The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
From Zero to Stack
Recently on the DevSecOops podcast, hosts Tom Walker and Scott Fletcher explored what it takes to build a modern IT environment from scratch. The pair discussed the tools that work, the ones that don’t, and how decisions should be based on people.
The conversation kicked off with a topic that’s top of mind for many: virtualisation in a post-VMware ...

LinkedIn DMs Are Not a Business Continuity Plan
According to recent research conducted by Semperis, there’s a genuine gap between feeling prepared and actually being prepared when an incident hits. And when the lights go out those plans often burn as quickly as the crisis. Courtney Guss, Director of Crisis Response at Semperis, spoke about corporate preparedness or lack thereof. 97% of companies ...

The Countdown to Quantum Has Begun
How New Certificate Lifecycle Standards Are Set to Prepare the Business Landscape for a Quantum Ready Future
Five Telecom Habits of Smart Small Businesses
Introduction
Small businesses often grow quickly, but if their telecommunications setup doesn’t support this growth, productivity and service can suffer. With a few strategic habits, SMEs can avoid tech growing pains. Here are the top telecom habits that the savviest Australian small businesses adopt early on.
Consolidate Where IT Makes Sense
It’s ...

Tool Sprawl a Silent Sabotage?
Sunny Rao, SVP Asia Pacific at JFrog recently cites how Australia and New Zealand tech leaders are confronting their own ‘broken’ software supply chains.
Ask an enterprise security leader what really keeps them up at night, and the answer is rarely that easy, unfortunately. For Rao, the narrative isn’t one of failure, but the evolution.
“We are ...
Rethinking the Office Phone: Why Cloud PBX Is the Future for SMBs
Overview
For many small to medium-sized enterprises (SMBs), the office phone system can be treated as a set-and-forget utility. Yet business needs have changed, particularly with the advent of hybrid work and rising customer service expectations, and traditional phone setups are starting to show their age. Cloud-based PBX (Private Branch Exchange) ...

The Scattered Spider, Airline Attacks and How to Be Breach Ready!
Introduction
On July 2, 2025, Qantas, Australia's flagship airline, disclosed a cyberattack that compromised the personal information of up to six million customers, first detected on June 30, 2025. Touted as one of the most significant data breaches in Australia's recent history, the attack is suspected to be the work of the notorious Scattered ...

Enough With the Optics: IT Is Time for Cyber Accountability, Not Publicity Stunts
Summary
Following the recent Qantas data breach, which once again exposes our national cybersecurity vulnerabilities, we are met with press releases and performative outrage from prominent government officials. The breach reveals a fundamental issue that no amount of media statements or vague reassurances can hide. Despite the hype surrounding the ...
No results found.
In the News
Telstra Joins Forces With Major Banks to Tackle Money Laundering
Recent pilot reports potential to bring forward detection of suspected money mule activity by as much as 90 days, as cross-industry collaboration takes on growing threat.
Equinix Unveils the Distributed AI Hub to Simplify and Secure Enterprise AI Infrastructure
Equinix has launched the Distributed AI Hub, a unified framework designed to help organisations scale AI efficiently, run workloads closer to data, and overcome the challenges of distributed intelligence.
Motorola Solutions Helps Victorian Search and Rescue Dog Teams Perform Safe and Successful Missions
Robust radio technology supports interagency collaboration in the state’s most rugged and remote terrain
Palo Alto Networks Unit 42 Uncovers Vulnerability in Google Chrome’s Gemini AI Panel
Google confirmed the findings and released a fix in early January 2026
ControlPlane Launches Enterprise Support for OpenBao to Strengthen Secrets Security
ControlPlane, a specialist AI Security and DevSecOps consultancy, today announced the launch of ControlPlane Enterprise for OpenBao, a new offering designed to help organisations across Asia Pacific and globally to securely adopt and operate the OpenBao secrets management platform.
KnowBe4 Research Reveals Over Half of Australians Prioritise Work Accounts Over Personal Security
New study finds 76% of Australians feel confident spotting cyber threats, but risky habits like password reuse and credential sharing remain widespread
Baidam Appoints Beau Hodge as CEO
BRISBANE, QLD – [12th March 2026] – Baidam, a leading First Nations information technology provider, has announced the appointment of Beau Hodge to the role of CEO. Hodge has held a succession of senior roles within Baidam since joining nearly five years ago.
For Jack Reis and Pip Jenkinson, co-founders and owners of Baidam, Hodge’s appointment will ...
“LeakyLooker” Discovery Reveals Nine Vulnerabilities in Google Looker Studio, Exposing Sensitive Cloud Data
Tenable Research has uncovered a series of security vulnerabilities in Google Looker Studio, dubbed "LeakyLooker," that allowed attackers to run arbitrary SQL queries on victims’ databases and exfiltrate sensitive data within organisations' Google Cloud environments.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
