The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Cyber and Physical Worlds Collide in Critical Infrastructure

Cyber and Physical Worlds Collide in Critical Infrastructure

The convergence of cyber and physical security is no longer a hypothetical future; it’s the present reality for critical infrastructure operators worldwide. Sam Mackenzie, cybersecurity committee member at the Australian Computer Society (ACS), spoke intelligently about the challenges, demands, and culture shifts now facing organisations on the ...
Why CISOs Are Now Strategic Leaders in Cyber Preparedness

Why CISOs Are Now Strategic Leaders in Cyber Preparedness

Operational resilience is no longer a niche concern for the IT department. It is a strategic imperative, one that can safeguard business continuity, protect brand reputation, and maintain customer trust.
Why Digital Identity Is the Key to a Fairer, Safer Financial System

Why Digital Identity Is the Key to a Fairer, Safer Financial System

Beyond convenience, the integration tackles real-world friction, the kind that costs both time and trust. Prior to ConnectID, if someone’s details didn’t align with outdated government records, we’d get stuck in a frustrating cycle of manual reviews, long phone calls, and delays. Now, we validate identities quickly using dynamic, bank-held data.
The Guardians That Safeguard Our Critical Infrastructure

The Guardians That Safeguard Our Critical Infrastructure

Introduction Every day, critical industry sectors like healthcare, government and utilities services rely on digital systems that are mission-critical but vulnerable to cyber threats. Yet, the professionals safeguarding these systems often go unrecognised. Imagine a hospital's life-support systems faltering during critical surgery, a school building’s ...
The Unseen Price of ‘Going Faster’

The Unseen Price of ‘Going Faster’

The constant talk of ‘seamless migration’ and ‘cloud first strategy’ can sometimes result in burnt out engineering teams and security risks nobody wants to look at. Iress, a leading tech company in financial services, decided to embark on decade long push to transform, accelerate, and above all, stay relevant. Technical debt, too many tools, and the ...
Shifting Left to Tap Into Untapped Revenue

Shifting Left to Tap Into Untapped Revenue

Introduction In the past, security and revenue were considered two sides of a coin; one a business enabler, the other a compliance necessity. But that mindset is quickly becoming obsolete. The most forward-thinking software companies are now embedding security into their go-to-market strategies early and often. By “shifting left”, they’re not only ...
Beyond Cleanup: Why Executive Cyber Literacy Is Australia’s Missing Link

Beyond Cleanup: Why Executive Cyber Literacy Is Australia’s Missing Link

Introduction “The adversary doesn’t need a new attack vector, just an old weakness you never fixed.” Over the past 12 months, Australia has experienced a surge of high-profile cyberattacks impacting industries such as aviation, superannuation, and higher education. While each incident is individually significant, together they reveal a deeper issue, ...
The Hidden Cost of Technology Evolution

The Hidden Cost of Technology Evolution

Enterprise technology is often defined by speed, new platforms, and better systems. But for Matt Watts, a Data Expert, the space’s obsession with what’s next has created a blind spot. Behind every step forward lies obsolete systems, forgotten data, and unfinished ideas powering on in limbo. As the pace accelerates, so does the urgency to rethink how we ...
No results found.

In the News

Equinix Unveils the Distributed AI Hub to Simplify and Secure Enterprise AI Infrastructure

Equinix Unveils the Distributed AI Hub to Simplify and Secure Enterprise AI Infrastructure

Equinix has launched the Distributed AI Hub, a unified framework designed to help organisations scale AI efficiently, run workloads closer to data, and overcome the challenges of distributed intelligence.
Motorola Solutions Helps Victorian Search and Rescue Dog Teams Perform Safe and Successful Missions

Motorola Solutions Helps Victorian Search and Rescue Dog Teams Perform Safe and Successful Missions

Robust radio technology supports interagency collaboration in the state’s most rugged and remote terrain
Palo Alto Networks Unit 42 Uncovers Vulnerability in Google Chrome’s Gemini AI Panel

Palo Alto Networks Unit 42 Uncovers Vulnerability in Google Chrome’s Gemini AI Panel

Google confirmed the findings and released a fix in early January 2026
ControlPlane Launches Enterprise Support for OpenBao to Strengthen Secrets Security

ControlPlane Launches Enterprise Support for OpenBao to Strengthen Secrets Security

ControlPlane, a specialist AI Security and DevSecOps consultancy, today announced the launch of ControlPlane Enterprise for OpenBao, a new offering designed to help organisations across Asia Pacific and globally to securely adopt and operate the OpenBao secrets management platform.
KnowBe4 Research Reveals Over Half of Australians Prioritise Work Accounts Over Personal Security

KnowBe4 Research Reveals Over Half of Australians Prioritise Work Accounts Over Personal Security

New study finds 76% of Australians feel confident spotting cyber threats, but risky habits like password reuse and credential sharing remain widespread  
Baidam Appoints Beau Hodge as CEO

Baidam Appoints Beau Hodge as CEO

BRISBANE, QLD – [12th March 2026] – Baidam, a leading First Nations information technology provider, has announced the appointment of Beau Hodge to the role of CEO. Hodge has held a succession of senior roles within Baidam since joining nearly five years ago. For Jack Reis and Pip Jenkinson, co-founders and owners of Baidam, Hodge’s appointment will ...
“LeakyLooker” Discovery Reveals Nine Vulnerabilities in Google Looker Studio, Exposing Sensitive Cloud Data

“LeakyLooker” Discovery Reveals Nine Vulnerabilities in Google Looker Studio, Exposing Sensitive Cloud Data

Tenable Research has uncovered a series of security vulnerabilities in Google Looker Studio, dubbed "LeakyLooker," that allowed attackers to run arbitrary SQL queries on victims’ databases and exfiltrate sensitive data within organisations' Google Cloud environments.
Identity Attacks and AI Risks Emerging as Key Cloud Threats for Australian Organisations

Identity Attacks and AI Risks Emerging as Key Cloud Threats for Australian Organisations

Australian organisations accelerating their adoption of cloud and artificial intelligence technologies may be exposing themselves to new cybersecurity risks, according to new research from Google Cloud. The company’s Cloud Threat Horizons Report H1 2026 highlights a shift in how cyber attackers target cloud environments, with identity systems, cloud ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This