The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why Measuring the Right Threat Intelligence Metrics Is Key to SOC Success

Why Measuring the Right Threat Intelligence Metrics Is Key to SOC Success

Organisations must detect, investigate, and respond to threats faster than ever. Success depends on measuring the right threat intelligence metrics which are those that can separate meaningful insights from overwhelming noise. For businesses, failing to do so risks reputational damage and financial loss.
Organisations Must Adapt Defences to 2025’s Dynamic Ransomware Threat

Organisations Must Adapt Defences to 2025’s Dynamic Ransomware Threat

Ransomware has entered a new phase in 2025—faster, more unpredictable, and increasingly targeting APAC. Reactive security no longer works and organisations must adopt intelligence-led, multi-layered defences to keep pace.
IT-OT Convergence: What Happens When Two Worlds Collide?

IT-OT Convergence: What Happens When Two Worlds Collide?

​Most people thought that cybersecurity is all about data breaches, suspicious links, or adversaries trying to get access to your accounts. But in recent years, the space has gone beyond computers and firewalls. Today, cybersecurity also means keeping the power on, the water safe, and hospitals operational. Recently on the DevSecOops podcast, hosts ...
Hygiene Is Hard: Why Even Security-Conscious Organisations Still Fall at the First Hurdle

Hygiene Is Hard: Why Even Security-Conscious Organisations Still Fall at the First Hurdle

Simply put, organisations need to move beyond reactive threat hunt engagements to proactive identity security and zero trust and statistics show this is one of the biggest gaps in our environments today that need attention
The Next Scammer’s Paradise

The Next Scammer’s Paradise

The email looks real. It sounds like your boss. Thinking it might be urgent, you click the link included therein. And just like that, it’s over. This is the new face of cybercrime. Powered by AI, cybercrime no longer requires technical prowess nor heavy coding. All you need is the right tool and the appropriate prompt; something that can scrape ...
The PIN That Wasn’t Yours

The PIN That Wasn’t Yours

Fintech gift card system flaw may have allowed quiet cashouts. Signs point to possible exploitation months before it was discovered.
It’s Time to Hack the Hackers

It’s Time to Hack the Hackers

Introduction Cybercrime in Australia is rising rapidly. From the major breachers that held headlines hostage for months, to government agencies and critical infrastructure being targeted, cyberattacks continue to hit hard and fast. In the last few months alone, a major Australian university appears to have fallen victim to a ransomware attack, a ...
Resilience Comes From Knowing What to Prioritise

Resilience Comes From Knowing What to Prioritise

As cyber threats and disruptions grow, organisations must make data resilience a core component of their IT strategy to ensure business continuity and safeguard critical data.
No results found.

In the News

Databricks Enters Security Market With Launch of Lakewatch: New Open, Agentic SIEM

Databricks Enters Security Market With Launch of Lakewatch: New Open, Agentic SIEM

New product enables unlimited and unified data, petabyte-scale threat detection and investigations at up to 80% lower TCO
Check Point Launches AI Defense Plane to Secure the Agentic Enterprise at Scale

Check Point Launches AI Defense Plane to Secure the Agentic Enterprise at Scale

A unified AI security control plane delivering end-to-end protection across employee AI use, AI applications, and agentic systems
CrowdStrike Delivers Agentic MDR to Stop Breaches at Machine Speed

CrowdStrike Delivers Agentic MDR to Stop Breaches at Machine Speed

Falcon Complete’s elite security analysts build and orchestrate intelligent agents to stop AI-accelerated threats, while new services help organisations operationalise the agentic SOC
The State of Cloud-native Security 2026: Maturity Gaps and the Automation Mandate

The State of Cloud-native Security 2026: Maturity Gaps and the Automation Mandate

Red Hat, the world's leading provider of open source solutions, today releases data from its 2026 State of Cloud-Native Security Report, revealing that 97% of organisations reported at least one cloud-native security incident in the past year. These are not just sophisticated, one-off attacks, but rather often the result of "everyday lapses.” Hybrid ...
CrowdStrike Delivers Industry’s First Adversary-Informed Cloud Risk Prioritisation to Stop AI-Powered Adversaries

CrowdStrike Delivers Industry’s First Adversary-Informed Cloud Risk Prioritisation to Stop AI-Powered Adversaries

New Falcon Cloud Security innovations unify application behaviour and adversary tradecraft to eliminate the exposures AI-fortified attackers exploit
HPE Introduces Sweeping Security Advancements to Secure AI Adoption and Strengthen Enterprise Resiliency

HPE Introduces Sweeping Security Advancements to Secure AI Adoption and Strengthen Enterprise Resiliency

New HPE Juniper Networking SRX400 Series Firewalls extend consistent protection from core to edge as AI expands across distributed sites Expanded hybrid mesh firewall puts enterprise guardrails around AI to reduce exposure without slowing productivity Built-in security enhancements support resilience as a core business requirement across the ...
KnowBe4 Accelerates the Future of Human Risk Management With Expanding Suite of AI Agents

KnowBe4 Accelerates the Future of Human Risk Management With Expanding Suite of AI Agents

AI Defence Agents reduce administrative burden and transform security operations from a cost centre to a competitive advantage 
Saviynt Unveils Industry’s First Identity Control Plane for AI Agents

Saviynt Unveils Industry’s First Identity Control Plane for AI Agents

Saviynt delivers the first enterprise-grade platform with the full capabilities to govern AI agents from discovery through runtime
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This