The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Rethinking Security: Why Ethical Curiosity Belongs at the Core of Cyber Defence

Rethinking Security: Why Ethical Curiosity Belongs at the Core of Cyber Defence

Introduction  In 2023, the Latitude Financial cyberattack exposed over 14 million customer records, including driver  licences, passport numbers, and financial details. While remediation focused on containment and  response, one quiet question lingered for many defenders:  "Why didn’t we ask, 'what if?' sooner?"  That single moment underscores ...
How Wargaming Is Shaping Business Resilience and Cyber Security Strategies

How Wargaming Is Shaping Business Resilience and Cyber Security Strategies

Once the preserve of military strategy rooms and war colleges, wargaming is now being used across government, critical infrastructure, and enterprise to build clarity in the face of uncertainty. Nowhere is this more urgent than in cyber security and business resilience, where the cost of guessing wrong can be catastrophic.
Five Essential Factors to Future-Proof Physical Access Control Systems

Five Essential Factors to Future-Proof Physical Access Control Systems

As digital and physical workplaces continue to converge, Australian organisations face challenges with maintaining the safety of both work environments. For example, while an abundance of cloud-based services and AI agents makes updating security systems faster and easier than ever, many physical access control solutions (PACS) may struggle to ...
Fortifying Australia’s Data Centres: A Cybersecurity Imperative

Fortifying Australia’s Data Centres: A Cybersecurity Imperative

As AI accelerates digital transformation, Australia’s booming data centre industry must embed cyber resilience into its infrastructure design to defend against increasingly complex and converging threats across IT, OT, and physical systems.
The Future of Access Control: Embracing Edge Intelligence, Cyber Hardened Hardware and Ecosystem Resilience

The Future of Access Control: Embracing Edge Intelligence, Cyber Hardened Hardware and Ecosystem Resilience

As global security threats evolve, so must the approach to access control. According to the 2025 Trends in Access Controllers Report conducted by Mercury Security, a subsidiary of HID, three transformational currents emerged: edge intelligence and embedded applications; rigorous cybersecurity hardening; and an expanding ecosystem that values openness, ...
Why Separation of Duties Is Vital to Cybersecurity

Why Separation of Duties Is Vital to Cybersecurity

By embedding Separation of Duties into the fabric of their operations, businesses position themselves to respond confidently to evolving threats while meeting the demands of regulators, partners, and customers alike.
Cyber and Physical Worlds Collide in Critical Infrastructure

Cyber and Physical Worlds Collide in Critical Infrastructure

The convergence of cyber and physical security is no longer a hypothetical future; it’s the present reality for critical infrastructure operators worldwide. Sam Mackenzie, cybersecurity committee member at the Australian Computer Society (ACS), spoke intelligently about the challenges, demands, and culture shifts now facing organisations on the ...
Why CISOs Are Now Strategic Leaders in Cyber Preparedness

Why CISOs Are Now Strategic Leaders in Cyber Preparedness

Operational resilience is no longer a niche concern for the IT department. It is a strategic imperative, one that can safeguard business continuity, protect brand reputation, and maintain customer trust.
No results found.

In the News

Identity Attacks and AI Risks Emerging as Key Cloud Threats for Australian Organisations

Identity Attacks and AI Risks Emerging as Key Cloud Threats for Australian Organisations

Australian organisations accelerating their adoption of cloud and artificial intelligence technologies may be exposing themselves to new cybersecurity risks, according to new research from Google Cloud. The company’s Cloud Threat Horizons Report H1 2026 highlights a shift in how cyber attackers target cloud environments, with identity systems, cloud ...
Saviynt Taps NEXTGEN, an Exclusive Networks Company, to Accelerate Digital Identity Security in Australia

Saviynt Taps NEXTGEN, an Exclusive Networks Company, to Accelerate Digital Identity Security in Australia

Collaboration strengthens Saviynt’s partner-first strategy as AI-driven identity risk builds across the APJ region. | Saviynt will broaden access to AI-ready identity security for organisations navigating growing digital risks | NEXTGEN will help scale Saviynt’s partner ecosystem across APJ, enabling faster adoption of identity-centric security in the AI era
Fortinet Advances Its Security Operations Platform With Unified SOC, Agentic AI, and Expanded Endpoint Security

Fortinet Advances Its Security Operations Platform With Unified SOC, Agentic AI, and Expanded Endpoint Security

New innovations unify cloud SOC, agentic AI, managed detection and response, and endpoint protection within a single Security Fabric architecture
Fortinet Introduces FortiOS 8.0 to Expand Secure Networking With Secure AI Controls, Fabric-based AI Agents, Flexible SASE, and Simplified SD-WAN

Fortinet Introduces FortiOS 8.0 to Expand Secure Networking With Secure AI Controls, Fabric-based AI Agents, Flexible SASE, and Simplified SD-WAN

Latest FortiOS capabilities help organisations secure AI adoption, simplify operations, and strengthen protection across hybrid and multi-cloud environments
Tenable Patch Tuesday Commentary – March 2026

Tenable Patch Tuesday Commentary – March 2026

Microsoft patched 83 CVEs in its March 2026 Patch Tuesday release, with eight rated critical and 75 rated as important. Our counts omitted one CVE (CVE-2026-26030) assigned by GitHub. Elevation of privilege (EoP) vulnerabilities accounted for 55.4% of the vulnerabilities patched this month, followed by remote code execution (RCE)vulnerabilities at ...
Google Threat Intelligence Group Warns Enterprise Systems Now Dominate Global Zero-day Attacks

Google Threat Intelligence Group Warns Enterprise Systems Now Dominate Global Zero-day Attacks

Enterprise technologies have emerged as the primary target for zero-day exploitation, according to new research from the Google Threat Intelligence Group (GTIG), signalling a continued shift away from traditional browser-based attacks toward enterprise infrastructure and edge devices. In its report, “Look What You Made Us Patch: 2025 Zero-Days in ...
Ping Identity Advances Regional Trust With PROTECTED-Level IRAP Assessment

Ping Identity Advances Regional Trust With PROTECTED-Level IRAP Assessment

Strengthens Support for Australian Government and Regulated Enterprises
Macquarie Technology Group Secures A$200m Investment From National Reconstruction Fund Corporation

Macquarie Technology Group Secures A$200m Investment From National Reconstruction Fund Corporation

Macquarie Technology Group Limited (ASX: MAQ) (the “Company”) today announced that it has secured a A$200m hybrid investment from National Reconstruction Fund Corporation (NRFC). The NRFC is a sovereign investor established by the Australian Government to invest in Australian businesses to support nationally significant technological innovation, ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This