The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Why Asia Pacific Organisations Must Rethink Inline Security After a Wave of Data Breaches
Asia Pacific is in the midst of a cybersecurity reckoning following a spate of major data breaches including Qantas and Louis Vuitton in Australia, attacks on Singapore’s critical infrastructure, a surge of ransomware threats in India, and most recently a successful attack on Google. While most organisations are focused on enhancing cybersecurity, one ...

Unmasking Identity Risks Before They Become Breaches
An effective identity security strategy must move beyond siloed tools and reactive policies. It requires unified visibility across all users and assets, contextual understanding of privilege, and automated enforcement of least-privilege principles.

Cyber-securing Enterprises, the AI Way
“...Therefore, send not to know
For whom the bell tolls,
It tolls for thee.”
John Donne, “No man is an island”
Introduction
No enterprise is an island of security when it comes to cyber-attacks. Australia suffered a staggering 47 million data breaches in 2024 — equivalent to one attack every second — representing a twelvefold increase ...

The Empty Boat Mindset – Rethinking Australia’s Cyber Defenses
As cyberattacks rise across Australia's critical infrastructure, from airlines to superannuation funds, a quiet storm is forming beneath the surface, not just in code or firewalls, but in the mindsets shaping our national response. Surprisingly, a solution to our cybersecurity maturity might not be in quantum encryption or artificial intelligence but ...

AI Coding Assistants Boost Productivity … but at What Cost to Security?
As the pressure mounts to ship faster and innovate more aggressively, development teams must remember that code security is no longer optional but a business-critical necessity.

Baseline Compliance Is Just the Starting Line
For years, compliance has been the word that quickly put anyone on the back foot. Compliance is one of those words that often carries a negative connotation, but it doesn’t have to. Some forward-thinking leaders are looking to rewrite the compliance script entirely.
Jadee Hanson, Chief Information Security Officer at Vanta, has no patience for ...

How Emerging Technologies in Critical Infrastructure Are Expanding Cyber Risks
Introduction
Emerging technologies like industrial Internet of Things, unified platform architectures, and cloud-integrated operational technology are transforming the critical infrastructure landscape. This transformation, driven by the need for greater agility and pursuit of competitive advantage, is unlocking unprecedented levels of automation, ...

Privacy by Design: Future-proofing Data Security From the Ground Up
Introduction
As AI reshapes how many of today’s enterprises operate, concerns over data privacy are accelerating. The pace of innovation is outstripping the capabilities of many legacy systems, and Australian businesses are grappling with issues related to transparency, access control and data security as a result.
The core issue isn’t just the ...
No results found.
In the News
“LeakyLooker” Discovery Reveals Nine Vulnerabilities in Google Looker Studio, Exposing Sensitive Cloud Data
Tenable Research has uncovered a series of security vulnerabilities in Google Looker Studio, dubbed "LeakyLooker," that allowed attackers to run arbitrary SQL queries on victims’ databases and exfiltrate sensitive data within organisations' Google Cloud environments.
Identity Attacks and AI Risks Emerging as Key Cloud Threats for Australian Organisations
Australian organisations accelerating their adoption of cloud and artificial intelligence technologies may be exposing themselves to new cybersecurity risks, according to new research from Google Cloud.
The company’s Cloud Threat Horizons Report H1 2026 highlights a shift in how cyber attackers target cloud environments, with identity systems, cloud ...
Saviynt Taps NEXTGEN, an Exclusive Networks Company, to Accelerate Digital Identity Security in Australia
Collaboration strengthens Saviynt’s partner-first strategy as AI-driven identity risk builds across the APJ region. | Saviynt will broaden access to AI-ready identity security for organisations navigating growing digital risks | NEXTGEN will help scale Saviynt’s partner ecosystem across APJ, enabling faster adoption of identity-centric security in the AI era
Fortinet Advances Its Security Operations Platform With Unified SOC, Agentic AI, and Expanded Endpoint Security
New innovations unify cloud SOC, agentic AI, managed detection and response, and endpoint protection within a single Security Fabric architecture
Fortinet Introduces FortiOS 8.0 to Expand Secure Networking With Secure AI Controls, Fabric-based AI Agents, Flexible SASE, and Simplified SD-WAN
Latest FortiOS capabilities help organisations secure AI adoption, simplify operations, and strengthen protection across hybrid and multi-cloud environments
Tenable Patch Tuesday Commentary – March 2026
Microsoft patched 83 CVEs in its March 2026 Patch Tuesday release, with eight rated critical and 75 rated as important. Our counts omitted one CVE (CVE-2026-26030) assigned by GitHub. Elevation of privilege (EoP) vulnerabilities accounted for 55.4% of the vulnerabilities patched this month, followed by remote code execution (RCE)vulnerabilities at ...
Google Threat Intelligence Group Warns Enterprise Systems Now Dominate Global Zero-day Attacks
Enterprise technologies have emerged as the primary target for zero-day exploitation, according to new research from the Google Threat Intelligence Group (GTIG), signalling a continued shift away from traditional browser-based attacks toward enterprise infrastructure and edge devices.
In its report, “Look What You Made Us Patch: 2025 Zero-Days in ...
Ping Identity Advances Regional Trust With PROTECTED-Level IRAP Assessment
Strengthens Support for Australian Government and Regulated Enterprises
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
