The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Scattered Spider, Airline Attacks and How to Be Breach Ready!

The Scattered Spider, Airline Attacks and How to Be Breach Ready!

Introduction On July 2, 2025, Qantas, Australia's flagship airline, disclosed a cyberattack that compromised the personal information of up to six million customers, first detected on June 30, 2025. Touted as one of the most significant data breaches in Australia's recent history, the attack is suspected to be the work of the notorious Scattered ...
Enough with the Optics: It is Time for Cyber Accountability, Not Publicity Stunts

Enough with the Optics: It is Time for Cyber Accountability, Not Publicity Stunts

Summary Following the recent Qantas data breach, which once again exposes our national cybersecurity vulnerabilities, we are met with press releases and performative outrage from prominent government officials. The breach reveals a fundamental issue that no amount of media statements or vague reassurances can hide. Despite the hype surrounding the ...
Why Does Recovery Take So Long? But It Doesn’t Have To

Why Does Recovery Take So Long? But It Doesn’t Have To

Recently, Commvault released the State of Data Readiness Report, which surveyed more than 400 leaders from across Australia and New Zealand. Executives believe their companies must recover within 24-48 hours. IT and security teams estimate five to seven days if they are to be realistic. The actual global average is about 24 days offline. I sat down ...
NBN Or Mobile Broadband? How To Choose The Right Business Internet Setup

NBN Or Mobile Broadband? How To Choose The Right Business Internet Setup

Introduction Setting up internet for your business is not a one size fits all exercise. Whether you're running a solo consultancy, managing a busy retail outlet, or coordinating a remote team, choosing between NBN and mobile broadband can significantly impact your daily operations. With digital connectivity now critical for everything from cloud ...
Alleged Russian Hackers Target Norwegian Dam

Alleged Russian Hackers Target Norwegian Dam

Why this cyber attack on a Norwegian dam should have you paying attention
How Consumer Data Rights Are Changing the Way Australian Businesses Operate

How Consumer Data Rights Are Changing the Way Australian Businesses Operate

Introduction Consumer data rights reforms in Australia are reshaping how enterprises handle personal information by introducing operational, legal, and technical responsibilities that apply across every part of the business. That includes how data is collected, how it is stored, and how it moves between internal teams and external systems. John ...
The Rising Role of Citizen Automators In Business Innovation

The Rising Role of Citizen Automators In Business Innovation

Australia is facing a deepening shortage of technology skills in the coming years, putting pressure on businesses that need developers and other ICT professionals to innovate successfully. But new tools are enabling the rise of citizen developers to fill these tech gaps, here’s how.
Identity: The New Currency in Cybersecurity

Identity: The New Currency in Cybersecurity

Digital identity is now cybercriminals' top target. With data breaches up 78% globally, businesses must invest in Identity & Access Management to protect employees and customers—it's both a security imperative and ethical obligation.
No results found.

In The News

CrowdStrike and Nord Security Announce Strategic Partnership to Redefine SMB Cybersecurity

CrowdStrike and Nord Security Announce Strategic Partnership to Redefine SMB Cybersecurity

The partnership combines Nord Security’s secure access and credential management solutions with the CrowdStrike Falcon platform, delivering enterprise-grade protection that’s simple, accessible, and built for every business
Motorola Solutions Expands AI-Powered Security Platform to Solve Complex Safety and Operational Challenges

Motorola Solutions Expands AI-Powered Security Platform to Solve Complex Safety and Operational Challenges

At Intersec Dubai, Motorola Solutions is showcasing how its latest advancements in AI are helping critical enterprises and security providers maintain safety and awareness across vast operations, moving from reactive incident detection to proactive response. Avigilon Visual Alerts uses intuitive conversational interfaces to significantly expand the ...
SecurityBridge Announces CEO Transition to Accelerate Global Expansion

SecurityBridge Announces CEO Transition to Accelerate Global Expansion

Ingolstadt, Germany, January 12, 2026 - SecurityBridge, a leading provider of cybersecurity solutions for SAP, today announced the appointment of Jesper Zerlang as Chief Executive Officer, effective January 1, 2026. Zerlang transitions from his role as Chairman of the Board, a position he has held for the past 12 months, as the company enters its next ...
Radware Reveals ZombieAgent Zero-Click Vulnerability Enabling Silent AI Agent Takeover and Data Exfiltration

Radware Reveals ZombieAgent Zero-Click Vulnerability Enabling Silent AI Agent Takeover and Data Exfiltration

Radware® (NASDAQ: RDWR), a global leader in application security and delivery solutions for multi-cloud environments, today announced the discovery of ZombieAgent, a new zero-click indirect prompt injection (IPI) vulnerability affecting OpenAI’s ChatGPT models. The vulnerability could enable attackers to silently hijack AI agents, persist within their ...
Ping Identity Marks Digital Trust Milestone with Zero-Knowledge Biometrics in the Age of AI

Ping Identity Marks Digital Trust Milestone with Zero-Knowledge Biometrics in the Age of AI

Completion of the Keyless acquisition adds privacy-preserving biometric authentication and re-verification to strengthen enterprise defences against AI-powered spoofing and fraud.
Ping Identity Appoints Adnan Chaudhry as Chief Revenue Officer to Scale Trusted Identity for the AI Era

Ping Identity Appoints Adnan Chaudhry as Chief Revenue Officer to Scale Trusted Identity for the AI Era

Enterprise go-to-market leader joins Ping Identity as organisations face accelerating demand for trusted identity in an AI-driven world
Exabeam Introduces First Connected System for AI Agent Behaviour Analytics and AI Security Posture Insight

Exabeam Introduces First Connected System for AI Agent Behaviour Analytics and AI Security Posture Insight

Industry leadership expanded with connected capabilities that not only uncover AI agent activity, but centralise investigation, and deliver measurable AI security posture insights
NinjaOne Surpasses US$500 Million in ARR in Record Fiscal Year

NinjaOne Surpasses US$500 Million in ARR in Record Fiscal Year

NinjaOne has today announced significant business momentum in fiscal year 2025 as global demand for the NinjaOne Unified IT Operations Platform significantly outpaces growth within the broader IT market.  NinjaOne’s recent business and financial achievements include: Completing the acquisition of Australian SaaS backup and data protection ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This