The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Enough With the Optics: IT Is Time for Cyber Accountability, Not Publicity Stunts
Summary
Following the recent Qantas data breach, which once again exposes our national cybersecurity vulnerabilities, we are met with press releases and performative outrage from prominent government officials. The breach reveals a fundamental issue that no amount of media statements or vague reassurances can hide. Despite the hype surrounding the ...

Why Does Recovery Take so Long? But IT Doesn’t Have To
Recently, Commvault released the State of Data Readiness Report, which surveyed more than 400 leaders from across Australia and New Zealand. Executives believe their companies must recover within 24-48 hours. IT and security teams estimate five to seven days if they are to be realistic. The actual global average is about 24 days offline.
I sat down ...
NBN or Mobile broadband? How to Choose the Right Business Internet Setup
Introduction
Setting up internet for your business is not a one size fits all exercise. Whether you're running a solo consultancy, managing a busy retail outlet, or coordinating a remote team, choosing between NBN and mobile broadband can significantly impact your daily operations. With digital connectivity now critical for everything from cloud ...

Alleged Russian Hackers Target Norwegian DAM
Why this cyber attack on a Norwegian dam should have you paying attention

How Consumer Data Rights Are Changing the Way Australian Businesses Operate
Introduction
Consumer data rights reforms in Australia are reshaping how enterprises handle personal information by introducing operational, legal, and technical responsibilities that apply across every part of the business. That includes how data is collected, how it is stored, and how it moves between internal teams and external systems.
John ...

The Rising Role of Citizen Automators in Business Innovation
Australia is facing a deepening shortage of technology skills in the coming years, putting pressure on businesses that need developers and other ICT professionals to innovate successfully. But new tools are enabling the rise of citizen developers to fill these tech gaps, here’s how.

Identity: The New Currency in Cybersecurity
Digital identity is now cybercriminals' top target. With data breaches up 78% globally, businesses must invest in Identity & Access Management to protect employees and customers—it's both a security imperative and ethical obligation.

Qantas Breached and Customers Are Fuming
Earlier today it was announced across mainstream media channels that Qantas suffered a data breach, affecting approximately six million customers. The breach was linked to a cyber attack targeting a third-party platform used by the prominent airline’s contact centre.
Exposed information includes names, email addresses, phone numbers, and frequent ...
No results found.
In the News
VAST Data and CrowdStrike Partner to Establish a Unified Security Model for the AI Lifecycle
At VAST Forward 2026, VAST Data, the AI Operating System company, and CrowdStrike (NASDAQ: CRWD) announced a strategic partnership that combines VAST’s native data-layer governance and platform-level controls with CrowdStrike’s enterprise-grade threat detection and automated response. By integrating these capabilities within the VAST AI Operating ...
BeyondTrust Recognised as a Leader and Outperformer in the 2026 GigaOm Radar for Cloud Infrastructure Entitlement Management (CIEM)
BeyondTrust’s Pathfinder platform earns Leader distinction in Innovation / Platform Play quadrant
GigaOm highlights BeyondTrust’s AI-driven analytics, just-in-time access, lifecycle governance, and multicloud compliance capabilities
Atlanta, GA – February 26, 2026 — BeyondTrust, the global leader in privilege-centric identity security protecting ...
Genetec Sets a New Standard for Enterprise Physical Security With Cloudlink 2210
New high-density appliance enables enterprises to scale cloud-managed physical security without forcing cloud-only storage or infrastructure replacement
Sydney, 2 March 2026 — Genetec Inc. (“Genetec”), the global leader in enterprise physical security software, today announced Genetec Cloudlink™ 2210. Designed for complex, enterprise-scale ...
Macquarie Technology Delivers Twenty-two Consecutive Halves of EBITDA Growth
Macquarie Technology Group Ltd (ASX: MAQ) (the Company) today announced its results for the half-year ended 31 December 2025, which were in line with guidance.
Chairman Peter James said, “Macquarie Technology Group is pleased to announce its 22nd consecutive half of EBITDA growth. The Company continues to grow and evolve and sees ongoing opportunities ...
VAST Data Introduces Polaris to Orchestrate Globally Distributed AI Data Infrastructure Across Hybrid Multicloud Environments
At VAST Forward 2026, AI operating system VAST Data announced Polaris, a global control plane designed to provision, operate and orchestrate distributed AI infrastructure across public cloud, neocloud and on-premises datacentre environments. Polaris transforms VAST deployments into a unified, fleet-scale platform, enabling enterprises to manage AI data ...
New Phishing Campaigns Weaponise Reserved Domain Name Space
New research from Infoblox Threat Intel shows how criminals twist a core part of the internet to slip past many of today’s standard security checks.
Phishing attacks are everywhere, but historically, their tactics follow clear patterns and trends. Research by Infoblox Threat Intel uncovers an anomaly – a new method utilised by cybercriminals to ...
Saviynt Bolsters Its AI-Powered Identity Security Through Integrations With Amazon Quick
New Amazon Q integrations deliver deeper context and agentic AI workflows for identity teams
Sydney – February 27, 2026 – Saviynt, a leading provider of AI-powered identity security solutions, has announced a new agentic AI-based conversational capability built on Amazon Quick and the general availability of its Amazon Quick Index ...
ManageEngine Introduces Causal Intelligence and Autonomous AI to IT Operations for Faster Incident Response
New Site24x7 Capabilities Combine Domain-Aware Correlations, autonomous AI, And Workflow Orchestration To Drive Self-Healing IT Operations
Delivers faster root-cause identification with causal intelligence–driven correlation
Improves incident response efficiency using AI
Enables controlled remediation at scale through governed workflow ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
