The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Enhancing Software Development the EveryOps Way

Enhancing Software Development the EveryOps Way

Software has become the undisputed driver of business today. As the reliance on software has grown, so have the moving parts needed to make it, especially amid the rise of generative artificial intelligence (GenAI). As a result, software development has become a complex process, potentially hampering innovation.  According to Deloitte, GenAI usage ...
Why Agentic Automation Is the Next Evolution in Advanced Manufacturing

Why Agentic Automation Is the Next Evolution in Advanced Manufacturing

Policy efforts like Future Made in Australia emphasise a renewed national commitment to rebuilding sovereign capability and invigorating advanced manufacturing. One of the most promising developments enabling this shift is agentic automation – a new frontier in intelligent enterprise automation that is already beginning to reshape how leading ...
The Blur Between Cloud, OT, and Critical Infrastructure

The Blur Between Cloud, OT, and Critical Infrastructure

Cordant’s DevSecOops podcast brings together trio Tom, Scott, and James for what turned into a timely, thoughtful discussion about the intersections of cloud technology, operational technology (OT), and critical infrastructure. With recent news out of the US and Australia about the US regulatory crackdown on Chinese smart vehicle tech due to ...
Shaping The Future Of AI: How Australia’s National AI Capability Plan Sets The Stage For Ethical And Secure AI Adoption

Shaping The Future Of AI: How Australia’s National AI Capability Plan Sets The Stage For Ethical And Secure AI Adoption

As artificial intelligence (AI) continues to revolutionise industries worldwide, its rapid advancement brings both vast opportunities and significant responsibilities. AI has the potential to transform sectors like healthcare, finance, manufacturing, and education, driving innovation and efficiency in unprecedented ways. However, as AI becomes embedded ...
How a Veteran Project Manager Tames Cyber Chaos

How a Veteran Project Manager Tames Cyber Chaos

Recently, on DevSecOops podcast; Hosts Tom Walker, James Vincent, and Scott Fletcher bring on a special guest, Natalie Haslam, an industry veteran with 25 years of project management experience within traditional IT, application development, and more recently, cybersecurity. Natalie’s reflection on the challenges of delivering cyber projects in the ...
What in the Cloud?

What in the Cloud?

DevSecOops podcast hosts Tom Walker, James Vincent, and Scott Fletcher debate which cloud platform reigns supreme. Choosing between major cloud providers can get overwhelming. The three Co-Hosts set aside their usual neutrality to champion AWS (Amazon Web Services), Microsoft Azure, and Oracle Cloud Infrastructure (OCI), diving deep into what each ...
How Analysing 700,000 Security Incidents Helped Our Understanding of Living Off the Land Tactics

How Analysing 700,000 Security Incidents Helped Our Understanding of Living Off the Land Tactics

This article shares initial findings from internal Bitdefender Labs research into Living off the Land (LOTL) techniques. Our team at Bitdefender Labs, comprised of hundreds of security researchers with close ties to academia, conducted this analysis as foundational research during the development of our GravityZone Proactive Hardening and Attack ...
Postmortem: Australian Retailer, The Iconic Incident Review

Postmortem: Australian Retailer, The Iconic Incident Review

In 2024, a sophisticated credential stuffing attack targeted The Iconic, a leading Australian online fashion retailer. This breach compromised customer accounts, raising serious concerns about cybersecurity measures within the retail industry. Affected individuals faced unauthorized transactions and potential data exposure. The Iconic has initiated a ...
No results found.

In The News

Seven Critical Vulnerabilities Open ChatGPT to Data Theft and Hijacking

Seven Critical Vulnerabilities Open ChatGPT to Data Theft and Hijacking

Tenable research reveals hidden AI flaws that allow data exfiltration, safety override, and persistent compromise within ChatGPT
Check Point Software Achieves the Highest Security Effectiveness at 99.59% in NSS Labs Enterprise Firewall Test

Check Point Software Achieves the Highest Security Effectiveness at 99.59% in NSS Labs Enterprise Firewall Test

As AI transforms cyber threats, NSS Labs recognition affirms Check Point’s leadership in prevention-first security, outperforming the competition
ASUG Tech Connect 2025 Taps SecurityBridge To Discuss SAP Cybersecurity Strategies

ASUG Tech Connect 2025 Taps SecurityBridge To Discuss SAP Cybersecurity Strategies

The SecurityBridge presentation aligns with the technical education focus by detailing the use of context- and risk-based multi-factor authentication (MFA) and step-up authentication via TrustBroker, along with security monitoring, vulnerability management, and incident response practices. In addition, the speakers will also discuss integrating ...
CrowdStrike Expands the Agentic Security Workforce, Trained on the Knowledge of Elite Analysts

CrowdStrike Expands the Agentic Security Workforce, Trained on the Knowledge of Elite Analysts

New mission-ready agents work in concert with custom-built and third-party agents to automate high-impact workflows across the full security lifecycle
SecurityBridge Announces “Secure Together New York 2025” A Complimentary SAP Security Event at Accenture’s Manhattan Office

SecurityBridge Announces “Secure Together New York 2025” A Complimentary SAP Security Event at Accenture’s Manhattan Office

The company will join forces with partners Accenture, Bowbridge, Fortinet, NextLabs, and Saviynt to deliver a full day of expert sessions exploring the future of SAP security. These sessions will cover AI-powered segregation of duties (SoD) controls, quantum-resistant strategies, and defense mechanisms against modern ransomware and file-based exploits.
CrowdStrike Unveils Charlotte Agentic SOAR to Orchestrate the Agentic Security Workforce

CrowdStrike Unveils Charlotte Agentic SOAR to Orchestrate the Agentic Security Workforce

The orchestration layer of the Agentic Security Platform unites intelligent agents to coordinate real-time agent-to-agent and analyst-to-agent collaboration 
CrowdStrike Delivers Zero-Touch Discovery and Unified Visibility for XIoT Security

CrowdStrike Delivers Zero-Touch Discovery and Unified Visibility for XIoT Security

New Falcon for XIoT innovations bring deeper industrial and OT telemetry into the Falcon platform, eliminating blind spots and complexity across environments
Cisco Launches Cisco IQ, the Unified AI-Powered Experience That Connects the Entire Customer Journey

Cisco Launches Cisco IQ, the Unified AI-Powered Experience That Connects the Entire Customer Journey

• Cisco IQ brings real-time insights, on-demand assessments, troubleshooting and personalized learning, automation and agents from across professional services and support together in a single AI-powered interface, helping customers plan, deploy, manage, secure and optimize technology investments with greater speed and simplicity. • With Cisco IQ's ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This