The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

From Gallipoli to the Digital Frontier: The ANZAC Spirit in Cybersecurity

From Gallipoli to the Digital Frontier: The ANZAC Spirit in Cybersecurity

Context As dawn breaks on ANZAC Day, Australians and New Zealanders pause to remember the sacrifices of the soldiers who stormed the beaches of Gallipoli in 1915. However, in a hyperconnected 21st-century world, the fight for national sovereignty has shifted from trenches and shores to servers and silicon. Today, a new generation of defenders stands ...
The Shadowy Threats Stalking Australia’s Ballot Box

The Shadowy Threats Stalking Australia’s Ballot Box

As Australia edges toward another election, a new and invisible threat stalks our democratic process, not from hackers in dark rooms, but from sophisticated, well-funded nation states wielding artificial intelligence. According to Ginny Badanes, General Manager of Democracy Forward at Microsoft, 2024 has seen democracy itself placed in the ...
How Adopting Maturity Models Can Improve Enterprise IT Security

How Adopting Maturity Models Can Improve Enterprise IT Security

Having developers well trained in security techniques is vital for the production of resilient code. Taking time to achieve this now can avoid significant disruption and losses in the future.
Why Web Application Firewalls are a Critical Shield for Fintech Security

Why Web Application Firewalls are a Critical Shield for Fintech Security

The implementation of AI-driven, cloud-native WAF solutions offers financial institutions a robust defence mechanism against cyber threats.
The Real Corporate Penetration Testing Process: How Companies Get Hacked Before The Hackers Do! 🚀

The Real Corporate Penetration Testing Process: How Companies Get Hacked Before The Hackers Do! 🚀

Hey guys, I’m sn0x — a cybersecurity researcher, bug hunter, and security enthusiast. I hold multiple certifications, including CNSP, EWPTXv2, CEH v11–12, GRC, RHCSA, and Cisco Cyber Threat Management. I’ve been ranked #1 in India and #2 globally on TryHackMe, secured #134 on Hack The Box in 2021, and even won HTB Battlegrounds twice. But hey, this ...
What in the DeepSeek?

What in the DeepSeek?

DeepSeek, the tool designed to exploit vulnerabilities in AI systems, raises significant concerns amongst the security industry, particularly OpenAI. The DeepSeek competitor discussed the potential for DeepSeek to undermine the security of AI applications, which could have far-reaching consequences for technology as we know it. Satnam Narang, Senior ...
AI First, Human Second: The New Cybersecurity Command Structure

AI First, Human Second: The New Cybersecurity Command Structure

"Man is the measure of all things." ― Protagora - pre-Socratic Greek philosopher It’s an ancient idea, yet it feels more relevant than ever as machines start making decisions that were once left to human minds. In today’s high-stakes cybersecurity landscape, artificial intelligence is no longer a future wager; it’s a frontline asset. AI systems detect ...
Data Management – It’s A High-stakes Game

Data Management – It’s A High-stakes Game

This article explores the security risks associated with poorly managed data, and details how regulations from OAIC and APRA are raising the stakes for both professionals and organisations alike.
No results found.

In The News

BeyondTrust Experts Reveal Top Cybersecurity Predictions for 2026 and Beyond

BeyondTrust Experts Reveal Top Cybersecurity Predictions for 2026 and Beyond

From AI fragmentation and identity debt to biological computing, BeyondTrust forecasts the technologies and threats that will shape the next decade. | Experts predict a surge in agentic AI adoption, identity exploitation, and global regulatory shifts redefining digital trust.
New Bitdefender and NETGEAR Report Reveals Rising Threats Across the Connected Home Landscape

New Bitdefender and NETGEAR Report Reveals Rising Threats Across the Connected Home Landscape

Bitdefender today released new joint research with NETGEAR titled the 2025 IoT Security Landscape Report, providing a comprehensive analysis of the growing threats targeting connected devices in modern homes. The research highlights how the expanding Internet of Things (IoT) ecosystem, spanning everything from smart TVs and streaming boxes to routers ...
Akamai Inference Cloud Transforms AI from Core to Edge with NVIDIA

Akamai Inference Cloud Transforms AI from Core to Edge with NVIDIA

Akamai Technologies, Inc. (NASDAQ:AKAM) today launched Akamai Inference Cloud, a platform that redefines where and how AI is used by expanding inference from core data centres to the edge of the internet. Akamai Inference Cloud enables intelligent, agentic AI inference at the edge, close to users and devices. Unlike traditional systems this platform ...
Palo Alto Networks Unveils Cortex AgentiX to Build, Deploy and Govern the Agentic Workforce of the Future

Palo Alto Networks Unveils Cortex AgentiX to Build, Deploy and Govern the Agentic Workforce of the Future

Enhanced platform combines the power of agentic AI with the safety of enterprise-grade guardrails
GitHub Evolves Platform Into Agent HQ As Developer Growth Hits Record Highs

GitHub Evolves Platform Into Agent HQ As Developer Growth Hits Record Highs

Sydney, 29 October 2025 — At GitHub Universe 2025, GitHub announced Agent HQ—its vision for the next evolution of its platform. Agent HQ transforms GitHub into an open ecosystem that unites every agent on a single platform. Over the coming months, coding agents from Anthropic, OpenAI, Google, Cognition, xAI, and more, will become available directly ...
GitHub Reveals Australian Growth Data and Developer Insights

GitHub Reveals Australian Growth Data and Developer Insights

Over 2 million Aussies are now coding software, as AI lowers barriers to entry worldwide
Trend Micro Awards Over USD$1,000,000 to Ethical Hackers 

Trend Micro Awards Over USD$1,000,000 to Ethical Hackers 

Participants at Pwn2Own Ireland discovered scores of zero-day vulnerabilities
Organisations That Delay Responding to Email Breaches are 79% More Likely to Suffer a Ransomware Hit

Organisations That Delay Responding to Email Breaches are 79% More Likely to Suffer a Ransomware Hit

· New research shows 76% of Australian respondents experienced an email security breach in the previous 12 months · The average cost of recovering from a single email security breach in Australia exceeds $280,000 USD (approx. $430,000 AUD). · Smaller companies are hit hardest with recovery costs of nearly $2,000 USD per employee
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This