The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Microsoft’s Platforms and Services Prioritise Security from Inception, Rather than as an Afterthought

Microsoft’s Platforms and Services Prioritise Security from Inception, Rather than as an Afterthought

Overview Microsoft’s long-standing Executive, Bret Arsenault, Corporate Vice President and Chief Cybersecurity advisor at Microsoft, detailed Microsoft’s Secure Future Initiative (SFI) - their strategic approach to addressing emerging cyber threats and managing secure software development. With decades of experience at Microsoft, what Arsenault ...
Why Cybercriminals Never Take a Day Off

Why Cybercriminals Never Take a Day Off

Cyber criminals don’t take days off. They hit when we’re taking some ‘down time’. Why? Because our guards are down and it’s a perfect time to strike. Gerry Sillars, Vice President of APJ at Semperis discusses the relentless nature of cyber threats and the realities of ransomware attacks, as revealed in Semperis' latest holiday risk report.“Think ...
Securing Society: Cyber-Physical Safety in Australia’s Critical Infrastructure

Securing Society: Cyber-Physical Safety in Australia’s Critical Infrastructure

Why Cyber-Physical Security Must Be a Leadership Priority   Australia’s critical infrastructure faces escalating cyber-physical threats, with adversaries targeting industrial control systems, operational technology (OT) and critical medical services. Security failures in these environments don’t just disrupt operations; they pose real risks to ...
Are Defenders Prepped for the Next Cyber Chapter?

Are Defenders Prepped for the Next Cyber Chapter?

Securing AI isn’t just about defending against cyber threats - it’s about establishing governance frameworks that ensure AI is used responsibly. With AI adoption accelerating, organisations are needing to align leadership, compliance teams, and IT security to manage risks without stifling innovation. Janice Le, General Manager of Microsoft Security, ...
Zero Trust – The Secret Sauce Behind Breach Readiness

Zero Trust – The Secret Sauce Behind Breach Readiness

Discover how ColorTokens' integrated Zero Trust solution enhances security by unifying Identity Governance, Microsegmentation, and Software-Defined Perimeters.
Cooperate or Collapse: The Prisoner’s Dilemma in Cybersecurity Strategy

Cooperate or Collapse: The Prisoner’s Dilemma in Cybersecurity Strategy

Introduction In the interconnected world of cybersecurity, organisations, nations, and individuals constantly confront strategic decisions regarding resource allocation, information sharing, and defence against cyber threats. One of the most compelling frameworks for analysing these challenges is the Prisoner’s Dilemma, a foundational game theory ...
Generative AI: Striking a Balance between Innovation and Overreliance

Generative AI: Striking a Balance between Innovation and Overreliance

The threats posed by AI are distinct in many ways from those that target user identity, software code, or business data. While traditional cybersecurity risks often focus on protecting specific assets, AI introduces new challenges - such as hallucinations, deepfakes, and ethical concerns - that can impact decision-making and public trust. The key for ...
Bridging AI Readiness in Australia

Bridging AI Readiness in Australia

With AI reshaping industries at unprecedented rates, findings from the 2024 CISCO Live Report suggest Australian companies are trailing, with only four percent ready to leverage the technology, a decline from the previous year. Here's how we bridge the gap to AI readiness for Australian companies.
No results found.

In The News

Dynatrace Achieves the AWS Generative AI Competency

Dynatrace Achieves the AWS Generative AI Competency

New milestone affirms Dynatrace ability to deliver enterprise-grade observability for generative AI applications on AWS
CyberArk Is a Proud Participant in the Microsoft Security Store Partner Ecosystem

CyberArk Is a Proud Participant in the Microsoft Security Store Partner Ecosystem

Streamlined deployment and seamless integration of pre-validated solutions  Customers get accelerated access to CyberArk’s trusted, innovative identity security platform  CyberArk and Microsoft are collaborating to shape the future of cybersecurity 
SailPoint Advances Identity Security to Deliver Visibility, Control and Scale Across Every Enterprise Identity

SailPoint Advances Identity Security to Deliver Visibility, Control and Scale Across Every Enterprise Identity

Delivering new capabilities in cloud, non-employee risk management, machine identity, and connectivity to strengthen enterprise identity security
Databricks Announces Data Intelligence for Cybersecurity 

Databricks Announces Data Intelligence for Cybersecurity 

The only unified platform for AI agent systems, enabling more accurate, real-time response against AI-driven threats
Check Point Enters Next Level of Strategic Partnership with Wiz to Deliver Integrated CNAPP and Cloud Network Security Solution

Check Point Enters Next Level of Strategic Partnership with Wiz to Deliver Integrated CNAPP and Cloud Network Security Solution

Building on February’s partnership announcement, Check Point and Wiz unveil unified Cloud Security Solution with Real-Time Visibility and AI-Powered Prevention 
New ISACA Study: Fewer Australian Enterprises Are Training Staff For Security Roles Despite Understaffed Teams

New ISACA Study: Fewer Australian Enterprises Are Training Staff For Security Roles Despite Understaffed Teams

ISACA’s State of Cybersecurity 2025 survey report also finds that 70 percent of security professionals expect the demand for technical cybersecurity pros to rise in the next year
Elastic Outscores Top Competitors for Threat Prevention in AV-Comparatives Endpoint Security Rankings

Elastic Outscores Top Competitors for Threat Prevention in AV-Comparatives Endpoint Security Rankings

Elastic Security stops sophisticated attacks across 50 simulated scenarios
Blue Connections IT Achieves Carbon Neutral Certification for The Third Consecutive Year

Blue Connections IT Achieves Carbon Neutral Certification for The Third Consecutive Year

The best-in-class IT solutions provider continues to lead on emissions reduction and operational sustainability, achieving Climate Active Carbon Neutral certification for organisations in FY24
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This