The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Why Measuring the Right Threat Intelligence Metrics Is Key to SOC Success
Organisations must detect, investigate, and respond to threats faster than ever. Success depends on measuring the right threat intelligence metrics which are those that can separate meaningful insights from overwhelming noise. For businesses, failing to do so risks reputational damage and financial loss.

Organisations Must Adapt Defences to 2025’s Dynamic Ransomware Threat
Ransomware has entered a new phase in 2025—faster, more unpredictable, and increasingly targeting APAC. Reactive security no longer works and organisations must adopt intelligence-led, multi-layered defences to keep pace.

IT-OT Convergence: What Happens When Two Worlds Collide?
Most people thought that cybersecurity is all about data breaches, suspicious links, or adversaries trying to get access to your accounts. But in recent years, the space has gone beyond computers and firewalls. Today, cybersecurity also means keeping the power on, the water safe, and hospitals operational.
Recently on the DevSecOops podcast, hosts ...

Hygiene Is Hard: Why Even Security-Conscious Organisations Still Fall at the First Hurdle
Simply put, organisations need to move beyond reactive threat hunt engagements to proactive identity security and zero trust and statistics show this is one of the biggest gaps in our environments today that need attention

The Next Scammer’s Paradise
The email looks real. It sounds like your boss. Thinking it might be urgent, you click the link included therein. And just like that, it’s over.
This is the new face of cybercrime. Powered by AI, cybercrime no longer requires technical prowess nor heavy coding. All you need is the right tool and the appropriate prompt; something that can scrape ...

The PIN That Wasn’t Yours
Fintech gift card system flaw may have allowed quiet cashouts. Signs point to possible exploitation months before it was discovered.

It’s Time to Hack the Hackers
Introduction
Cybercrime in Australia is rising rapidly. From the major breachers that held headlines hostage for months, to government agencies and critical infrastructure being targeted, cyberattacks continue to hit hard and fast.
In the last few months alone, a major Australian university appears to have fallen victim to a ransomware attack, a ...

Resilience Comes From Knowing What to Prioritise
As cyber threats and disruptions grow, organisations must make data resilience a core component of their IT strategy to ensure business continuity and safeguard critical data.
No results found.
In the News
Databricks Enters Security Market With Launch of Lakewatch: New Open, Agentic SIEM
New product enables unlimited and unified data, petabyte-scale threat detection and investigations at up to 80% lower TCO
Check Point Launches AI Defense Plane to Secure the Agentic Enterprise at Scale
A unified AI security control plane delivering end-to-end protection across employee AI use, AI applications, and agentic systems
CrowdStrike Delivers Agentic MDR to Stop Breaches at Machine Speed
Falcon Complete’s elite security analysts build and orchestrate intelligent agents to stop AI-accelerated threats, while new services help organisations operationalise the agentic SOC
The State of Cloud-native Security 2026: Maturity Gaps and the Automation Mandate
Red Hat, the world's leading provider of open source solutions, today releases data from its 2026 State of Cloud-Native Security Report, revealing that 97% of organisations reported at least one cloud-native security incident in the past year. These are not just sophisticated, one-off attacks, but rather often the result of "everyday lapses.”
Hybrid ...
CrowdStrike Delivers Industry’s First Adversary-Informed Cloud Risk Prioritisation to Stop AI-Powered Adversaries
New Falcon Cloud Security innovations unify application behaviour and adversary tradecraft to eliminate the exposures AI-fortified attackers exploit
HPE Introduces Sweeping Security Advancements to Secure AI Adoption and Strengthen Enterprise Resiliency
New HPE Juniper Networking SRX400 Series Firewalls extend consistent protection from core to edge as AI expands across distributed sites
Expanded hybrid mesh firewall puts enterprise guardrails around AI to reduce exposure without slowing productivity
Built-in security enhancements support resilience as a core business requirement across the ...
KnowBe4 Accelerates the Future of Human Risk Management With Expanding Suite of AI Agents
AI Defence Agents reduce administrative burden and transform security operations from a cost centre to a competitive advantage
Saviynt Unveils Industry’s First Identity Control Plane for AI Agents
Saviynt delivers the first enterprise-grade platform with the full capabilities to govern AI agents from discovery through runtime
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
- 353
- 354
- 355
- 356
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
