The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Privacy by Design: Future-proofing Data Security From the Ground Up
Introduction
As AI reshapes how many of today’s enterprises operate, concerns over data privacy are accelerating. The pace of innovation is outstripping the capabilities of many legacy systems, and Australian businesses are grappling with issues related to transparency, access control and data security as a result.
The core issue isn’t just the ...

The Price of Going Mobile App Viral
The Tea app, a platform for women to rate and review dating experiences, recently went viral on the US App Store but suffered a severe data breach. Due to insecure Firebase storage and poor application security hygiene, over 72,000 private images including ID cards and selfies were exposed, with no access control or rate limiting in place. Metadata ...

Database 23ai: Innovation or Mere Iteration?
Discover how Oracle's Database 23ai is transforming business data by integrating AI, bridging the gap traditional databases couldn’t. Unlock personalized, context-aware insights effortlessly with cutting-edge technology.

Repatriating the Cloud – Why Cybersecurity Must Now Take Center Stage
“The cloud is just someone else’s computer,” goes the old tech joke, and like many good jokes, it conceals a sobering truth. For years, organizations eagerly adopted public cloud platforms for the sake of agility, cost savings, and unlimited scalability. But today, that enthusiasm is being tempered by a harsh reality: those “someone else’s” computers ...

Rethinking Security: Why Ethical Curiosity Belongs at the Core of Cyber Defence
Introduction
In 2023, the Latitude Financial cyberattack exposed over 14 million customer records, including driver licences, passport numbers, and financial details. While remediation focused on containment and response, one quiet question lingered for many defenders:
"Why didn’t we ask, 'what if?' sooner?"
That single moment underscores ...

How Wargaming Is Shaping Business Resilience and Cyber Security Strategies
Once the preserve of military strategy rooms and war colleges, wargaming is now being used across government, critical infrastructure, and enterprise to build clarity in the face of uncertainty. Nowhere is this more urgent than in cyber security and business resilience, where the cost of guessing wrong can be catastrophic.

Five Essential Factors to Future-Proof Physical Access Control Systems
As digital and physical workplaces continue to converge, Australian organisations face challenges with maintaining the safety of both work environments. For example, while an abundance of cloud-based services and AI agents makes updating security systems faster and easier than ever, many physical access control solutions (PACS) may struggle to ...

Fortifying Australia’s Data Centres: A Cybersecurity Imperative
As AI accelerates digital transformation, Australia’s booming data centre industry must embed cyber resilience into its infrastructure design to defend against increasingly complex and converging threats across IT, OT, and physical systems.
No results found.
In the News
NetApp Sets the Game Plan for AI-Ready Data Operations Across Australia and New Zealand
NetApp’s vision to help organisations like the National Football League (NFL) bring intelligence to their data and reduce IT complexities
Claroty Announces Cybercriminals Are Increasingly Targeting Global Critical Infrastructure via CPS
New research finds cybercriminals are increasingly targeting global critical infrastructure via direct access to cyber-physical systems | Claroty’s Team82 Investigated Hundreds of Politically, Socially Motivated Attacks on Exposed Internet-Facing Devices Including HMI and SCADA Assets
JFrog Unveils Universal MCP Registry, Delivering a Secure System of Record for the AI-Driven Software Supply Chain
SYDNEY, Australia. – March 19, 2026 – JFrog Ltd (Nasdaq: FROG), the Liquid Software company and creators of the JFrog Software Supply Chain Platform, the system of record for software artifacts, binaries, and AI assets, today introduced its JFrog MCP Registry. Expanding on current capabilities in JFrog AI Catalog, the new registry acts as a single ...
UiPath Collaborates With Microsoft to Accelerate Security and Confidence for Automated Workflows
Integration demonstrates the power of agentic automation and security platforms working together to protect modern enterprises
Malicious IDE Extension Uses Solana blockchain to Steal Developer Credentials
Bitdefender researchers have uncovered a malicious extension targeting the Windsurf integrated development environment (IDE) that uses the Solana blockchain to deliver malware designed to steal sensitive data from developers.
The campaign disguises the extension as a tool for R language development inside Visual Studio Code–compatible environments. ...
Exabeam Expands Award-Winning Exabeam APEX Partner Program With New MSSP Commercial Framework
Flexible, pooled licensing model purpose-built to help managed security providers scale faster and grow predictably
Secure Code Warrior Launches Trust Agent: AI to Enable Safe, Scalable AI-Driven Development
New AI Software Governance solution makes AI-generated code visible at commit, enforces policy before production, and connects real development behaviour to measurable risk reduction
Synechron Unifies Australian Firms Chamonix IT, Exposé and iGreenData Under Company’s Brand
Leading global firm appoints Scott Grigg as country managing director to build Australian consulting business
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
- 353
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
