The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Shadow AI Is the Blind Spot No Australian Board Can Ignore

Shadow AI Is the Blind Spot No Australian Board Can Ignore

Australia’s corporate leaders are sleepwalking into a technology blind spot that will cost them dearly. Shadow AI is already entrenched in workplaces, and boards that treat it as a side issue are making the same mistake they made a decade ago with shadow IT and cloud adoption. Back then, companies allowed employees to use unapproved cloud apps because ...
Scam Awareness Week Shines a Light on the Collective Effort Needed to Fight Scams

Scam Awareness Week Shines a Light on the Collective Effort Needed to Fight Scams

Collaborative action from individuals, businesses and the government is more important than ever, as scams become more sophisticated.
AI in Defence – a Partner, Not a Quick Fix

AI in Defence – a Partner, Not a Quick Fix

​AI has been making waves for years now. It has moved from the pages of science fiction into the control rooms of our defence and security agencies and critical infrastructures, watching over networks and inspecting traffic. Why wouldn’t it be when it promises to work faster than humans and spot the tiniest anomaly possible? For defence and ...
Why You Need Speed and Trust for Modern Software Delivery

Why You Need Speed and Trust for Modern Software Delivery

Introduction Businesses are creating and launching software faster than ever to keep pace with competitors and drive innovation. The focus on increased speed has created a few trends: Developer productivity is no longer only measured by speed, but quality and security as well Many development teams rely on platform engineering to build tools ...
Is GenAI Outsmarting Us or Just Making Us Lazy?

Is GenAI Outsmarting Us or Just Making Us Lazy?

 Is AI turning our brains to mush? Hosts Phoebe Goh and Mekka Williams are joined by Karissa “KB” Breen, the sharp-tongued cybersecurity journalist behind the popular podcast, KBKast, for a no-holds-barred look at how AI is rewriting the rules of the game. From the sneaky rise of unsanctioned “shadow AI” tools to the unnervingly convincing ...
The Growing Tug-of-War Between Scammers and Defenders: What Australian Businesses Need to Do to Stay Safe

The Growing Tug-of-War Between Scammers and Defenders: What Australian Businesses Need to Do to Stay Safe

Scams are no longer on the fringes of criminal activity. They have become a mainstream threat for Australians, targeting both consumers and businesses with increasing sophistication. According to Scamwatch, Australians lost $2.03 billion to scams in 2024. This year’s Scams Awareness Week (25-29 August 2025) highlights this escalating issue and shows ...
Claroty Team82 Uncovers Critical Vulnerabilities in Axis Video Surveillance Products

Claroty Team82 Uncovers Critical Vulnerabilities in Axis Video Surveillance Products

Turning Camera Surveillance on its Axis
Why Asia Pacific Organisations Must Rethink Inline Security After a Wave of Data Breaches

Why Asia Pacific Organisations Must Rethink Inline Security After a Wave of Data Breaches

Asia Pacific is in the midst of a cybersecurity reckoning following a spate of major data breaches including Qantas and Louis Vuitton in Australia, attacks on Singapore’s critical infrastructure, a surge of ransomware threats in India, and most recently a successful attack on Google. While most organisations are focused on enhancing cybersecurity, one ...
No results found.

In the News

Phantom Labs Analysis of BeyondTrust’s Identity Security Insights Data Finds Enterprise AI Agents Growing 466.7% Year Over Year

Phantom Labs Analysis of BeyondTrust’s Identity Security Insights Data Finds Enterprise AI Agents Growing 466.7% Year Over Year

BeyondTrust researchers warn of a rapidly expanding “shadow AI workforce” creating new identity security risks, based on data uncovered through Identity Security Insights® | Some organisations operate well over 1,000 AI agents, many of which security teams were not aware existed within their environments
Ping Identity Defines the Runtime Identity Standard for Autonomous AI

Ping Identity Defines the Runtime Identity Standard for Autonomous AI

General Availability of Identity for AI establishes continuous, contextual enforcement and real-time control over AI agents 
Interactive Secures IT Managed Services Agreement With Major Superannuation Fund

Interactive Secures IT Managed Services Agreement With Major Superannuation Fund

The leading Australian IT service provider will support the delivery of Hostplus’ technology strategy to enhance service delivery and operational resilience.
15,500 Malicious Domains: How Threat Actors Abuse a Popular Ad Tracker for Cloaked AI Investment Scams

15,500 Malicious Domains: How Threat Actors Abuse a Popular Ad Tracker for Cloaked AI Investment Scams

New research from Infoblox Threat Intel and Confiant reveals that cybercriminals are abusing Keitaro, a widely used advertising performance tracker, to hide (“cloak”) scams and malware behind ordinary web traffic; with many posing specifically as AI investment opportunities. Cloaking has become a foundational block of modern cybercrime, allowing ...
Elastic Eliminates Per-Endpoint Pricing for XDR

Elastic Eliminates Per-Endpoint Pricing for XDR

The Australian cyber landscape has reached a critical tipping point. As the latest ASD Cyber Threat Report reveals, average crime costs for large Aussie firms have spiked 219% to over $200k per incident. While much of the industry is focused on the AI arms race, there is a deeper shift occurring: the move from reactive dashboards to the agentic SOC. To ...
Elastic Eliminates the SOAR Automation Tax With Native Workflows

Elastic Eliminates the SOAR Automation Tax With Native Workflows

The Australian cyber landscape has reached a critical tipping point. As the latest ASD Cyber Threat Report reveals, average crime costs for large Aussie firms have spiked 219% to over $200k per incident. While much of the industry is focused on the AI arms race, there is a deeper shift occurring: the move from reactive dashboards to the agentic SOC. To ...
Milestone Systems Introduces Trusted Generative AI Tools for Security Operations

Milestone Systems Introduces Trusted Generative AI Tools for Security Operations

Milestone Systems has unveiled a new suite of generative AI-powered solutions designed specifically for security operations, addressing long-standing challenges around manual workflows, regulatory compliance, and trust in automated systems. While generative AI adoption continues to accelerate across industries, many security teams still rely on manual ...
Commvault Expands Microsoft Security Integration to Accelerate Threat Detection and Recovery

Commvault Expands Microsoft Security Integration to Accelerate Threat Detection and Recovery

Commvault has announced an expanded integration with Microsoft Security, connecting threat detection, investigation, and trusted recovery to strengthen enterprise cyber resilience operations. The integration brings together Microsoft Sentinel, Microsoft Security Copilot, and the Commvault Cloud platform to streamline resilience operations (ResOps), ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This