The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why You Need Speed and Trust for Modern Software Delivery

Why You Need Speed and Trust for Modern Software Delivery

Introduction Businesses are creating and launching software faster than ever to keep pace with competitors and drive innovation. The focus on increased speed has created a few trends: Developer productivity is no longer only measured by speed, but quality and security as well Many development teams rely on platform engineering to build tools ...
Is GenAI Outsmarting Us or Just Making Us Lazy?

Is GenAI Outsmarting Us or Just Making Us Lazy?

 Is AI turning our brains to mush? Hosts Phoebe Goh and Mekka Williams are joined by Karissa “KB” Breen, the sharp-tongued cybersecurity journalist behind the popular podcast, KBKast, for a no-holds-barred look at how AI is rewriting the rules of the game. From the sneaky rise of unsanctioned “shadow AI” tools to the unnervingly convincing ...
The Growing Tug-of-War Between Scammers and Defenders: What Australian Businesses Need to Do to Stay Safe

The Growing Tug-of-War Between Scammers and Defenders: What Australian Businesses Need to Do to Stay Safe

Scams are no longer on the fringes of criminal activity. They have become a mainstream threat for Australians, targeting both consumers and businesses with increasing sophistication. According to Scamwatch, Australians lost $2.03 billion to scams in 2024. This year’s Scams Awareness Week (25-29 August 2025) highlights this escalating issue and shows ...
Claroty Team82 Uncovers Critical Vulnerabilities in Axis Video Surveillance Products

Claroty Team82 Uncovers Critical Vulnerabilities in Axis Video Surveillance Products

Turning Camera Surveillance on its Axis
Why Asia Pacific Organisations Must Rethink Inline Security After a Wave of Data Breaches

Why Asia Pacific Organisations Must Rethink Inline Security After a Wave of Data Breaches

Asia Pacific is in the midst of a cybersecurity reckoning following a spate of major data breaches including Qantas and Louis Vuitton in Australia, attacks on Singapore’s critical infrastructure, a surge of ransomware threats in India, and most recently a successful attack on Google. While most organisations are focused on enhancing cybersecurity, one ...
Unmasking Identity Risks Before They Become Breaches

Unmasking Identity Risks Before They Become Breaches

An effective identity security strategy must move beyond siloed tools and reactive policies. It requires unified visibility across all users and assets, contextual understanding of privilege, and automated enforcement of least-privilege principles.
Cyber-securing Enterprises, the AI Way

Cyber-securing Enterprises, the AI Way

“...Therefore, send not to know For whom the bell tolls, It tolls for thee.” John Donne, “No man is an island” Introduction No enterprise is an island of security when it comes to cyber-attacks. Australia suffered a staggering 47 million data breaches in 2024 — equivalent to one attack every second — representing a twelvefold increase ...
The Empty Boat Mindset – Rethinking Australia’s Cyber Defenses

The Empty Boat Mindset – Rethinking Australia’s Cyber Defenses

As cyberattacks rise across Australia's critical infrastructure, from airlines to superannuation funds, a quiet storm is forming beneath the surface, not just in code or firewalls, but in the mindsets shaping our national response. Surprisingly, a solution to our cybersecurity maturity might not be in quantum encryption or artificial intelligence but ...
No results found.

In the News

New Phishing Campaigns Weaponise Reserved Domain Name Space  

New Phishing Campaigns Weaponise Reserved Domain Name Space  

New research from Infoblox Threat Intel shows how criminals twist a core part of the internet to slip past many of today’s standard security checks. Phishing attacks are everywhere, but historically, their tactics follow clear patterns and trends. Research by Infoblox Threat Intel uncovers an anomaly – a new method utilised by cybercriminals to ...
Saviynt Bolsters Its AI-Powered Identity Security Through Integrations With Amazon Quick

Saviynt Bolsters Its AI-Powered Identity Security Through Integrations With Amazon Quick

New Amazon Q integrations deliver deeper context and agentic AI workflows for identity teams Sydney – February 27, 2026 – Saviynt, a leading provider of AI-powered identity security solutions, has announced a new agentic AI-based conversational capability built on Amazon Quick and the general availability of its Amazon Quick Index ...
ManageEngine Introduces Causal Intelligence and Autonomous AI to IT Operations for Faster Incident Response

ManageEngine Introduces Causal Intelligence and Autonomous AI to IT Operations for Faster Incident Response

New Site24x7 Capabilities Combine Domain-Aware Correlations, autonomous AI, And Workflow Orchestration To Drive Self-Healing IT Operations Delivers faster root-cause identification with causal intelligence–driven correlation Improves incident response efficiency using AI Enables controlled remediation at scale through governed workflow ...
Darktrace Annual Threat Report Finds Identity Is Now Primary Target as Global Vulnerabilities Rise 20%

Darktrace Annual Threat Report Finds Identity Is Now Primary Target as Global Vulnerabilities Rise 20%

• Only 42% of APJ organisations have a formal policy for safe AI use • Registered software vulnerabilities rose 20% in 2025, even as attackers increasingly shifted toward credential abuse over traditional exploitation • 32 million phishing emails detected globally with a 28% increase in QR code-based attacks as email attacks continue to grow in ...
Oracle Red Bull Racing Extends Title Partnership With Oracle in Multi-Year Deal to Power a New Era of Data-Driven Performance

Oracle Red Bull Racing Extends Title Partnership With Oracle in Multi-Year Deal to Power a New Era of Data-Driven Performance

The most integrated F1 team technology partnership accelerates innovation, with Red Bull Ford Powertrains’ power unit developed on Oracle Cloud Infrastructure and a ground-breaking AI-powered strategy agent launching trackside this season
AI-First Businesses Are Paying an “AI Speed Tax” When Recovering From Cybersecurity Incidents, According to Fastly’s Global Security Research Report

AI-First Businesses Are Paying an “AI Speed Tax” When Recovering From Cybersecurity Incidents, According to Fastly’s Global Security Research Report

Fast moving AI adopters are paying the price with 100 day longer recovery times, higher breach costs and expanding attack surfaces SYDNEY/AUCKLAND – 26 February, 2026 – Fastly, Inc. (NASDAQ: FSLY), a leader in global edge cloud platforms, today published the Australian and New Zealand findings from its fourth annual Global Security Research Report. ...
xReality Group Limited (ASX: XRG) Interim Financial Report for the Half Year Ended 31 December 2025

xReality Group Limited (ASX: XRG) Interim Financial Report for the Half Year Ended 31 December 2025

XRG delivered its strongest half-year performance to date, with total revenue exceeding $10.4 million, representing 41% growth on the prior corresponding period, and EBITDA of $2.6 million, up 190%. This performance was driven by strong momentum in Operator XR, which continues to scale as the Group’s primary growth engine. Operations Summary: ...
VAST Data Unveils a Platform for Secure, Trusted, and Self-Learning Agentic AI Systems

VAST Data Unveils a Platform for Secure, Trusted, and Self-Learning Agentic AI Systems

VAST Data has announced the VAST Data PolicyEngine and VAST Data TuningEngine, two new computing services that will allow the next generation of the VAST AI Operating System to deliver key requirements for organisations looking to scale their mission-critical AI initiatives. Specifically, PolicyEngine and TuningEngine work in tandem within the VAST ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This