The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Shaping The Future Of AI: How Australia’s National AI Capability Plan Sets The Stage For Ethical And Secure AI Adoption

Shaping The Future Of AI: How Australia’s National AI Capability Plan Sets The Stage For Ethical And Secure AI Adoption

As artificial intelligence (AI) continues to revolutionise industries worldwide, its rapid advancement brings both vast opportunities and significant responsibilities. AI has the potential to transform sectors like healthcare, finance, manufacturing, and education, driving innovation and efficiency in unprecedented ways. However, as AI becomes embedded ...
How a Veteran Project Manager Tames Cyber Chaos

How a Veteran Project Manager Tames Cyber Chaos

Recently, on DevSecOops podcast; Hosts Tom Walker, James Vincent, and Scott Fletcher bring on a special guest, Natalie Haslam, an industry veteran with 25 years of project management experience within traditional IT, application development, and more recently, cybersecurity. Natalie’s reflection on the challenges of delivering cyber projects in the ...
What in the Cloud?

What in the Cloud?

DevSecOops podcast hosts Tom Walker, James Vincent, and Scott Fletcher debate which cloud platform reigns supreme. Choosing between major cloud providers can get overwhelming. The three Co-Hosts set aside their usual neutrality to champion AWS (Amazon Web Services), Microsoft Azure, and Oracle Cloud Infrastructure (OCI), diving deep into what each ...
How Analysing 700,000 Security Incidents Helped Our Understanding of Living Off the Land Tactics

How Analysing 700,000 Security Incidents Helped Our Understanding of Living Off the Land Tactics

This article shares initial findings from internal Bitdefender Labs research into Living off the Land (LOTL) techniques. Our team at Bitdefender Labs, comprised of hundreds of security researchers with close ties to academia, conducted this analysis as foundational research during the development of our GravityZone Proactive Hardening and Attack ...
Postmortem: Australian Retailer, The Iconic Incident Review

Postmortem: Australian Retailer, The Iconic Incident Review

In 2024, a sophisticated credential stuffing attack targeted The Iconic, a leading Australian online fashion retailer. This breach compromised customer accounts, raising serious concerns about cybersecurity measures within the retail industry. Affected individuals faced unauthorized transactions and potential data exposure. The Iconic has initiated a ...
What Makes You Board Ready?

What Makes You Board Ready?

Discover why serving on a corporate board might be more than just a career milestone. Dr. Keith Dorsey challenges conventional thinking, urging reflection and strategic planning. Learn what boards now seek: unique skills and genuine purpose. Are you ready to add real value?
The Cybersecurity Professionalisation Debate, are we at a Crossroads?

The Cybersecurity Professionalisation Debate, are we at a Crossroads?

The annual AUSCERT conference, a major gathering for cybersecurity professionals, industry leaders, and academics, unfolded last week at the Star Casino on the sunny Gold Coast. AUSCERT’s General Manager, Ivano Bongiovanni, spoke with me about the heated debate around professionalising the field. Traditionally, cybersecurity has been seen as a ...
Why Australian Boards Need to Rethink Risk in the Age of AI

Why Australian Boards Need to Rethink Risk in the Age of AI

The nature of corporate risk in Australia is evolving rapidly at a strategic, reputational, and liability level. As the next five years shape up to be even more disruptive in the world of risk management, Australian boards need to begin paying swift attention not only to how artificial intelligence (AI) is going to reshape the risk environment itself, ...
No results found.

In The News

Infoblox Streamlines IP Address Management Across Hybrid Cloud Environments with AWS

Infoblox Streamlines IP Address Management Across Hybrid Cloud Environments with AWS

Infoblox, the leader in uniting networking, security and cloud with a protective DDI platform, today announced a new integration between Infoblox Universal IP Address Management™ (Universal IPAM) and Amazon Virtual Private Cloud IP Address Manager (Amazon VPC IPAM). The integration is designed to accelerate application rollouts and updates by ...
Rubrik Agent Cloud Enhances Trusted Agentic AI Deployments for Microsoft Copilot Studio

Rubrik Agent Cloud Enhances Trusted Agentic AI Deployments for Microsoft Copilot Studio

Rubrik (NYSE: RBRK), the Security and AI Operations company, today announced that Rubrik Agent Cloud will integrate with Microsoft Copilot Studio to accelerate trusted enterprise AI agent adoption. As AI transformation expands across organisations, Rubrik Agent Cloud helps them to adopt agents at scale with the ability to monitor, govern, and ...
Darktrace’s APJ Threat Report Shows North Korea and China-nexus Groups’ Advanced AI Capabilities to Hit Email, Cloud and Third-party Vendors

Darktrace’s APJ Threat Report Shows North Korea and China-nexus Groups’ Advanced AI Capabilities to Hit Email, Cloud and Third-party Vendors

Geopolitical tensions, rapid digital transformation, and deeper integration of generative AI have seen a sharp rise in the volume and sophistication of attacks across the region.
Fortinet and Crime Stoppers International Launch Global Cybercrime Bounty Program

Fortinet and Crime Stoppers International Launch Global Cybercrime Bounty Program

First-of-its-kind initiative incentivises deterrence and disruption of cybercrime through anonymous tips and rewards 
Claroty Releases New AI-powered CPS Library, Setting Revolutionary New Standards for Asset Visibility and Vulnerability Attribution

Claroty Releases New AI-powered CPS Library, Setting Revolutionary New Standards for Asset Visibility and Vulnerability Attribution

OEM partners including Rockwell Automation and Schneider Electric help drive the fundamental shift in asset identification
Exabeam and Recorded Future Partner to Power Intelligence-Led Threat Detection and Response

Exabeam and Recorded Future Partner to Power Intelligence-Led Threat Detection and Response

Strategic integration enables security teams to move from reactive to proactive with real-time threat context and automated response
Check Point Software Technologies Completes Australian Information Security Registered Assessors Program Assessment

Check Point Software Technologies Completes Australian Information Security Registered Assessors Program Assessment

Sydney, 19 November 2025 — Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced the successful completion and delivery of an Australian Government Information Security Registered Assessors Program (IRAP) assessment Report for its Check Point Cloud Infinity products, at the ...
Sophos Integrates Advanced Cyber Intelligence into Microsoft Security Copilot and Microsoft 365 Copilot

Sophos Integrates Advanced Cyber Intelligence into Microsoft Security Copilot and Microsoft 365 Copilot

Sophos has announced its robust repository of cyber threat intelligence, with Microsoft Security Copilot and Microsoft 365 Copilot. Introduced at the Microsoft Ignite Conference in San Francisco, organisations of all sizes gain real-time access to Sophos threat intelligence within Microsoft’s AI-powered environments, helping them strengthen defences ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This