The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Minimising Third-party Risk

Minimising Third-party Risk

Minimise third-party risk with smart vendor management. Learn how to protect data, ensure compliance, and streamline reviews with automation.
The Blind Spot In Your Cyber Strategy

The Blind Spot In Your Cyber Strategy

 Recently on the DevSecOops podcast, Hosts Tom Walker, James Vincent, and Scott Fletcher unpacked the modern threats in the cybersecurity space. With years of experience in IT and cybersecurity, the hosts shared real world experiences, from everyday technical mishaps to nation sponsored cyberattacks, offering practical advice for staying secure amid ...
How Wiz Is Rewriting the Cloud Security Story

How Wiz Is Rewriting the Cloud Security Story

In Episode 7 of the DevSecOops podcast, hosts Tom Walker, Scott Fletcher, and James Vincent sat down with Matt Preswick, Principal Solutions Engineer at Wiz APJ, to unpack how Wiz has become an emerging favourite of both engineering teams and the executive suite. Beyond that, they also discussed the broader issue of the everyday realities of cloud ...
What Australian Businesses Need To Do To Bolster Their Cyber Defences During the EOFY

What Australian Businesses Need To Do To Bolster Their Cyber Defences During the EOFY

Introduction With the end of the financial year (EOFY) fast approaching, it’s more important now than ever for businesses to be even more vigilant and take stock of their online security. Tax season is a time of increased cyber threats and is ripe for cybercriminals and scammers to strike. Ways AI Is Being Utilised In EOFY Scams While the ...
WTF is Happening in Tech?

WTF is Happening in Tech?

In the latest episode of the DevSecOops podcast, hosts Tom Walker and Scott Fletcher discussed three of the most talked about topics in enterprise IT including Kubernetes, the March 2025 Oracle Cloud security breach, and how AI is reshaping both productivity and cybersecurity. Kubernetes - Necessary Evolution or Needless Complexity? Tom did not ...
Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets

Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets

Computer Emergency Response Teams (CERTs) are the unsung heroes of cybersecurity. There are many myths about their role and function. Contrary to popular belief they don’t certify cybersecurity professionals, and many don’t do emergency response.  Operating in the background, CERTs provide vital functions in anticipating and reducing the impact of ...
Don’t Let Generative AI And LLMs Become A Third-Party Vulnerability

Don’t Let Generative AI And LLMs Become A Third-Party Vulnerability

As Large language models (LLMs) are increasingly being embedded into software development, organisations must ensure they understand the cyber security risks that come with it. Developer tools that have generative AI capability integrated to assist developers when writing code are on the rise. But the LLMs they rely on could be altered by threat actors.  
Creating Infrastructure Foundations For A Scalable Future

Creating Infrastructure Foundations For A Scalable Future

Meeting the complex demands of the future - including GenAI and ML - starts with getting ‘Network As a Service’ (NaaS) fundamentals right - right now.
No results found.

In The News

Genetec Launches Cloudrunner Mobile App For Real-Time Vehicle Investigations In The Field

Genetec Launches Cloudrunner Mobile App For Real-Time Vehicle Investigations In The Field

New app extends Cloudrunner capabilities to the field, giving law enforcement and security professionals faster access to data and alerts wherever they are.
KnowBe4 Predicts the Agentic AI Revolution Will Reshape Cybersecurity in 2026

KnowBe4 Predicts the Agentic AI Revolution Will Reshape Cybersecurity in 2026

KnowBe4 releases cybersecurity predictions for 2026 
Research Proves Billions in GDP and Thousands More Jobs If Government Backs Australian-owned Companies

Research Proves Billions in GDP and Thousands More Jobs If Government Backs Australian-owned Companies

New economic modelling has found that awarding a greater share of Australian Defence procurement, covering both services and materiel, to Australian-owned and operated prime contractors would inject billions annually into the nation's GDP and create tens of thousands of jobs, whilst also strengthening Australia’s sovereign capability at a time of ...
PyTorch Users at Risk: Unveiling 3 Zero-Day PickleScan Vulnerabilities

PyTorch Users at Risk: Unveiling 3 Zero-Day PickleScan Vulnerabilities

AI Model Scanning as the First Layer of Security JFrog Security Research found 3 zero-day critical vulnerabilities in PickleScan, which would allow attackers to bypass the most popular Pickle model scanning tool. PickleScan is a widely used, industry-standard tool for scanning ML models and ensuring they contain no malicious content. Each discovered ...
CrowdStrike Named AWS 2025 Global Security Partner & Global Marketplace Partner of the Year

CrowdStrike Named AWS 2025 Global Security Partner & Global Marketplace Partner of the Year

CrowdStrike also recognized as Canada, Iberia, MENA, and SSA Technology Partner of the Year
Wasabi Strengthens Cloud Storage Security with Covert Copy Capability

Wasabi Strengthens Cloud Storage Security with Covert Copy Capability

Cloud storage company Wasabi has expanded its cyber resilient cloud storage capabilities with Covert Copy, a patent pending, advanced ransomware-resistant storage solution that allows users to create a locked, hidden copy of storage buckets to ensure critical data remains untouchable, even in the event of a cyberattack. The selected data is logically ...
CrowdStrike Delivers Agentic Security to HPE Unleash AI Partner Program

CrowdStrike Delivers Agentic Security to HPE Unleash AI Partner Program

CrowdStrike and HPE deliver unified protection for HPE Private Cloud AI, co-developed with NVIDIA, empowering enterprises to accelerate secure, high-performance AI at scale
CrowdStrike Stops Cloud Attacks in Seconds with Real-Time Cloud Detection and Response Innovations

CrowdStrike Stops Cloud Attacks in Seconds with Real-Time Cloud Detection and Response Innovations

New real-time detection engine, cloud Indicators of Attack, and automated response actions give SOC teams real-time protection at machine speed
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This