The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Unmasking Identity Risks Before They Become Breaches

Unmasking Identity Risks Before They Become Breaches

An effective identity security strategy must move beyond siloed tools and reactive policies. It requires unified visibility across all users and assets, contextual understanding of privilege, and automated enforcement of least-privilege principles.
Cyber-securing Enterprises, the AI Way

Cyber-securing Enterprises, the AI Way

“...Therefore, send not to know For whom the bell tolls, It tolls for thee.” John Donne, “No man is an island” Introduction No enterprise is an island of security when it comes to cyber-attacks. Australia suffered a staggering 47 million data breaches in 2024 — equivalent to one attack every second — representing a twelvefold increase ...
The Empty Boat Mindset – Rethinking Australia’s Cyber Defenses

The Empty Boat Mindset – Rethinking Australia’s Cyber Defenses

As cyberattacks rise across Australia's critical infrastructure, from airlines to superannuation funds, a quiet storm is forming beneath the surface, not just in code or firewalls, but in the mindsets shaping our national response. Surprisingly, a solution to our cybersecurity maturity might not be in quantum encryption or artificial intelligence but ...
AI Coding Assistants Boost Productivity … but at What Cost to Security?

AI Coding Assistants Boost Productivity … but at What Cost to Security?

As the pressure mounts to ship faster and innovate more aggressively, development teams must remember that code security is no longer optional but a business-critical necessity.
Baseline Compliance Is Just the Starting Line

Baseline Compliance Is Just the Starting Line

For years, compliance has been the word that quickly put anyone on the back foot. Compliance is one of those words that often carries a negative connotation, but it doesn’t have to. Some forward-thinking leaders are looking to rewrite the compliance script entirely. Jadee Hanson, Chief Information Security Officer at Vanta, has no patience for ...
How Emerging Technologies in Critical Infrastructure Are Expanding Cyber Risks

How Emerging Technologies in Critical Infrastructure Are Expanding Cyber Risks

Introduction Emerging technologies like industrial Internet of Things, unified platform architectures, and cloud-integrated operational technology are transforming the critical infrastructure landscape. This transformation, driven by the need for greater agility and pursuit of competitive advantage, is unlocking unprecedented levels of automation, ...
Privacy by Design: Future-proofing Data Security From the Ground Up

Privacy by Design: Future-proofing Data Security From the Ground Up

Introduction As AI reshapes how many of today’s enterprises operate, concerns over data privacy are accelerating. The pace of innovation is outstripping the capabilities of many legacy systems, and Australian businesses are grappling with issues related to transparency, access control and data security as a result. The core issue isn’t just the ...
The Price of Going Mobile App Viral

The Price of Going Mobile App Viral

The Tea app, a platform for women to rate and review dating experiences, recently went viral on the US App Store but suffered a severe data breach. Due to insecure Firebase storage and poor application security hygiene, over 72,000 private images including ID cards and selfies were exposed, with no access control or rate limiting in place. Metadata ...
No results found.

In the News

Dell Technologies Expands Cybersecurity and Resilience for the AI Era and Emerging Quantum Risks

Dell Technologies Expands Cybersecurity and Resilience for the AI Era and Emerging Quantum Risks

New enhancements help organisations strengthen device trust, improve cyber resilience and detect threats in AI data platforms Security by design approach hardens Dell commercial PCs[i] with quantum-ready protections AI-powered cyber resilience helps organisations spot ransomware signals earlier and simplify recovery at scale Managed ...
CrowdStrike Unveils Falcon Next-Gen SIEM Support for Microsoft Defender for Endpoint, Advancing Open Security Architecture

CrowdStrike Unveils Falcon Next-Gen SIEM Support for Microsoft Defender for Endpoint, Advancing Open Security Architecture

Falcon Next-Gen SIEM ingests Microsoft endpoint telemetry with no Falcon sensor required, as new innovations accelerate legacy SIEM transformation across heterogeneous environments CrowdStrike (NASDAQ: CRWD) today announced that Falcon® Next-Gen SIEM now ingests and correlates Microsoft Defender for Endpoint telemetry, enabling Microsoft endpoint ...
Rubrik Data Protection for Google Workspace Helps Enterprise Customers Achieve End-to-End Cyber Resilience

Rubrik Data Protection for Google Workspace Helps Enterprise Customers Achieve End-to-End Cyber Resilience

One of the first unified cyber resilience platforms for Google Workspace; provides customers with comprehensive protection across data, identity, and AI Accelerates recovery of operations to minutes, from days; keeps original data and systems intact  As adoption for Google Workspace continues to grow, Rubrik (NYSE: RBRK), the Security and AI ...
CrowdStrike Establishes the Endpoint as the Epicentre for AI Security

CrowdStrike Establishes the Endpoint as the Epicentre for AI Security

New Falcon platform innovations solidify CrowdStrike as AI’s security layer – extending AI agent discovery, governance, and runtime protection across endpoints, SaaS, browser, and cloud CrowdStrike (NASDAQ: CRWD) today announced new capabilities across the Falcon® platform that establish the endpoint as the epicentre for AI security and CrowdStrike ...
Oracle Launches AI Customer Excellence Centre to Drive Innovation Across Australia and Oceania

Oracle Launches AI Customer Excellence Centre to Drive Innovation Across Australia and Oceania

Sydney-based Oracle AI Customer Excellence Centre will serve as a regional hub to help organisations adopt the latest AI innovations and accelerate business transformation
Arctic Wolf Unveils the Aurora Superintelligence Platform to Redefine Security for the Age of AI

Arctic Wolf Unveils the Aurora Superintelligence Platform to Redefine Security for the Age of AI

Breakthrough advances bring superintelligence to cybersecurity, setting a higher standard for trustworthy AI in the industry
Qualys Debuts Industry’s First AI Agent for Safe Exploit Validation and Autonomous Remediation

Qualys Debuts Industry’s First AI Agent for Safe Exploit Validation and Autonomous Remediation

Agent Val exploits, mitigates and revalidates exposures against compensating controls continuously, dramatically reducing the average window of exposure Qualys, Inc. (NASDAQ: QLYS) , a leading provider of cloud-based IT, security and compliance solutions, today launched Agent Val within Enterprise TruRisk Management (ETM) to bring safe, agent-led ...
Arctic Wolf Launches the World’s Largest Commercial Agentic SOC to Usher in a New Era of Agent‑Led Security Operations

Arctic Wolf Launches the World’s Largest Commercial Agentic SOC to Usher in a New Era of Agent‑Led Security Operations

Complete platform transformation delivers a trustworthy Agentic SOC with turnkey deployment and proven ROI for organisations of every size
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This