The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Cyber and Physical Worlds Collide in Critical Infrastructure

Cyber and Physical Worlds Collide in Critical Infrastructure

The convergence of cyber and physical security is no longer a hypothetical future; it’s the present reality for critical infrastructure operators worldwide. Sam Mackenzie, cybersecurity committee member at the Australian Computer Society (ACS), spoke intelligently about the challenges, demands, and culture shifts now facing organisations on the ...
Why CISOs Are Now Strategic Leaders in Cyber Preparedness

Why CISOs Are Now Strategic Leaders in Cyber Preparedness

Operational resilience is no longer a niche concern for the IT department. It is a strategic imperative, one that can safeguard business continuity, protect brand reputation, and maintain customer trust.
Why Digital Identity Is the Key to a Fairer, Safer Financial System

Why Digital Identity Is the Key to a Fairer, Safer Financial System

Beyond convenience, the integration tackles real-world friction, the kind that costs both time and trust. Prior to ConnectID, if someone’s details didn’t align with outdated government records, we’d get stuck in a frustrating cycle of manual reviews, long phone calls, and delays. Now, we validate identities quickly using dynamic, bank-held data.
The Guardians That Safeguard Our Critical Infrastructure

The Guardians That Safeguard Our Critical Infrastructure

Introduction Every day, critical industry sectors like healthcare, government and utilities services rely on digital systems that are mission-critical but vulnerable to cyber threats. Yet, the professionals safeguarding these systems often go unrecognised. Imagine a hospital's life-support systems faltering during critical surgery, a school building’s ...
The Unseen Price of ‘Going Faster’

The Unseen Price of ‘Going Faster’

The constant talk of ‘seamless migration’ and ‘cloud first strategy’ can sometimes result in burnt out engineering teams and security risks nobody wants to look at. Iress, a leading tech company in financial services, decided to embark on decade long push to transform, accelerate, and above all, stay relevant. Technical debt, too many tools, and the ...
Shifting Left to Tap Into Untapped Revenue

Shifting Left to Tap Into Untapped Revenue

Introduction In the past, security and revenue were considered two sides of a coin; one a business enabler, the other a compliance necessity. But that mindset is quickly becoming obsolete. The most forward-thinking software companies are now embedding security into their go-to-market strategies early and often. By “shifting left”, they’re not only ...
Beyond Cleanup: Why Executive Cyber Literacy Is Australia’s Missing Link

Beyond Cleanup: Why Executive Cyber Literacy Is Australia’s Missing Link

Introduction “The adversary doesn’t need a new attack vector, just an old weakness you never fixed.” Over the past 12 months, Australia has experienced a surge of high-profile cyberattacks impacting industries such as aviation, superannuation, and higher education. While each incident is individually significant, together they reveal a deeper issue, ...
The Hidden Cost of Technology Evolution

The Hidden Cost of Technology Evolution

Enterprise technology is often defined by speed, new platforms, and better systems. But for Matt Watts, a Data Expert, the space’s obsession with what’s next has created a blind spot. Behind every step forward lies obsolete systems, forgotten data, and unfinished ideas powering on in limbo. As the pace accelerates, so does the urgency to rethink how we ...
No results found.

In the News

Rapid7 2026 Global Threat Landscape Report Shows Exploited High and Critical-Severity Vulnerabilities Surged 105% as Attack Timelines Collapsed

Rapid7 2026 Global Threat Landscape Report Shows Exploited High and Critical-Severity Vulnerabilities Surged 105% as Attack Timelines Collapsed

Released today, the Rapid7 2026 Global Threat Landscape Report: Decoding the Accelerated Cyber Attack Cycle, finds that the window between vulnerability disclosure and confirmed exploitation continues to collapse, leaving organisations with dramatically less time to assess risk, prioritise remediation, and contain threats before impact.
NetApp Sets the Game Plan for AI-Ready Data Operations Across Australia and New Zealand

NetApp Sets the Game Plan for AI-Ready Data Operations Across Australia and New Zealand

NetApp’s vision to help organisations like the National Football League (NFL) bring intelligence to their data and reduce IT complexities  
Claroty Announces Cybercriminals Are Increasingly Targeting Global Critical Infrastructure via CPS

Claroty Announces Cybercriminals Are Increasingly Targeting Global Critical Infrastructure via CPS

New research finds cybercriminals are increasingly targeting global critical infrastructure via direct access to cyber-physical systems | Claroty’s Team82 Investigated Hundreds of Politically, Socially Motivated Attacks on Exposed Internet-Facing Devices Including HMI and SCADA Assets
JFrog Unveils Universal MCP Registry, Delivering a Secure System of Record for the AI-Driven Software Supply Chain

JFrog Unveils Universal MCP Registry, Delivering a Secure System of Record for the AI-Driven Software Supply Chain

SYDNEY, Australia. – March 19, 2026 –  JFrog Ltd (Nasdaq: FROG), the Liquid Software company and creators of the JFrog Software Supply Chain Platform, the system of record for software artifacts, binaries, and AI assets, today introduced its JFrog MCP Registry. Expanding on current capabilities in JFrog AI Catalog, the new registry acts as a single ...
UiPath Collaborates With Microsoft to Accelerate Security and Confidence for Automated Workflows

UiPath Collaborates With Microsoft to Accelerate Security and Confidence for Automated Workflows

Integration demonstrates the power of agentic automation and security platforms working together to protect modern enterprises
Malicious IDE Extension Uses Solana blockchain to Steal Developer Credentials

Malicious IDE Extension Uses Solana blockchain to Steal Developer Credentials

Bitdefender researchers have uncovered a malicious extension targeting the Windsurf integrated development environment (IDE) that uses the Solana blockchain to deliver malware designed to steal sensitive data from developers. The campaign disguises the extension as a tool for R language development inside Visual Studio Code–compatible environments. ...
Exabeam Expands Award-Winning Exabeam APEX Partner Program With New MSSP Commercial Framework

Exabeam Expands Award-Winning Exabeam APEX Partner Program With New MSSP Commercial Framework

Flexible, pooled licensing model purpose-built to help managed security providers scale faster and grow predictably
Secure Code Warrior Launches Trust Agent: AI to Enable Safe, Scalable AI-Driven Development

Secure Code Warrior Launches Trust Agent: AI to Enable Safe, Scalable AI-Driven Development

New AI Software Governance solution makes AI-generated code visible at commit, enforces policy before production, and connects real development behaviour to measurable risk reduction
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This