

Organisations must detect, investigate, and respond to threats faster than ever. Success depends on measuring the right threat intelligence metrics which are those that can separate meaningful insights from overwhelming noise. For businesses, failing to do so risks reputational damage and financial loss.
Organisations Must Adapt Defences to 2025’s Dynamic Ransomware Threat

Organisations Must Adapt Defences to 2025’s Dynamic Ransomware Threat

Ransomware has entered a new phase in 2025—faster, more unpredictable, and increasingly targeting APAC. Reactive security no longer works and organisations must adopt intelligence-led, multi-layered defences to keep pace.
IT-OT Convergence: What Happens When Two Worlds Collide?

IT-OT Convergence: What Happens When Two Worlds Collide?

​Most people thought that cybersecurity is all about data breaches, suspicious links, or adversaries trying to get access to your accounts. But in recent years, the space has gone beyond computers and firewalls. Today, cybersecurity also means keeping the power on, the water safe, and hospitals operational. Recently on the DevSecOops podcast, hosts ...
No results found.

In the News

NinjaOne Revolutionises Vulnerability Management With AI-driven Assessment to Reduce Risk Faster

NinjaOne Revolutionises Vulnerability Management With AI-driven Assessment to Reduce Risk Faster

NinjaOne has announced its new solution NinjaOne Vulnerability Management, which helps IT teams identify, prioritise, and remediate vulnerabilities faster, without relying on periodic scans from security teams that often lack context and connection to remediation workflows. Built natively into the NinjaOne platform, the new solution brings together ...
Cisco Secure AI Factory With NVIDIA Makes AI Easier to Deploy and Secure, Anywhere Organizations Need IT

Cisco Secure AI Factory With NVIDIA Makes AI Easier to Deploy and Secure, Anywhere Organizations Need IT

Expanded architecture lets businesses run AI at scale, from central data centers to the factory floor, without sacrificing performance or security
TrendAI Delivers Security-by-design for AI Factories Powered by NVIDIA

TrendAI Delivers Security-by-design for AI Factories Powered by NVIDIA

SYDNEY, Australia – 17 March 2026 – TrendAI™, the enterprise AI security leader from Trend Micro Incorporated (TYO: 4704; TSE: 4704), today announced a new integration with the NVIDIA DSX Air Platform, which will empower customers to design, test, and prove AI factory security before deployment, rather than after. To learn more about the TrendAI and ...
Logicalis Australia Bolsters Erica Smith’s Remit to Head of Marketing and Vendor Alliances

Logicalis Australia Bolsters Erica Smith’s Remit to Head of Marketing and Vendor Alliances

MELBOURNE, AUSTRALIA, MARCH 16, 2026:  Logicalis Australia, a leading global technology service provider, has expanded Erica Smith's remit to Head of Marketing and Vendor Alliances. The new role unifies brand strategy, demand generation, and partner engagement to turbocharge growth and channel alliances across Logicalis Australia.  Erica’s expanded ...
F5 Advances Enterprise Application Security for the AI and Post-quantum Era

F5 Advances Enterprise Application Security for the AI and Post-quantum Era

New security innovations in the F5 Application Delivery and Security Platform unify AI-driven protection, zero trust access, and post-quantum readiness across hybrid multicloud environments
LastPass Launches Secure Access Essentials to Tackle SaaS and AI Access Risks

LastPass Launches Secure Access Essentials to Tackle SaaS and AI Access Risks

LastPass has unveiled a new security approach designed to help organisations manage access across a growing ecosystem of SaaS applications, AI tools and browser-based workflows. The company announced Secure Access Essentials, which combines application discovery, access controls and secure authentication capabilities into a single solution delivered ...
Kinetic IT Appoints Dean Langenbach as CEO to Accelerate Sovereign Technology Leadership and Drive National Growth

Kinetic IT Appoints Dean Langenbach as CEO to Accelerate Sovereign Technology Leadership and Drive National Growth

13 March 2026 – Kinetic IT, a leading Australian-owned technology services partner, today announced Dean Langenbach as its new Chief Executive Officer to shape the company’s next phase of growth and drive technology-driven transformation. The appointment underscores Kinetic IT’s continued momentum as it strengthens its position as the trusted ...
Kyndryl Confirms Converging Quantum, Data Sovereignty and Network Demands Expose Enterprise Readiness Gap

Kyndryl Confirms Converging Quantum, Data Sovereignty and Network Demands Expose Enterprise Readiness Gap

Kyndryl Readiness Report reveals misalignment between infrastructure investment and preparedness for converging modernisation demands
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This