The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Minimising Third-party Risk

Minimising Third-party Risk

Minimise third-party risk with smart vendor management. Learn how to protect data, ensure compliance, and streamline reviews with automation.
The Blind Spot In Your Cyber Strategy

The Blind Spot In Your Cyber Strategy

 Recently on the DevSecOops podcast, Hosts Tom Walker, James Vincent, and Scott Fletcher unpacked the modern threats in the cybersecurity space. With years of experience in IT and cybersecurity, the hosts shared real world experiences, from everyday technical mishaps to nation sponsored cyberattacks, offering practical advice for staying secure amid ...
How Wiz Is Rewriting the Cloud Security Story

How Wiz Is Rewriting the Cloud Security Story

In Episode 7 of the DevSecOops podcast, hosts Tom Walker, Scott Fletcher, and James Vincent sat down with Matt Preswick, Principal Solutions Engineer at Wiz APJ, to unpack how Wiz has become an emerging favourite of both engineering teams and the executive suite. Beyond that, they also discussed the broader issue of the everyday realities of cloud ...
What Australian Businesses Need To Do To Bolster Their Cyber Defences During the EOFY

What Australian Businesses Need To Do To Bolster Their Cyber Defences During the EOFY

Introduction With the end of the financial year (EOFY) fast approaching, it’s more important now than ever for businesses to be even more vigilant and take stock of their online security. Tax season is a time of increased cyber threats and is ripe for cybercriminals and scammers to strike. Ways AI Is Being Utilised In EOFY Scams While the ...
WTF is Happening in Tech?

WTF is Happening in Tech?

In the latest episode of the DevSecOops podcast, hosts Tom Walker and Scott Fletcher discussed three of the most talked about topics in enterprise IT including Kubernetes, the March 2025 Oracle Cloud security breach, and how AI is reshaping both productivity and cybersecurity. Kubernetes - Necessary Evolution or Needless Complexity? Tom did not ...
Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets

Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets

Computer Emergency Response Teams (CERTs) are the unsung heroes of cybersecurity. There are many myths about their role and function. Contrary to popular belief they don’t certify cybersecurity professionals, and many don’t do emergency response.  Operating in the background, CERTs provide vital functions in anticipating and reducing the impact of ...
Don’t Let Generative AI And LLMs Become A Third-Party Vulnerability

Don’t Let Generative AI And LLMs Become A Third-Party Vulnerability

As Large language models (LLMs) are increasingly being embedded into software development, organisations must ensure they understand the cyber security risks that come with it. Developer tools that have generative AI capability integrated to assist developers when writing code are on the rise. But the LLMs they rely on could be altered by threat actors.  
Creating Infrastructure Foundations For A Scalable Future

Creating Infrastructure Foundations For A Scalable Future

Meeting the complex demands of the future - including GenAI and ML - starts with getting ‘Network As a Service’ (NaaS) fundamentals right - right now.
No results found.

In The News

Thoughtworks and Groq partner to Accelerate Real-World AI Value and Innovation in Australia

Thoughtworks and Groq partner to Accelerate Real-World AI Value and Innovation in Australia

Thoughtworks, a global technology consultancy that integrates design, engineering and AI to drive digital innovation, today announced a strategic partnership with Groq, creator of the LPU which is purpose-built for fast, low cost AI inference. This partnership is set to transform how organizations design, build and scale intelligent systems to deliver ...
JFrog Exposes Enterprise AI Blind Spots, Driving Centralised Software Supply Chain Governance

JFrog Exposes Enterprise AI Blind Spots, Driving Centralised Software Supply Chain Governance

New Shadow AI Detection capability enables transparency and risk management, guarding against uncontrolled use of AI models and API calls
Confluent Names New Leaders for Partners and APAC

Confluent Names New Leaders for Partners and APAC

Kamal Brar transitions to Senior Vice President Global Partners and Technology Group; Greg Taylor Joins as Senior Vice President and General Manager for APAC
Fastly Empowers Partners to Strengthen Customer Security and Expand Services with New Certification Program

Fastly Empowers Partners to Strengthen Customer Security and Expand Services with New Certification Program

Sydney, 17 November 2025 – Fastly, Inc. (NYSE: FSLY), a leader in global edge cloud platforms, has announced the launch of its new partner certification program, the Fastly Certified Services Partner Program. This new initiative is designed for technical security professionals at partner organisations, providing them with comprehensive training and ...
Dynatrace and Microsoft Partner to Scale Enterprise Customer AI Initiatives

Dynatrace and Microsoft Partner to Scale Enterprise Customer AI Initiatives

New integration enables customers to automate majority of cloud operations tasks
Modern 42 Appointed BeyondTrust’s First Advanced Implementation Partner in Australia

Modern 42 Appointed BeyondTrust’s First Advanced Implementation Partner in Australia

Canberra, 17 November 2025 – Modern 42, a specialist provider of Identity and Access Management, Privileged Access Management, CIAM and Securing Entra ID, today announced that it has been appointed the first BeyondTrust Advanced Implementation Partner in Australia. Appointed initially as a BeyondTrust partner in 2023, the new advanced implementation ...
Dynatrace Announces New Cloud Operations Solution for Microsoft Azure

Dynatrace Announces New Cloud Operations Solution for Microsoft Azure

Provides customers with comprehensive visibility into their Azure environments, enabling automatic remediation, prevention, and optimisation
Barracuda Identifies Three Concerning Trends in Email-Based Cyber Attacks

Barracuda Identifies Three Concerning Trends in Email-Based Cyber Attacks

 Over the last month, Barracuda threat analysts have seen the following notable developments in email-based threats targeting organisations: New tools and tactics for the Tycoon 2FA phishing kit Invisible characters that help Cephas kit evade scanners and rules A sophisticated attack involving steganography (image-concealed ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This