The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

IT-OT Convergence: What Happens When Two Worlds Collide?

IT-OT Convergence: What Happens When Two Worlds Collide?

​Most people thought that cybersecurity is all about data breaches, suspicious links, or adversaries trying to get access to your accounts. But in recent years, the space has gone beyond computers and firewalls. Today, cybersecurity also means keeping the power on, the water safe, and hospitals operational. Recently on the DevSecOops podcast, hosts ...
Hygiene Is Hard: Why Even Security-Conscious Organisations Still Fall at the First Hurdle

Hygiene Is Hard: Why Even Security-Conscious Organisations Still Fall at the First Hurdle

Simply put, organisations need to move beyond reactive threat hunt engagements to proactive identity security and zero trust and statistics show this is one of the biggest gaps in our environments today that need attention
The Next Scammer’s Paradise

The Next Scammer’s Paradise

The email looks real. It sounds like your boss. Thinking it might be urgent, you click the link included therein. And just like that, it’s over. This is the new face of cybercrime. Powered by AI, cybercrime no longer requires technical prowess nor heavy coding. All you need is the right tool and the appropriate prompt; something that can scrape ...
The PIN That Wasn’t Yours

The PIN That Wasn’t Yours

Fintech gift card system flaw may have allowed quiet cashouts. Signs point to possible exploitation months before it was discovered.
It’s Time to Hack the Hackers

It’s Time to Hack the Hackers

Introduction Cybercrime in Australia is rising rapidly. From the major breachers that held headlines hostage for months, to government agencies and critical infrastructure being targeted, cyberattacks continue to hit hard and fast. In the last few months alone, a major Australian university appears to have fallen victim to a ransomware attack, a ...
Resilience Comes From Knowing What to Prioritise

Resilience Comes From Knowing What to Prioritise

As cyber threats and disruptions grow, organisations must make data resilience a core component of their IT strategy to ensure business continuity and safeguard critical data.
Shadow AI Is the Blind Spot No Australian Board Can Ignore

Shadow AI Is the Blind Spot No Australian Board Can Ignore

Australia’s corporate leaders are sleepwalking into a technology blind spot that will cost them dearly. Shadow AI is already entrenched in workplaces, and boards that treat it as a side issue are making the same mistake they made a decade ago with shadow IT and cloud adoption. Back then, companies allowed employees to use unapproved cloud apps because ...
Scam Awareness Week Shines a Light on the Collective Effort Needed to Fight Scams

Scam Awareness Week Shines a Light on the Collective Effort Needed to Fight Scams

Collaborative action from individuals, businesses and the government is more important than ever, as scams become more sophisticated.
No results found.

In the News

Phantom Labs Analysis of BeyondTrust’s Identity Security Insights Data Finds Enterprise AI Agents Growing 466.7% Year Over Year

Phantom Labs Analysis of BeyondTrust’s Identity Security Insights Data Finds Enterprise AI Agents Growing 466.7% Year Over Year

BeyondTrust researchers warn of a rapidly expanding “shadow AI workforce” creating new identity security risks, based on data uncovered through Identity Security Insights® | Some organisations operate well over 1,000 AI agents, many of which security teams were not aware existed within their environments
Ping Identity Defines the Runtime Identity Standard for Autonomous AI

Ping Identity Defines the Runtime Identity Standard for Autonomous AI

General Availability of Identity for AI establishes continuous, contextual enforcement and real-time control over AI agents 
Interactive Secures IT Managed Services Agreement With Major Superannuation Fund

Interactive Secures IT Managed Services Agreement With Major Superannuation Fund

The leading Australian IT service provider will support the delivery of Hostplus’ technology strategy to enhance service delivery and operational resilience.
15,500 Malicious Domains: How Threat Actors Abuse a Popular Ad Tracker for Cloaked AI Investment Scams

15,500 Malicious Domains: How Threat Actors Abuse a Popular Ad Tracker for Cloaked AI Investment Scams

New research from Infoblox Threat Intel and Confiant reveals that cybercriminals are abusing Keitaro, a widely used advertising performance tracker, to hide (“cloak”) scams and malware behind ordinary web traffic; with many posing specifically as AI investment opportunities. Cloaking has become a foundational block of modern cybercrime, allowing ...
Elastic Eliminates Per-Endpoint Pricing for XDR

Elastic Eliminates Per-Endpoint Pricing for XDR

The Australian cyber landscape has reached a critical tipping point. As the latest ASD Cyber Threat Report reveals, average crime costs for large Aussie firms have spiked 219% to over $200k per incident. While much of the industry is focused on the AI arms race, there is a deeper shift occurring: the move from reactive dashboards to the agentic SOC. To ...
Elastic Eliminates the SOAR Automation Tax With Native Workflows

Elastic Eliminates the SOAR Automation Tax With Native Workflows

The Australian cyber landscape has reached a critical tipping point. As the latest ASD Cyber Threat Report reveals, average crime costs for large Aussie firms have spiked 219% to over $200k per incident. While much of the industry is focused on the AI arms race, there is a deeper shift occurring: the move from reactive dashboards to the agentic SOC. To ...
Milestone Systems Introduces Trusted Generative AI Tools for Security Operations

Milestone Systems Introduces Trusted Generative AI Tools for Security Operations

Milestone Systems has unveiled a new suite of generative AI-powered solutions designed specifically for security operations, addressing long-standing challenges around manual workflows, regulatory compliance, and trust in automated systems. While generative AI adoption continues to accelerate across industries, many security teams still rely on manual ...
Commvault Expands Microsoft Security Integration to Accelerate Threat Detection and Recovery

Commvault Expands Microsoft Security Integration to Accelerate Threat Detection and Recovery

Commvault has announced an expanded integration with Microsoft Security, connecting threat detection, investigation, and trusted recovery to strengthen enterprise cyber resilience operations. The integration brings together Microsoft Sentinel, Microsoft Security Copilot, and the Commvault Cloud platform to streamline resilience operations (ResOps), ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This