The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Improving Australia’s Resilience Against Growing Cyber Threats

Improving Australia’s Resilience Against Growing Cyber Threats

By focusing on measurable outcomes, such as speed of detection and response, rather than compliance checklists, Australia can build a digital economy that is not only innovative and productive, but also secure against the rising tide of cyber threats.
Navigating Hybrid Cloud Security in the AI Era as Regulations Tighten

Navigating Hybrid Cloud Security in the AI Era as Regulations Tighten

Introduction As hybrid cloud infrastructures continue to evolve, they are increasingly subject to AI-driven risks, complex data environments, and growing cyberthreats. Our recent 2025 Hybrid Cloud Security Survey underscores the rising pressure faced by organisations worldwide as AI technologies disrupt traditional security frameworks. With a 17 ...
From Chaos to Command: Secure Communications at Scale for Public Safety

From Chaos to Command: Secure Communications at Scale for Public Safety

Introduction When it comes to public safety, every second counts. If communication breaks down, so does the response - leading to losses in time, coordination, effectiveness, and public trust. During large-scale incidents, a persistent “communications gap” emerges: the critical distance between information being available and that same information ...
Securing Australian Organisations in the Quantum Era

Securing Australian Organisations in the Quantum Era

Australian organisations are under-prepared for the cybersecurity threat of quantum and should take these steps to minimise disruption as the technology takes hold.
Deepfakes Are Spiralling out of Control, but How Far Will IT Go?

Deepfakes Are Spiralling out of Control, but How Far Will IT Go?

David Wiseman, Vice President of Secure Communications at BlackBerry spoke with me about the increase of deepfakes which are our own voices and countenance that can be fabricated to present like it's us. But its not us. “Anyone’s voice can be deep faked at this point,” warned Wiseman. “Anyone with some basic set of tooling can generate that deep ...
The Hidden Costs to Consider When Selecting a Cyber Security Vendor

The Hidden Costs to Consider When Selecting a Cyber Security Vendor

Evaluating cyber security vendors through the lens of their vulnerability management practices - including frequency, severity, and time-to-patch - is no longer optional. It’s an essential part of any strategic approach to risk mitigation and long-term operational resilience.
The CEO’s Cyber Equation – Can Your Business Outpace the Attacker?

The CEO’s Cyber Equation – Can Your Business Outpace the Attacker?

"It takes years to build trust, but only minutes for a breach to break it." Cybersecurity is no longer only a technical concern. It is a leadership imperative that has a direct impact on trust, reputation, and business survival. Even if your company has never experienced a breach, attackers are continually probing your systems, seeking weaknesses. ...
A CISO’s Love Letter to the Board – Cyber Risk Quantified

A CISO’s Love Letter to the Board – Cyber Risk Quantified

Cybersecurity has a communication problem: CISOs still speak in technical jargon while boards listen for financial impact. This byline reframes cyber risk as a business language of dollars and cents — the true “love language” of executives. Drawing on new research, it argues that risk quantification is the CISO’s secret weapon, shifting the focus from ...
No results found.

In the News

$12.5M Investment: GitHub and Other Industry Leaders Join Forces for Open Source Security

$12.5M Investment: GitHub and Other Industry Leaders Join Forces for Open Source Security

Investing in the People Shaping Open Source and Securing the Future Together See how GitHub is investing in open source security funding maintainers, partnering with Alpha-Omega, and expanding access to help reduce burden and strengthen software supply chains. Open source has always been about community. It’s about maintainers who review pull ...
CrowdStrike and Nebius Partner to Unify Security Across the Next Generation of AI Cloud Infrastructure

CrowdStrike and Nebius Partner to Unify Security Across the Next Generation of AI Cloud Infrastructure

CrowdStrike’s Falcon platform extends enterprise-grade cybersecurity to Nebius’s AI cloud platform, supporting high-performance environments built for AI innovators  March 17, 2026 CrowdStrike (NASDAQ: CRWD) and Nebius (NASDAQ: NBIS) today announced a major global partnership to bring the CrowdStrike Falcon® platform to Nebius AI Cloud, extending ...
World Wide Technology and CrowdStrike Launch Securing AI Lab Within WWT’s AI Proving Ground

World Wide Technology and CrowdStrike Launch Securing AI Lab Within WWT’s AI Proving Ground

The Securing AI Lab, built on NVIDIA AI factories within WWT’s AI Proving Ground, provides enterprises a validated path to secure, production-ready AI March 17, 2026 World Wide Technology (WWT) and CrowdStrike (NASDAQ: CRWD) today announced the launch of the Securing AI with CrowdStrike Lab within WWT’s AI Proving Ground. Built on NVIDIA AI ...
HPE Threat Labs Report Reveals Cyber Adversaries Are Morphing Their Business Model to Scale and Accelerate Attacks

HPE Threat Labs Report Reveals Cyber Adversaries Are Morphing Their Business Model to Scale and Accelerate Attacks

Cyber adversaries adopt business-like models to target every major sector, HPE finds Generative AI used to produce synthetic voices, images and videos for targeted impersonation fraud campaigns World-class network threat research expertise and experience brought together in new HPE Threat Labs Sydney, AUSTRALIA – March 18, 2026 – HPE (NYSE: ...
Check Point Enables Email Security Telemetry to Flow Into CrowdStrike Falcon Next-Gen SIEM

Check Point Enables Email Security Telemetry to Flow Into CrowdStrike Falcon Next-Gen SIEM

REDWOOD CITY, CA. – March 17, 2026 – Check Point Software Technologies Ltd. (NASDAQ: CHKP) today announced a new integration that enables email security telemetry from Check Point Email Security to flow into CrowdStrike Falcon® Next-Gen SIEM.  The integration allows security teams to ingest and correlate email-based activity with downstream identity ...
Ping Identity: Only 9% of Organisations Are Prepared for Continuous AI-Driven Identity Threats

Ping Identity: Only 9% of Organisations Are Prepared for Continuous AI-Driven Identity Threats

An independent global study finds that organisations meeting verified trust criteria achieve 51% higher transaction conversion and 43% lower fraud losses. DENVER, March 17, 2026 – Ping Identity, a leader in securing digital identities for the world's largest enterprises, released independent research showing that organisations that have ...
Genetec Enables Enterprise Cloud Modernisation With New Access Control Capabilities in Security Center SaaS

Genetec Enables Enterprise Cloud Modernisation With New Access Control Capabilities in Security Center SaaS

Updates simplify visitor workflows, accelerate daily operations, and expand enterprise hardware support. MONTRÉAL, March 17, 2026 — Genetec Inc. (“Genetec”), the global leader in enterprise physical security software, today announced new access control enhancements to Security Center SaaS. The updates simplify day-to-day operations for security teams ...
Saviynt Appoints Alex Lei to Drive Identity Security Growth Across Asia Pacific and Japan

Saviynt Appoints Alex Lei to Drive Identity Security Growth Across Asia Pacific and Japan

Enterprise security veteran to lead regional sales strategy as organisations across APJ strengthen identity-first cybersecurity Key Highlights: The appointment comes as organisations across APJ increase investment in identity security to support cloud adoption, AI initiatives, and evolving cyber risks Lei will oversee customer acquisition, ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This