The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Price of Going Mobile App Viral

The Price of Going Mobile App Viral

The Tea app, a platform for women to rate and review dating experiences, recently went viral on the US App Store but suffered a severe data breach. Due to insecure Firebase storage and poor application security hygiene, over 72,000 private images including ID cards and selfies were exposed, with no access control or rate limiting in place. Metadata ...
Database 23ai: Innovation or Mere Iteration?

Database 23ai: Innovation or Mere Iteration?

Discover how Oracle's Database 23ai is transforming business data by integrating AI, bridging the gap traditional databases couldn’t. Unlock personalized, context-aware insights effortlessly with cutting-edge technology.
Repatriating the Cloud – Why Cybersecurity Must Now Take Center Stage

Repatriating the Cloud – Why Cybersecurity Must Now Take Center Stage

“The cloud is just someone else’s computer,” goes the old tech joke, and like many good jokes, it conceals a sobering truth. For years, organizations eagerly adopted public cloud platforms for the sake of agility, cost savings, and unlimited scalability. But today, that enthusiasm is being tempered by a harsh reality: those “someone else’s” computers ...
Rethinking Security: Why Ethical Curiosity Belongs at the Core of Cyber Defence

Rethinking Security: Why Ethical Curiosity Belongs at the Core of Cyber Defence

Introduction  In 2023, the Latitude Financial cyberattack exposed over 14 million customer records, including driver  licences, passport numbers, and financial details. While remediation focused on containment and  response, one quiet question lingered for many defenders:  "Why didn’t we ask, 'what if?' sooner?"  That single moment underscores ...
How Wargaming Is Shaping Business Resilience and Cyber Security Strategies

How Wargaming Is Shaping Business Resilience and Cyber Security Strategies

Once the preserve of military strategy rooms and war colleges, wargaming is now being used across government, critical infrastructure, and enterprise to build clarity in the face of uncertainty. Nowhere is this more urgent than in cyber security and business resilience, where the cost of guessing wrong can be catastrophic.
Five Essential Factors to Future-Proof Physical Access Control Systems

Five Essential Factors to Future-Proof Physical Access Control Systems

As digital and physical workplaces continue to converge, Australian organisations face challenges with maintaining the safety of both work environments. For example, while an abundance of cloud-based services and AI agents makes updating security systems faster and easier than ever, many physical access control solutions (PACS) may struggle to ...
Fortifying Australia’s Data Centres: A Cybersecurity Imperative

Fortifying Australia’s Data Centres: A Cybersecurity Imperative

As AI accelerates digital transformation, Australia’s booming data centre industry must embed cyber resilience into its infrastructure design to defend against increasingly complex and converging threats across IT, OT, and physical systems.
The Future of Access Control: Embracing Edge Intelligence, Cyber Hardened Hardware and Ecosystem Resilience

The Future of Access Control: Embracing Edge Intelligence, Cyber Hardened Hardware and Ecosystem Resilience

As global security threats evolve, so must the approach to access control. According to the 2025 Trends in Access Controllers Report conducted by Mercury Security, a subsidiary of HID, three transformational currents emerged: edge intelligence and embedded applications; rigorous cybersecurity hardening; and an expanding ecosystem that values openness, ...
No results found.

In the News

Commvault SHIFT Melbourne Highlights Identity Resilience and Clean Recovery as Cyber Priorities for 2026

Commvault SHIFT Melbourne Highlights Identity Resilience and Clean Recovery as Cyber Priorities for 2026

Melbourne, Australia – 3 March 2026 – Commvault, a leader in unified resilience at enterprise scale, has concluded its flagship SHIFT event in Melbourne, reinforcing the message that as AI adoption accelerates across Australia and New Zealand, organisations must strengthen identity protection and validate recovery capabilities as foundational elements ...
Slipstream Cyber Included on Atmos First Response and Remediation Panel

Slipstream Cyber Included on Atmos First Response and Remediation Panel

Strengthening rapid cyber incident response through coordinated technical forensics and legal advisory expertise.
HID’s 2026 State of Security and Identity Report: Identity Convergence Drives New Focus on Trust, Protection and User Choice

HID’s 2026 State of Security and Identity Report: Identity Convergence Drives New Focus on Trust, Protection and User Choice

New research highlights seven trends shaping identity, access and trust, alongside rising ethical and privacy concerns
CrowdStrike FalconID Extends Risk-Aware Identity Security to Multi-Factor Authentication

CrowdStrike FalconID Extends Risk-Aware Identity Security to Multi-Factor Authentication

CrowdStrike today announced the general availability of FalconID, extending the Falcon® platform with zero-friction, phishing-resistant MFA. Identity is the front line of modern attacks, and this release advances CrowdStrike’s Next-Gen Identity Security leadership with real-time, risk-aware protection against AI-accelerated phishing attacks and ...
F5 Labs Sets New Standard for AI Security Benchmarking With Model Risk Leaderboards and Threat Intelligence

F5 Labs Sets New Standard for AI Security Benchmarking With Model Risk Leaderboards and Threat Intelligence

Comprehensive AI Security Index and Agentic Resistance Score metrics help organisations stress-test security performance of AI systems, from pilot to production
VAST Data and CrowdStrike Partner to Establish a Unified Security Model for the AI Lifecycle

VAST Data and CrowdStrike Partner to Establish a Unified Security Model for the AI Lifecycle

At VAST Forward 2026, VAST Data, the AI Operating System company, and CrowdStrike (NASDAQ: CRWD) announced a strategic partnership that combines VAST’s native data-layer governance and platform-level controls with CrowdStrike’s enterprise-grade threat detection and automated response. By integrating these capabilities within the VAST AI Operating ...
BeyondTrust Recognised as a Leader and Outperformer in the 2026 GigaOm Radar for Cloud Infrastructure Entitlement Management (CIEM)

BeyondTrust Recognised as a Leader and Outperformer in the 2026 GigaOm Radar for Cloud Infrastructure Entitlement Management (CIEM)

BeyondTrust’s Pathfinder platform earns Leader distinction in Innovation / Platform Play quadrant GigaOm highlights BeyondTrust’s AI-driven analytics, just-in-time access, lifecycle governance, and multicloud compliance capabilities  Atlanta, GA – February 26, 2026 — BeyondTrust, the global leader in privilege-centric identity security protecting ...
Genetec Sets a New Standard for Enterprise Physical Security With Cloudlink 2210

Genetec Sets a New Standard for Enterprise Physical Security With Cloudlink 2210

New high-density appliance enables enterprises to scale cloud-managed physical security without forcing cloud-only storage or infrastructure replacement Sydney, 2 March 2026 — Genetec Inc. (“Genetec”), the global leader in enterprise physical security software, today announced Genetec Cloudlink™ 2210. Designed for complex, enterprise-scale ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This