The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Speed, Identity, and AI: Redefining Cybersecurity for Australian Organisations

Speed, Identity, and AI: Redefining Cybersecurity for Australian Organisations

Speed, Identity, and AI: Redefining Cybersecurity for Australian Organisations Cybersecurity teams have always grappled with emerging technologies, increasingly sophisticated attacks and new regulations. However, as organisations accelerate AI and cloud adoption, digitise services, and adapt to evolving compliance regulations, security challenges ...
How to Invest in AI to Overcome the Challenges of Identity-based Security

How to Invest in AI to Overcome the Challenges of Identity-based Security

AI is reshaping what’s possible when it comes to protecting organisations against identity-based attacks. By offering prescriptive recommendations on how to harden identity security, together with advanced detection of evolving threats, organisations can improve their ability to operate now and into the future.
How One Vendor Breach Becomes a Global Risk

How One Vendor Breach Becomes a Global Risk

Today, businesses run on an invisible thread: supply chain. It links industries and consumers through numerous pathways, whether physical or digital. From ports to airlines to healthcare and finances, organisations rely on these networks to operate efficiently and at scale. But here’s the catch, recent events revealed that the same interdependence and ...
How Drawing on the Power of AI Technology Can Help Your Institution Stay a Step Ahead of Scammers and Fraudsters in 2026

How Drawing on the Power of AI Technology Can Help Your Institution Stay a Step Ahead of Scammers and Fraudsters in 2026

Shielding customers from scams and fraud and providing a safe online experience is paramount. Institutions that fail to do so will find themselves punished financially and reputationally, as regulators continue to bear down and consumers and businesses take their accounts elsewhere.
Resilience, Not Just Compliance: A Zero Trust Perspective for Federal Cybersecurity

Resilience, Not Just Compliance: A Zero Trust Perspective for Federal Cybersecurity

Introduction For decades, cybersecurity in government has been defined by a familiar cycle: secure the perimeter, block the intruders, respond to the audits. That model no longer works. As adversaries grow more sophisticated and resources remain tight, the federal community needs a new mindset. Prevention still matters, but resilience must come ...
Breaking the Mold: How the CISO Role Has Outgrown Its Technical Roots

Breaking the Mold: How the CISO Role Has Outgrown Its Technical Roots

​Recently on the DevSecOops podcast, hosts Tom Walker and Scott Fletcher sat down with George Abraham, CISO at Influx, to discuss the changing nature of cybersecurity leadership, the human challenges of leading teams, and the complex security risks emerging from new technologies. George began with a note that cybersecurity careers rarely follow a ...
GenAI for Cybersecurity – Embrace the Power, Own the Risk

GenAI for Cybersecurity – Embrace the Power, Own the Risk

Introduction Generative AI (GenAI) is actively reshaping the way attackers and defenders operate in Australia. Threat actors have weaponised GenAI to synthesise text, code, voice, and video at scale, increasing impersonation scams and malware campaigns.  In response to these evolving threats, security teams have also adopted GenAI tools to automate ...
Improving Australia’s Resilience Against Growing Cyber Threats

Improving Australia’s Resilience Against Growing Cyber Threats

By focusing on measurable outcomes, such as speed of detection and response, rather than compliance checklists, Australia can build a digital economy that is not only innovative and productive, but also secure against the rising tide of cyber threats.
No results found.

In the News

HPE Introduces Sweeping Security Advancements to Secure AI Adoption and Strengthen Enterprise Resiliency

HPE Introduces Sweeping Security Advancements to Secure AI Adoption and Strengthen Enterprise Resiliency

New HPE Juniper Networking SRX400 Series Firewalls extend consistent protection from core to edge as AI expands across distributed sites Expanded hybrid mesh firewall puts enterprise guardrails around AI to reduce exposure without slowing productivity Built-in security enhancements support resilience as a core business requirement across the ...
KnowBe4 Accelerates the Future of Human Risk Management With Expanding Suite of AI Agents

KnowBe4 Accelerates the Future of Human Risk Management With Expanding Suite of AI Agents

AI Defence Agents reduce administrative burden and transform security operations from a cost centre to a competitive advantage 
Saviynt Unveils Industry’s First Identity Control Plane for AI Agents

Saviynt Unveils Industry’s First Identity Control Plane for AI Agents

Saviynt delivers the first enterprise-grade platform with the full capabilities to govern AI agents from discovery through runtime
Phantom Labs Analysis of BeyondTrust’s Identity Security Insights Data Finds Enterprise AI Agents Growing 466.7% Year Over Year

Phantom Labs Analysis of BeyondTrust’s Identity Security Insights Data Finds Enterprise AI Agents Growing 466.7% Year Over Year

BeyondTrust researchers warn of a rapidly expanding “shadow AI workforce” creating new identity security risks, based on data uncovered through Identity Security Insights® | Some organisations operate well over 1,000 AI agents, many of which security teams were not aware existed within their environments
Ping Identity Defines the Runtime Identity Standard for Autonomous AI

Ping Identity Defines the Runtime Identity Standard for Autonomous AI

General Availability of Identity for AI establishes continuous, contextual enforcement and real-time control over AI agents 
Interactive Secures IT Managed Services Agreement With Major Superannuation Fund

Interactive Secures IT Managed Services Agreement With Major Superannuation Fund

The leading Australian IT service provider will support the delivery of Hostplus’ technology strategy to enhance service delivery and operational resilience.
15,500 Malicious Domains: How Threat Actors Abuse a Popular Ad Tracker for Cloaked AI Investment Scams

15,500 Malicious Domains: How Threat Actors Abuse a Popular Ad Tracker for Cloaked AI Investment Scams

New research from Infoblox Threat Intel and Confiant reveals that cybercriminals are abusing Keitaro, a widely used advertising performance tracker, to hide (“cloak”) scams and malware behind ordinary web traffic; with many posing specifically as AI investment opportunities. Cloaking has become a foundational block of modern cybercrime, allowing ...
Elastic Eliminates Per-Endpoint Pricing for XDR

Elastic Eliminates Per-Endpoint Pricing for XDR

The Australian cyber landscape has reached a critical tipping point. As the latest ASD Cyber Threat Report reveals, average crime costs for large Aussie firms have spiked 219% to over $200k per incident. While much of the industry is focused on the AI arms race, there is a deeper shift occurring: the move from reactive dashboards to the agentic SOC. To ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This