The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How Consumer Data Rights Are Changing the Way Australian Businesses Operate

How Consumer Data Rights Are Changing the Way Australian Businesses Operate

Introduction Consumer data rights reforms in Australia are reshaping how enterprises handle personal information by introducing operational, legal, and technical responsibilities that apply across every part of the business. That includes how data is collected, how it is stored, and how it moves between internal teams and external systems. John ...
The Rising Role of Citizen Automators in Business Innovation

The Rising Role of Citizen Automators in Business Innovation

Australia is facing a deepening shortage of technology skills in the coming years, putting pressure on businesses that need developers and other ICT professionals to innovate successfully. But new tools are enabling the rise of citizen developers to fill these tech gaps, here’s how.
Identity: The New Currency in Cybersecurity

Identity: The New Currency in Cybersecurity

Digital identity is now cybercriminals' top target. With data breaches up 78% globally, businesses must invest in Identity & Access Management to protect employees and customers—it's both a security imperative and ethical obligation.
Qantas Breached and Customers Are Fuming

Qantas Breached and Customers Are Fuming

Earlier today it was announced across mainstream media channels that Qantas suffered a data breach, affecting approximately six million customers. The breach was linked to a cyber attack targeting a third-party platform used by the prominent airline’s contact centre. Exposed information includes names, email addresses, phone numbers, and frequent ...
What Happens When the World’s Biggest Vulnerability Database Goes Dark?

What Happens When the World’s Biggest Vulnerability Database Goes Dark?

MITRE, the cornerstone of global vulnerability tracking, announcing it could go dark. For years, the field had relied on this single repository, the bedrock for tracking software vulnerabilities. What happens when that rug is pulled from beneath an entire industry? Tal Zarfati, Architect Lead at JFrog Security, still recalls the tremor this news sent ...
Minimising Third-party Risk

Minimising Third-party Risk

Minimise third-party risk with smart vendor management. Learn how to protect data, ensure compliance, and streamline reviews with automation.
The Blind Spot in Your Cyber Strategy

The Blind Spot in Your Cyber Strategy

 Recently on the DevSecOops podcast, Hosts Tom Walker, James Vincent, and Scott Fletcher unpacked the modern threats in the cybersecurity space. With years of experience in IT and cybersecurity, the hosts shared real world experiences, from everyday technical mishaps to nation sponsored cyberattacks, offering practical advice for staying secure amid ...
How Wiz Is Rewriting the Cloud Security Story

How Wiz Is Rewriting the Cloud Security Story

In Episode 7 of the DevSecOops podcast, hosts Tom Walker, Scott Fletcher, and James Vincent sat down with Matt Preswick, Principal Solutions Engineer at Wiz APJ, to unpack how Wiz has become an emerging favourite of both engineering teams and the executive suite. Beyond that, they also discussed the broader issue of the everyday realities of cloud ...
No results found.

In the News

Kyndryl Unveils Agentic AI Workflow Governance for Trusted Deployment of Mission‑Critical AI Agents

Kyndryl Unveils Agentic AI Workflow Governance for Trusted Deployment of Mission‑Critical AI Agents

Policy as code capability transforms compliance in regulated agentic AI workflows | Automated policy enforcement establishes guardrails, codifies compliance and boosts transparency across enterprise operations
Palo Alto Networks Completes Acquisition of CyberArk to Secure the AI Era

Palo Alto Networks Completes Acquisition of CyberArk to Secure the AI Era

Adds the leading platform that delivers unified security for human, machine and agentic identity.
Riverbed Study Finds 92% of Decision Makers in the Financial Services Industry Agree That Improving Data Quality Is Critical to AI Success 

Riverbed Study Finds 92% of Decision Makers in the Financial Services Industry Agree That Improving Data Quality Is Critical to AI Success 

Financial Services organisations lead with a strong ROI on AIOps initiatives but only 12% have AI projects fully deployed enterprise-wide, and a substantial 62% still remain in pilot or development stages 
CISOs Driving Growth Through Cyber Resilience, but AI and Supply Chain Visibility Cause Lingering Gaps

CISOs Driving Growth Through Cyber Resilience, but AI and Supply Chain Visibility Cause Lingering Gaps

February 12, 2026 – LevelBlue, the world’s largest pure-play provider of managed security services, has released its latest research report, Persona Spotlight: CISO (Chief Information Security Officer), part of the company’s ongoing research into how cybersecurity leaders are navigating an increasingly complex threat landscape ...
Genetec Advances Investigation Speed and Efficiency With Built for Enterprise Capabilities in Security Center SaaS

Genetec Advances Investigation Speed and Efficiency With Built for Enterprise Capabilities in Security Center SaaS

New investigation capabilities reduce investigation time from hours to minutes across complex, multi-site, and multi-vendor environments
Sophos Acquires Arco Cyber to Bring CISO-Level, Agentic AI-Powered Expertise to Every Organisation

Sophos Acquires Arco Cyber to Bring CISO-Level, Agentic AI-Powered Expertise to Every Organisation

Sophos has announced the acquisition of UK-based Arco Cyber, a cybersecurity assurance company dedicated to helping organisations improve their security posture while staying ahead of compliance requirements and emerging threats. The acquisition is an important step in Sophos’ strategy to help organisations strengthen cybersecurity strategy and ...
Armis Launches Armis Centrix™ for Application Security to Secure the Code That Runs Organisations

Armis Launches Armis Centrix™ for Application Security to Secure the Code That Runs Organisations

Today’s application security landscape is overloaded with fragmented, static point solutions, each solving a piece of the puzzle but creating noise, inefficiencies, and blind spots. Armis Centrix™ for Application Security is an AI-powered solution for detection, contextualisation, and remediation.
NinjaOne Expands Platform With IT Asset Management to Reduce Cost and Risk

NinjaOne Expands Platform With IT Asset Management to Reduce Cost and Risk

Today, announced NinjaOne IT Asset Management (ITAM), a new solution that gives IT teams complete visibility and control across their entire IT environment by unifying endpoint and asset management. Built natively into the NinjaOne platform, ITAM helps organisations extend the life of their assets, reduce costs, strengthen security, and improve ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This