The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Empty Boat Mindset – Rethinking Australia’s Cyber Defenses

The Empty Boat Mindset – Rethinking Australia’s Cyber Defenses

As cyberattacks rise across Australia's critical infrastructure, from airlines to superannuation funds, a quiet storm is forming beneath the surface, not just in code or firewalls, but in the mindsets shaping our national response. Surprisingly, a solution to our cybersecurity maturity might not be in quantum encryption or artificial intelligence but ...
AI Coding Assistants Boost Productivity … but at What Cost to Security?

AI Coding Assistants Boost Productivity … but at What Cost to Security?

As the pressure mounts to ship faster and innovate more aggressively, development teams must remember that code security is no longer optional but a business-critical necessity.
Baseline Compliance Is Just the Starting Line

Baseline Compliance Is Just the Starting Line

For years, compliance has been the word that quickly put anyone on the back foot. Compliance is one of those words that often carries a negative connotation, but it doesn’t have to. Some forward-thinking leaders are looking to rewrite the compliance script entirely. Jadee Hanson, Chief Information Security Officer at Vanta, has no patience for ...
How Emerging Technologies in Critical Infrastructure Are Expanding Cyber Risks

How Emerging Technologies in Critical Infrastructure Are Expanding Cyber Risks

Introduction Emerging technologies like industrial Internet of Things, unified platform architectures, and cloud-integrated operational technology are transforming the critical infrastructure landscape. This transformation, driven by the need for greater agility and pursuit of competitive advantage, is unlocking unprecedented levels of automation, ...
Privacy by Design: Future-proofing Data Security From the Ground Up

Privacy by Design: Future-proofing Data Security From the Ground Up

Introduction As AI reshapes how many of today’s enterprises operate, concerns over data privacy are accelerating. The pace of innovation is outstripping the capabilities of many legacy systems, and Australian businesses are grappling with issues related to transparency, access control and data security as a result. The core issue isn’t just the ...
The Price of Going Mobile App Viral

The Price of Going Mobile App Viral

The Tea app, a platform for women to rate and review dating experiences, recently went viral on the US App Store but suffered a severe data breach. Due to insecure Firebase storage and poor application security hygiene, over 72,000 private images including ID cards and selfies were exposed, with no access control or rate limiting in place. Metadata ...
Database 23ai: Innovation or Mere Iteration?

Database 23ai: Innovation or Mere Iteration?

Discover how Oracle's Database 23ai is transforming business data by integrating AI, bridging the gap traditional databases couldn’t. Unlock personalized, context-aware insights effortlessly with cutting-edge technology.
Repatriating the Cloud – Why Cybersecurity Must Now Take Center Stage

Repatriating the Cloud – Why Cybersecurity Must Now Take Center Stage

“The cloud is just someone else’s computer,” goes the old tech joke, and like many good jokes, it conceals a sobering truth. For years, organizations eagerly adopted public cloud platforms for the sake of agility, cost savings, and unlimited scalability. But today, that enthusiasm is being tempered by a harsh reality: those “someone else’s” computers ...
No results found.

In the News

Lenovo Accelerates Production-Ready Enterprise AI With NVIDIA—From AI Inferencing to Gigawatt-Scale AI Factories

Lenovo Accelerates Production-Ready Enterprise AI With NVIDIA—From AI Inferencing to Gigawatt-Scale AI Factories

Lenovo unveiled new Lenovo Hybrid AI Advantage™ with NVIDIA solutions designed to accelerate AI adoption, reduce time-to-first-token (TTFT), and deliver measurable business results across personal, enterprise, and cloud environments. Building on the inferencing acceleration introduced at Lenovo Tech World, this next phase of Hybrid AI execution expands ...
Arctic Wolf and Wiz Join Forces to Counter Rising Cloud Threats With End-to-End Cloud Security and Response

Arctic Wolf and Wiz Join Forces to Counter Rising Cloud Threats With End-to-End Cloud Security and Response

Industry-leading Agentic SOC combined with Wiz’s cloud-native application protection to deliver cloud response backed by 24×7 security operations

Check Point Releases AI Factory Security Blueprint to Safeguard AI Infrastructure From GPU Servers to LLM Prompts

As enterprises and neo-clouds invest billions in private AI infrastructure, Check Point delivers the industry's most comprehensive security architecture for AI data centres REDWOOD CITY, CA. March 23, 2026 -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today released the AI Factory ...
BeyondTrust Delivers Industry’s First Unified Privileged Identity Solution for AI Agent Coworkers and Workloads, From the Desktop to the Cloud

BeyondTrust Delivers Industry’s First Unified Privileged Identity Solution for AI Agent Coworkers and Workloads, From the Desktop to the Cloud

New capabilities in the BeyondTrust Pathfinder Platform secure AI agent coworkers on endpoints and AI agent workloads across cloud infrastructure and SaaS platforms Security teams gain visibility into AI agent identities, privileges, and secrets across platforms including OpenAI, AWS Bedrock, Salesforce Agentforce, ServiceNow, and Google Vertex ...
Cisco Reimagines Security for the Agentic Workforce

Cisco Reimagines Security for the Agentic Workforce

With end-to-end security across AI actions, Cisco is helping organizations confidently deploy AI agents at scale
Tanium Autonomous IT Platform Delivered 235% ROI, According to Recent Study

Tanium Autonomous IT Platform Delivered 235% ROI, According to Recent Study

The Total Economic Impact (TEI) of Tanium Autonomous IT study reveals 75% reduction in MTTR, 95% greater workstation patching efficiency and 70% productivity boost by year three with Tanium
ManageEngine Endpoint Central Advances Towards Autonomous Endpoint Security With EDR and Secure Private Access

ManageEngine Endpoint Central Advances Towards Autonomous Endpoint Security With EDR and Secure Private Access

Company Unveils the First Natively Built Platform Combining UEM, Endpoint Security (EPP with EDR), Digital Employee Experience (DEX), and Secure Private Access
Delinea Finds 90% of Australian Organisations Pressure Security Teams to Loosen Identity Controls for AI

Delinea Finds 90% of Australian Organisations Pressure Security Teams to Loosen Identity Controls for AI

New research highlights visibility gaps around AI-driven identities, rising NHI risks, and an AI security confidence paradox 
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This