The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Alleged Russian Hackers Target Norwegian Dam

Alleged Russian Hackers Target Norwegian Dam

Why this cyber attack on a Norwegian dam should have you paying attention
How Consumer Data Rights Are Changing the Way Australian Businesses Operate

How Consumer Data Rights Are Changing the Way Australian Businesses Operate

Introduction Consumer data rights reforms in Australia are reshaping how enterprises handle personal information by introducing operational, legal, and technical responsibilities that apply across every part of the business. That includes how data is collected, how it is stored, and how it moves between internal teams and external systems. John ...
The Rising Role of Citizen Automators In Business Innovation

The Rising Role of Citizen Automators In Business Innovation

Australia is facing a deepening shortage of technology skills in the coming years, putting pressure on businesses that need developers and other ICT professionals to innovate successfully. But new tools are enabling the rise of citizen developers to fill these tech gaps, here’s how.
Identity: The New Currency in Cybersecurity

Identity: The New Currency in Cybersecurity

Digital identity is now cybercriminals' top target. With data breaches up 78% globally, businesses must invest in Identity & Access Management to protect employees and customers—it's both a security imperative and ethical obligation.
Qantas Breached and Customers are Fuming

Qantas Breached and Customers are Fuming

Earlier today it was announced across mainstream media channels that Qantas suffered a data breach, affecting approximately six million customers. The breach was linked to a cyber attack targeting a third-party platform used by the prominent airline’s contact centre. Exposed information includes names, email addresses, phone numbers, and frequent ...
What Happens When the World’s Biggest Vulnerability Database Goes Dark?

What Happens When the World’s Biggest Vulnerability Database Goes Dark?

MITRE, the cornerstone of global vulnerability tracking, announcing it could go dark. For years, the field had relied on this single repository, the bedrock for tracking software vulnerabilities. What happens when that rug is pulled from beneath an entire industry? Tal Zarfati, Architect Lead at JFrog Security, still recalls the tremor this news sent ...
Minimising Third-party Risk

Minimising Third-party Risk

Minimise third-party risk with smart vendor management. Learn how to protect data, ensure compliance, and streamline reviews with automation.
The Blind Spot In Your Cyber Strategy

The Blind Spot In Your Cyber Strategy

 Recently on the DevSecOops podcast, Hosts Tom Walker, James Vincent, and Scott Fletcher unpacked the modern threats in the cybersecurity space. With years of experience in IT and cybersecurity, the hosts shared real world experiences, from everyday technical mishaps to nation sponsored cyberattacks, offering practical advice for staying secure amid ...
No results found.

In The News

KnowBe4 Predicts the Agentic AI Revolution Will Reshape Cybersecurity in 2026

KnowBe4 Predicts the Agentic AI Revolution Will Reshape Cybersecurity in 2026

KnowBe4 releases cybersecurity predictions for 2026 
Research Proves Billions in GDP and Thousands More Jobs If Government Backs Australian-owned Companies

Research Proves Billions in GDP and Thousands More Jobs If Government Backs Australian-owned Companies

New economic modelling has found that awarding a greater share of Australian Defence procurement, covering both services and materiel, to Australian-owned and operated prime contractors would inject billions annually into the nation's GDP and create tens of thousands of jobs, whilst also strengthening Australia’s sovereign capability at a time of ...
PyTorch Users at Risk: Unveiling 3 Zero-Day PickleScan Vulnerabilities

PyTorch Users at Risk: Unveiling 3 Zero-Day PickleScan Vulnerabilities

AI Model Scanning as the First Layer of Security JFrog Security Research found 3 zero-day critical vulnerabilities in PickleScan, which would allow attackers to bypass the most popular Pickle model scanning tool. PickleScan is a widely used, industry-standard tool for scanning ML models and ensuring they contain no malicious content. Each discovered ...
CrowdStrike Named AWS 2025 Global Security Partner & Global Marketplace Partner of the Year

CrowdStrike Named AWS 2025 Global Security Partner & Global Marketplace Partner of the Year

CrowdStrike also recognized as Canada, Iberia, MENA, and SSA Technology Partner of the Year
Wasabi Strengthens Cloud Storage Security with Covert Copy Capability

Wasabi Strengthens Cloud Storage Security with Covert Copy Capability

Cloud storage company Wasabi has expanded its cyber resilient cloud storage capabilities with Covert Copy, a patent pending, advanced ransomware-resistant storage solution that allows users to create a locked, hidden copy of storage buckets to ensure critical data remains untouchable, even in the event of a cyberattack. The selected data is logically ...
CrowdStrike Delivers Agentic Security to HPE Unleash AI Partner Program

CrowdStrike Delivers Agentic Security to HPE Unleash AI Partner Program

CrowdStrike and HPE deliver unified protection for HPE Private Cloud AI, co-developed with NVIDIA, empowering enterprises to accelerate secure, high-performance AI at scale
CrowdStrike Stops Cloud Attacks in Seconds with Real-Time Cloud Detection and Response Innovations

CrowdStrike Stops Cloud Attacks in Seconds with Real-Time Cloud Detection and Response Innovations

New real-time detection engine, cloud Indicators of Attack, and automated response actions give SOC teams real-time protection at machine speed
CrowdStrike Operationalizes and Secures Agentic AI Workloads on AWS

CrowdStrike Operationalizes and Secures Agentic AI Workloads on AWS

CrowdStrike named an inaugural AWS Agentic AI Specialization Partner, recognized for its proven expertise in securing and operationalizing intelligent, agentic AI systems at scale
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This