The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Don’t Let Generative AI And LLMs Become A Third-Party Vulnerability

Don’t Let Generative AI And LLMs Become A Third-Party Vulnerability

As Large language models (LLMs) are increasingly being embedded into software development, organisations must ensure they understand the cyber security risks that come with it. Developer tools that have generative AI capability integrated to assist developers when writing code are on the rise. But the LLMs they rely on could be altered by threat actors.  
Creating Infrastructure Foundations For A Scalable Future

Creating Infrastructure Foundations For A Scalable Future

Meeting the complex demands of the future - including GenAI and ML - starts with getting ‘Network As a Service’ (NaaS) fundamentals right - right now.
The Cybersecurity Paradox: Mastering a Game That Has Already Changed

The Cybersecurity Paradox: Mastering a Game That Has Already Changed

For decades, enterprises have invested billions into mastering the art of cybersecurity firewalls, antivirus programs, perimeter defenses, and compliance checklists. Many have grown adept, even excellent, at these measures. However, excellence is a moving target in a world of relentless digital transformation. What if the tools we have perfected are no ...
How Unchecked Third-Party Access is Undermining Supply Chains

How Unchecked Third-Party Access is Undermining Supply Chains

As supply chains continue to evolve, so too must the frameworks that secure them. In an era where every digital interaction carries risk, identity is not just a technical concern: it’s the foundation of trust in the modern enterprise.
Why Securing Digital Identities Is Now a Business-Wide Imperative

Why Securing Digital Identities Is Now a Business-Wide Imperative

In the face of rising cyber risks, businesses that embed identity security into the fabric of their cybersecurity strategy will be better positioned to defend against attacks, protect data, and ensure operational resilience.
The Top Cyber Movies that Shaped our View for Better or for Worse?

The Top Cyber Movies that Shaped our View for Better or for Worse?

From flickering CRT monitors to sophisticated cyber heists, the proliferation of cyber films that mirrors our growing anxiety and fascination with life online. Hollywood has long toyed with the tension between human curiosity and digital dystopia. While some cyber films exaggerate for dramatic flair, others eerily foreshadow real world breaches, hacks, ...
7 Reasons Certifications Are Critical to Secure Communications

7 Reasons Certifications Are Critical to Secure Communications

Picture this scenario. You’re a government leader or a critical infrastructure operator. Suddenly, your communication systems go dark. The network has been breached, and sensitive information is exposed. Foreign adversaries are listening, decisions are delayed, and operations are paralyzed. Worse yet, you have no way of getting in touch with your ...
EOFY 2025: Australian Businesses Need To Mount Defences Against Rising Threat Of Cyberwarfare

EOFY 2025: Australian Businesses Need To Mount Defences Against Rising Threat Of Cyberwarfare

Modern cyberwarfare is a rising threat for Australian organisations and requires proactive exposure management for businesses to harden their defence against AI-enabled attacks.
No results found.

In The News

DroneShield Secures $8.2M Western Military Contract

DroneShield Secures $8.2M Western Military Contract

DroneShield has announced it has received a contract for $8.2 million from an in-country reseller for delivery to a western military end-customer. The reseller is a wholly owned subsidiary of a multi-billion dollar, global, publicly listed customer that is required to distribute the products to the western military government department in-country. The ...
Palo Alto Networks and Google Cloud Forge Landmark Agreement to Help Customers Securely Accelerate Cloud and AI Initiatives

Palo Alto Networks and Google Cloud Forge Landmark Agreement to Help Customers Securely Accelerate Cloud and AI Initiatives

SYDNEY, Australia, Dec. 22, 2025 /PRNewswire/ - As enterprises race to harness the transformative power of agentic AI and cloud computing, Palo Alto Networks (NASDAQ: PANW) and Google Cloud today announced a significant expansion of their strategic partnership to enable the secure development and deployment of AI solutions and provide a trusted ...
DigiCert Forecasts the Security Priorities Poised to Define 2026 

DigiCert Forecasts the Security Priorities Poised to Define 2026 

From AI to quantum, eight tech predictions that show what organisations must brace for next year
NinjaOne Named a Leader in Two IDC MarketScapes for Endpoint Management

NinjaOne Named a Leader in Two IDC MarketScapes for Endpoint Management

NinjaOne recently announced that it has been recognised as a Leader in two IDC MarketScape reports: Worldwide Unified Endpoint Management Software for Small and Medium Businesses (doc # US53003425, December 2025) Worldwide Client Endpoint Management Software for Windows Device Management (doc # US53002925, December 2025) NinjaOne was also ...
Vantage Markets Recognised for Real-time Threat Intelligence Collaboration with Trend Micro

Vantage Markets Recognised for Real-time Threat Intelligence Collaboration with Trend Micro

Innovation Partnership Award highlights deep collaboration, real-time intelligence sharing, and advanced security deployment across one of Australia’s leading financial trading platforms
The Secret Life of Parked Domains: The Internet’s Forgotten Real Estate Is Now a Pressing Threat

The Secret Life of Parked Domains: The Internet’s Forgotten Real Estate Is Now a Pressing Threat

New Infoblox Threat Intel research finds that over 90 per cent of visits to parked domains now redirect users to malicious content, reversing a decade old risk profile.
Fake Deals or Real Brands? DigiCert Finds Verified Logos in Email Help Online Shoppers Stay Safe During Boxing Day Sales

Fake Deals or Real Brands? DigiCert Finds Verified Logos in Email Help Online Shoppers Stay Safe During Boxing Day Sales

Study shows verified brand identities in email protect consumers from phishing while driving higher engagement and brand credibility during peak online shopping season and beyond
Fortinet Delivers Isolated Infrastructure Acceleration for the AI Factory with NVIDIA

Fortinet Delivers Isolated Infrastructure Acceleration for the AI Factory with NVIDIA

Collaboration integrates firewalling, segmentation, and policy enforcement directly into NVIDIA BlueField-accelerated infrastructure for higher performance, stronger isolation, and simpler operations
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This