The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How Consumer Data Rights Are Changing the Way Australian Businesses Operate

How Consumer Data Rights Are Changing the Way Australian Businesses Operate

Introduction Consumer data rights reforms in Australia are reshaping how enterprises handle personal information by introducing operational, legal, and technical responsibilities that apply across every part of the business. That includes how data is collected, how it is stored, and how it moves between internal teams and external systems. John ...
The Rising Role of Citizen Automators In Business Innovation

The Rising Role of Citizen Automators In Business Innovation

Australia is facing a deepening shortage of technology skills in the coming years, putting pressure on businesses that need developers and other ICT professionals to innovate successfully. But new tools are enabling the rise of citizen developers to fill these tech gaps, here’s how.
Identity: The New Currency in Cybersecurity

Identity: The New Currency in Cybersecurity

Digital identity is now cybercriminals' top target. With data breaches up 78% globally, businesses must invest in Identity & Access Management to protect employees and customers—it's both a security imperative and ethical obligation.
Qantas Breached and Customers are Fuming

Qantas Breached and Customers are Fuming

Earlier today it was announced across mainstream media channels that Qantas suffered a data breach, affecting approximately six million customers. The breach was linked to a cyber attack targeting a third-party platform used by the prominent airline’s contact centre. Exposed information includes names, email addresses, phone numbers, and frequent ...
What Happens When the World’s Biggest Vulnerability Database Goes Dark?

What Happens When the World’s Biggest Vulnerability Database Goes Dark?

MITRE, the cornerstone of global vulnerability tracking, announcing it could go dark. For years, the field had relied on this single repository, the bedrock for tracking software vulnerabilities. What happens when that rug is pulled from beneath an entire industry? Tal Zarfati, Architect Lead at JFrog Security, still recalls the tremor this news sent ...
Minimising Third-party Risk

Minimising Third-party Risk

Minimise third-party risk with smart vendor management. Learn how to protect data, ensure compliance, and streamline reviews with automation.
The Blind Spot In Your Cyber Strategy

The Blind Spot In Your Cyber Strategy

 Recently on the DevSecOops podcast, Hosts Tom Walker, James Vincent, and Scott Fletcher unpacked the modern threats in the cybersecurity space. With years of experience in IT and cybersecurity, the hosts shared real world experiences, from everyday technical mishaps to nation sponsored cyberattacks, offering practical advice for staying secure amid ...
How Wiz Is Rewriting the Cloud Security Story

How Wiz Is Rewriting the Cloud Security Story

In Episode 7 of the DevSecOops podcast, hosts Tom Walker, Scott Fletcher, and James Vincent sat down with Matt Preswick, Principal Solutions Engineer at Wiz APJ, to unpack how Wiz has become an emerging favourite of both engineering teams and the executive suite. Beyond that, they also discussed the broader issue of the everyday realities of cloud ...
No results found.

In The News

Trend Micro to Introduce Most Comprehensive Offering for Enterprise AI Risk Management

Trend Micro to Introduce Most Comprehensive Offering for Enterprise AI Risk Management

AI Application Security will accompany a package of new solution capabilities at AWS re:Invent
Big Sales, Small Tells: Staying Safe From Online Scams This Black Friday And Cyber Monday

Big Sales, Small Tells: Staying Safe From Online Scams This Black Friday And Cyber Monday

With the year’s biggest shopping event right around the corner, Microsoft's National Security Officer, Mark Anderson, shares tips on how consumers can protect themselves from online scams
Palo Alto Networks Forecasts ​​6 Predictions on Securing the New AI Economy for 2026

Palo Alto Networks Forecasts ​​6 Predictions on Securing the New AI Economy for 2026

2026 will be the “Year of the Defender,” where autonomous AI defence is the only way to combat AI-driven identity attacks, data poisoning and quantum risks
Palo Alto Networks Announces New Prisma AIRS Integrations With Factory, Glean, IBM and ServiceNow to Secure the AI Agent Boom

Palo Alto Networks Announces New Prisma AIRS Integrations With Factory, Glean, IBM and ServiceNow to Secure the AI Agent Boom

Allowing customers to safely accelerate AI agent adoption across the enterprise while removing security roadblocks
BioCatch Connect 2.0 Delivers Advanced Fraud and Financial Crime-fighting Capabilities to World’s Banks

BioCatch Connect 2.0 Delivers Advanced Fraud and Financial Crime-fighting Capabilities to World’s Banks

BioCatch, which prevents financial crime by recognising patterns in human behaviour, today announced a major upgrade to its market-leading digital fraud- and financial crime-detection platform. BioCatch Connect 2.0 features both BioCatch Align, a singular, next-generation software development kit (SDK) that unifies signal collection (behaviour, device, ...
Check Point Software Collaborates with Microsoft to Deliver Enterprise-Grade AI Security for Microsoft Copilot Studio

Check Point Software Collaborates with Microsoft to Deliver Enterprise-Grade AI Security for Microsoft Copilot Studio

As AI reshapes enterprise workflows, Check Point works with Microsoft to enable secure agent innovation powered by real-time guardrails, DLP, and threat prevention REDWOOD CITY, CA. November 18, 2025 -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced it is collaborating ...
Rapid7 Delivers Smarter Network Security with Curated Intelligence Rules for AWS Network Firewall

Rapid7 Delivers Smarter Network Security with Curated Intelligence Rules for AWS Network Firewall

Rapid7's Curated Intelligence Rules for AWS Network Firewall delivers threat intelligence directly into customers’ AWS environments to address the operational challenges security teams face when manually managing and updating firewall rules to keep pace with evolving threats.
Kyndryl Announces Agentic AI Digital Trust to Support Governance of AI Agents at Scale

Kyndryl Announces Agentic AI Digital Trust to Support Governance of AI Agents at Scale

New services address emerging risks as organisations expand agentic AI across mission-critical environments     SYDNEY, November 20, 2025 – Kyndryl (NYSE: KD), a leading provider of mission-critical enterprise technology services, today announced Kyndryl Agentic AI Digital Trust to help enterprises securely manage and scale their agentic AI ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This