The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

AI First, Human Second: The New Cybersecurity Command Structure

AI First, Human Second: The New Cybersecurity Command Structure

"Man is the measure of all things." ― Protagora - pre-Socratic Greek philosopher It’s an ancient idea, yet it feels more relevant than ever as machines start making decisions that were once left to human minds. In today’s high-stakes cybersecurity landscape, artificial intelligence is no longer a future wager; it’s a frontline asset. AI systems detect ...
Data Management – It’s A High-stakes Game

Data Management – It’s A High-stakes Game

This article explores the security risks associated with poorly managed data, and details how regulations from OAIC and APRA are raising the stakes for both professionals and organisations alike.
Account Takeover Attacks on Social Media: A Rising Threat for Content Creators and Influencers

Account Takeover Attacks on Social Media: A Rising Threat for Content Creators and Influencers

In 2024 and continuing into 2025, social media platforms were prime targets for cybercriminals, with content creators facing the brunt of the malicious attacks, including a surge in account takeovers, malicious live streams, and sophisticated phishing campaigns. Bitdefender Labs has been at the forefront in analysing these threats, and the numbers ...
The Growing Nexus of Cyber Security and Financial Warfare – An Australian’s Perspective

The Growing Nexus of Cyber Security and Financial Warfare – An Australian’s Perspective

Opening Remarks Sadly, it has become an undeniable reality that the traditional boundaries between conventional warfare and economic statecraft are rapidly dissolving. Cyber security and financial warfare have evolved into critical instruments of geopolitical influence and power projection, with significant implications for nations like Australia. The ...
Security Is An Arms Race, and The Bad Guys Are Two Steps Ahead

Security Is An Arms Race, and The Bad Guys Are Two Steps Ahead

Cloud environments are a notorious ransomware attack hot spot. It’s a calculated strategy on the part of the cybercriminals. As the old adage goes, ‘follow the money’, and that’s exactly what they’re doing. Predictions suggest cloud infrastructure spend will reach over US$135 billion in 2026, accounting for over 67 per cent of total compute and ...
The Challenges of Underfunding Data Teams: How Data Drives AI and Security

The Challenges of Underfunding Data Teams: How Data Drives AI and Security

This article delves into the critical role of data teams in supporting AI and security initiatives within organisations. It highlights the challenges that arise from underfunding these teams, emphasising the importance of data quality, governance, and management. The piece explores the imbalance in budget allocation, potential risks, and inefficiencies ...
Google’s Acquisition of Wiz Signals a Shift in Cloud Security

Google’s Acquisition of Wiz Signals a Shift in Cloud Security

The cloud security landscape is facing a seismic shift. With Google’s recent acquisition of Wiz, one of the industry’s most prominent cloud security providers, many in the industry are considering the implications of cloud providers also serving as vendors. Organisations operating in multi-cloud and hybrid environments must carefully evaluate how these ...
Super Fund Hacks: Are We Seeing Warning Signs or the Full Crisis?

Super Fund Hacks: Are We Seeing Warning Signs or the Full Crisis?

Australia faces another significant cybersecurity breach, this time targeting superannuation funds managing trillions in retirement savings. This attack highlights a severe erosion of public trust and underscores the gap between Australia's ambitious cybersecurity goals and actual readiness. Discover how lax security protocols, regulatory shortcomings, ...
No results found.

In The News

Cloudwerx Reunites Cloud Sherpas Alumni with Appointment of Brendan Connolly as COO and Data and AI Lead

Cloudwerx Reunites Cloud Sherpas Alumni with Appointment of Brendan Connolly as COO and Data and AI Lead

Sydney, 22 October 2025 – Cloudwerx, a leading Australian provider of solutions that integrate advanced data, Generative AI and cloud technology, has announced the appointment of Brendan Connolly as Chief Operating Officer and head of its data and agentic AI division. Based in Sydney, Connolly will be responsible for scaling and productising the ...
New SolarWinds Report: Gen AI Significantly Drops Incident Response Time for ITSM Teams

New SolarWinds Report: Gen AI Significantly Drops Incident Response Time for ITSM Teams

Findings show a path to more effective and efficient ITSM operations through generative AI
Metadata Becomes the Cornerstone of Cyber Defence as CISOs Reimagine 2026 Security Strategies

Metadata Becomes the Cornerstone of Cyber Defence as CISOs Reimagine 2026 Security Strategies

As organisations race to adopt artificial intelligence, the world’s cybersecurity leaders are being forced to rethink their entire defensive playbook. New research from Gigamon reveals that as AI reshapes how businesses innovate and how adversaries operate, chief information security officers (CISOs) are recalibrating their risk strategies to meet a ...
Malaysia Expands Deployment of BlackBerry Secure Communications for the  46th and 47th ASEAN Summits

Malaysia Expands Deployment of BlackBerry Secure Communications for the 46th and 47th ASEAN Summits

Malaysia modernizes mobile command and control, securing voice and messaging for inter-agency coordination with BlackBerry AtHoc and BlackBerry SecuSUITE
Sophos Launches ITDR to Protect Against Growing Identity-Based Attacks

Sophos Launches ITDR to Protect Against Growing Identity-Based Attacks

Today, Sophos announced the launch of Sophos Identity Threat Detection and Response (ITDR). This new solution for Sophos XDR and Sophos MDR continuously monitors customer environments for identity risks and misconfigurations and scans the dark web for compromised credentials. It enables organizations to detect and respond to identity-based attacks ...
Splunk Report Shows Observability is a Business Catalyst for AI Adoption, Customer Experience, and Product Innovation

Splunk Report Shows Observability is a Business Catalyst for AI Adoption, Customer Experience, and Product Innovation

Cisco today announced the release of the Splunk State of Observability 2025: The Rise of a Business Catalyst report, marking its fifth annual analysis into the evolving landscape of observability. This year's research highlights the critical role observability plays in delivering business value – from elevating customer experience and boosting employee ...
KBI.Media Announces Season Two of Destination Cyber, with New Host Chaahat Baghla

KBI.Media Announces Season Two of Destination Cyber, with New Host Chaahat Baghla

Sydney, Australia - Oct 21st - KBI.Media is proud to announce the launch of Destination Cyber: Season Two, featuring new host Chaahat Baghla, a rising cybersecurity voice and final-year student at Macquarie University, where she is completing a Bachelor of Cybersecurity. Baghla brings a student’s perspective and professional curiosity to the platform, ...
Salty Much: Darktrace’s View on a Recent Salt Typhoon Intrusion

Salty Much: Darktrace’s View on a Recent Salt Typhoon Intrusion

Salt Typhoon, a China-linked cyber espionage group, has been observed targeting global infrastructure using stealthy techniques such as DLL sideloading and zero-day exploits. Darktrace recently identified early-stage intrusion activity consistent with Salt Typhoon’s tactics, reinforcing the importance of anomaly-based detection over traditional ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This