The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Overcoming The Complexity And Security Issues Posed By AI Coding Tools

Overcoming The Complexity And Security Issues Posed By AI Coding Tools

The advantages AI tools deliver in speed and efficiency are impossible for time-crunched developers to resist. But the complexity and risk created by AI-generated code can’t be ignored either. Organisations need to thoroughly upskill their developers so that they can work with security professionals to nip software security problems in the bud. Only by ...
Insider Threats: The Silent Cybersecurity Crisis Facing Australian Businesses

Insider Threats: The Silent Cybersecurity Crisis Facing Australian Businesses

In a climate where data is currency and trust is critical, defending against insider threats is not just a technical necessity - it’s a business imperative.
Uncomfortable Truths Behind Cybersecurity Failures

Uncomfortable Truths Behind Cybersecurity Failures

In Episode 4 of the DevSecOops podcast, hosts Tom Walker and Scott Fletcher discussed what’s really dragging security down in modern organisations. And spoiler, it’s not the hackers. If you’re someone in tech, security, or just trying to make sense of how to run a safer, smarter organisation, this one is for you. No Longer A Departmental ...
Why ‘Boring’ Data Backups Could Save Millions

Why ‘Boring’ Data Backups Could Save Millions

Imran Husain, Global Chief Internet Information Security Officer at MillerKnoll, spoke about the often underestimated arena of manufacturing. Data backups may be boring, Husain warns, but ignoring them comes at a potential large cost.Manufacturing has long been viewed as slow to adopt new technologies. As Husain describes, for years the sector’s ...
The Risky Race to AI: How DeepSeek Is Reshaping the AI Landscape

The Risky Race to AI: How DeepSeek Is Reshaping the AI Landscape

The launch of DeepSeek-R1, a cost-effective, open-source large language model (LLM) by Chinese startup DeepSeek, is shaking up the AI landscape by offering high-quality tools at a fraction of the cost of Western competitors. While this democratizes access to advanced AI and could spark a wave of open-source innovation, it has also triggered significant ...
When Priorities Collide, How Do You Make the Right Call?

When Priorities Collide, How Do You Make the Right Call?

In Episode 2 of the DevSecOops podcast, hosts Tom Walker, James Vincent, and Scott Fletcher explored one of the biggest yet most overlooked challenges in organisations today: how to make the right decisions, especially when business, technology, and security priorities clash or collide. So, how can organisations balance these three? Equal ...
Why Hack In When You Can Log In

Why Hack In When You Can Log In

The identity security game has changed, and we’ve made it easier for attackers to win. Not because they’re smarter or more sophisticated (though many are), but because we’ve handed them the keys. Through unchecked identity sprawl, we’ve given cybercriminals a golden ticket to infiltrate what is arguably an organisation’s most valuable asset: its ...
Is Platformisation the New Rage?

Is Platformisation the New Rage?

We’ve seen trends come and go. But is platformisation here to stay? Venkat Balakrishnan, Chief Information Security Officer at TAL shares his opinion on why this is the best approach forward. The industry is witnessing a forward shift towards ‘platformisation’ - a newish trend that consolidates multiple cyber functions into a single integrated ...
No results found.

In The News

Sophos XDR Delivers 100% Detection Coverage In the Latest MITRE ATT&CK Evaluation

Sophos XDR Delivers 100% Detection Coverage In the Latest MITRE ATT&CK Evaluation

Sophos today announced its best-ever results in the MITRE ATT&CK® Enterprise 2025 Evaluation. Sophos XDR detected 100% of adversary behaviours (sub-steps)1 across two complex attack scenarios: Scattered Spider, which Sophos X-Ops tracks as GOLD HARVEST, a financially motivated cybercriminal collective, and Mustang Panda, which Sophos X-Ops tracks ...
Macquarie Technology Announces Director Appointment and a New Group Executive

Macquarie Technology Announces Director Appointment and a New Group Executive

Macquarie Technology Group today announced the appointment of Luke Clifton as Director of Macquarie Technology Operations Pty Ltd as the company continues to scale across telecommunications, cloud, cybersecurity, and data centres. Clifton, who after nearly 15 years in senior leadership, including more than a decade leading Macquarie Telecom, has ...
Kyndryl Unveils Quantum Safe Assessment Service to Enable Enterprise Readiness for the Quantum Era

Kyndryl Unveils Quantum Safe Assessment Service to Enable Enterprise Readiness for the Quantum Era

New service helps organisations identify cryptographic vulnerabilities and build scalable post-quantum strategies
Cloudflare Publishes Top Internet Trends for 2025

Cloudflare Publishes Top Internet Trends for 2025

Intensifying bot wars, a sharp rise in attacks on civil society organisations, and rapid progress in post-quantum encryption mark a pivotal year online. 
GitHub: Australian Public Sector AI Adoption to Expand in 2026, ROI Takes Centre Stage

GitHub: Australian Public Sector AI Adoption to Expand in 2026, ROI Takes Centre Stage

Sharryn Napier, VP, GitHub, shares her predictions for 2026 in the wake of 2 million+ developers in Australia now building on the platform and as the government announces its National AI Plan.
DroneShield Secures $49.6M European Military Contract

DroneShield Secures $49.6M European Military Contract

DroneShield Limited (ASX:DRO) has announced it has received a contract for $49.6 million from an in-region European reseller that is contractually required to distribute the products to a European military end-customer. The contract is for handheld counter-drone systems, associated accessories, and software updates. DroneShield has a large portion of ...
CrowdStrike Announces the General Availability of Falcon AI Detection and Response to Secure the New AI Attack Surface

CrowdStrike Announces the General Availability of Falcon AI Detection and Response to Secure the New AI Attack Surface

With unified AI prompt-layer protection, CrowdStrike secures enterprise AI everywhere it happens – from development through workforce usage
Tenable Research Finds No-Code Agentic AI Can be Used for Financial Fraud and Workflow Hijacking

Tenable Research Finds No-Code Agentic AI Can be Used for Financial Fraud and Workflow Hijacking

New findings demonstrate how democratised AI tools like Microsoft Copilot Studio can inadvertently leak sensitive data and execute unauthorised financial actions
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This