The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

EOFY 2025: Australian Businesses Need To Mount Defences Against Rising Threat Of Cyberwarfare

EOFY 2025: Australian Businesses Need To Mount Defences Against Rising Threat Of Cyberwarfare

Modern cyberwarfare is a rising threat for Australian organisations and requires proactive exposure management for businesses to harden their defence against AI-enabled attacks.
Overcoming The Complexity And Security Issues Posed By AI Coding Tools

Overcoming The Complexity And Security Issues Posed By AI Coding Tools

The advantages AI tools deliver in speed and efficiency are impossible for time-crunched developers to resist. But the complexity and risk created by AI-generated code can’t be ignored either. Organisations need to thoroughly upskill their developers so that they can work with security professionals to nip software security problems in the bud. Only by ...
Insider Threats: The Silent Cybersecurity Crisis Facing Australian Businesses

Insider Threats: The Silent Cybersecurity Crisis Facing Australian Businesses

In a climate where data is currency and trust is critical, defending against insider threats is not just a technical necessity - it’s a business imperative.
Uncomfortable Truths Behind Cybersecurity Failures

Uncomfortable Truths Behind Cybersecurity Failures

In Episode 4 of the DevSecOops podcast, hosts Tom Walker and Scott Fletcher discussed what’s really dragging security down in modern organisations. And spoiler, it’s not the hackers. If you’re someone in tech, security, or just trying to make sense of how to run a safer, smarter organisation, this one is for you. No Longer A Departmental ...
Why ‘Boring’ Data Backups Could Save Millions

Why ‘Boring’ Data Backups Could Save Millions

Imran Husain, Global Chief Internet Information Security Officer at MillerKnoll, spoke about the often underestimated arena of manufacturing. Data backups may be boring, Husain warns, but ignoring them comes at a potential large cost.Manufacturing has long been viewed as slow to adopt new technologies. As Husain describes, for years the sector’s ...
The Risky Race to AI: How DeepSeek Is Reshaping the AI Landscape

The Risky Race to AI: How DeepSeek Is Reshaping the AI Landscape

The launch of DeepSeek-R1, a cost-effective, open-source large language model (LLM) by Chinese startup DeepSeek, is shaking up the AI landscape by offering high-quality tools at a fraction of the cost of Western competitors. While this democratizes access to advanced AI and could spark a wave of open-source innovation, it has also triggered significant ...
When Priorities Collide, How Do You Make the Right Call?

When Priorities Collide, How Do You Make the Right Call?

In Episode 2 of the DevSecOops podcast, hosts Tom Walker, James Vincent, and Scott Fletcher explored one of the biggest yet most overlooked challenges in organisations today: how to make the right decisions, especially when business, technology, and security priorities clash or collide. So, how can organisations balance these three? Equal ...
Why Hack In When You Can Log In

Why Hack In When You Can Log In

The identity security game has changed, and we’ve made it easier for attackers to win. Not because they’re smarter or more sophisticated (though many are), but because we’ve handed them the keys. Through unchecked identity sprawl, we’ve given cybercriminals a golden ticket to infiltrate what is arguably an organisation’s most valuable asset: its ...
No results found.

In The News

JFrog Exposes Enterprise AI Blind Spots, Driving Centralised Software Supply Chain Governance

JFrog Exposes Enterprise AI Blind Spots, Driving Centralised Software Supply Chain Governance

New Shadow AI Detection capability enables transparency and risk management, guarding against uncontrolled use of AI models and API calls
Confluent Names New Leaders for Partners and APAC

Confluent Names New Leaders for Partners and APAC

Kamal Brar transitions to Senior Vice President Global Partners and Technology Group; Greg Taylor Joins as Senior Vice President and General Manager for APAC
Fastly Empowers Partners to Strengthen Customer Security and Expand Services with New Certification Program

Fastly Empowers Partners to Strengthen Customer Security and Expand Services with New Certification Program

Sydney, 17 November 2025 – Fastly, Inc. (NYSE: FSLY), a leader in global edge cloud platforms, has announced the launch of its new partner certification program, the Fastly Certified Services Partner Program. This new initiative is designed for technical security professionals at partner organisations, providing them with comprehensive training and ...
Dynatrace and Microsoft Partner to Scale Enterprise Customer AI Initiatives

Dynatrace and Microsoft Partner to Scale Enterprise Customer AI Initiatives

New integration enables customers to automate majority of cloud operations tasks
Modern 42 Appointed BeyondTrust’s First Advanced Implementation Partner in Australia

Modern 42 Appointed BeyondTrust’s First Advanced Implementation Partner in Australia

Canberra, 17 November 2025 – Modern 42, a specialist provider of Identity and Access Management, Privileged Access Management, CIAM and Securing Entra ID, today announced that it has been appointed the first BeyondTrust Advanced Implementation Partner in Australia. Appointed initially as a BeyondTrust partner in 2023, the new advanced implementation ...
Dynatrace Announces New Cloud Operations Solution for Microsoft Azure

Dynatrace Announces New Cloud Operations Solution for Microsoft Azure

Provides customers with comprehensive visibility into their Azure environments, enabling automatic remediation, prevention, and optimisation
Barracuda Identifies Three Concerning Trends in Email-Based Cyber Attacks

Barracuda Identifies Three Concerning Trends in Email-Based Cyber Attacks

 Over the last month, Barracuda threat analysts have seen the following notable developments in email-based threats targeting organisations: New tools and tactics for the Tycoon 2FA phishing kit Invisible characters that help Cephas kit evade scanners and rules A sophisticated attack involving steganography (image-concealed ...
Kyndryl Launches New Agentic AI Services to Support Agentic-driven Workforce Strategy Development and Customer Experience

Kyndryl Launches New Agentic AI Services to Support Agentic-driven Workforce Strategy Development and Customer Experience

New Kyndryl Consult organisational change management services harness Kyndryl Agentic AI Framework to help enterprises ready their workforces and redefine how work is done
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This