The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

What Happens When the World’s Biggest Vulnerability Database Goes Dark?

What Happens When the World’s Biggest Vulnerability Database Goes Dark?

MITRE, the cornerstone of global vulnerability tracking, announcing it could go dark. For years, the field had relied on this single repository, the bedrock for tracking software vulnerabilities. What happens when that rug is pulled from beneath an entire industry? Tal Zarfati, Architect Lead at JFrog Security, still recalls the tremor this news sent ...
Minimising Third-party Risk

Minimising Third-party Risk

Minimise third-party risk with smart vendor management. Learn how to protect data, ensure compliance, and streamline reviews with automation.
The Blind Spot in Your Cyber Strategy

The Blind Spot in Your Cyber Strategy

 Recently on the DevSecOops podcast, Hosts Tom Walker, James Vincent, and Scott Fletcher unpacked the modern threats in the cybersecurity space. With years of experience in IT and cybersecurity, the hosts shared real world experiences, from everyday technical mishaps to nation sponsored cyberattacks, offering practical advice for staying secure amid ...
How Wiz Is Rewriting the Cloud Security Story

How Wiz Is Rewriting the Cloud Security Story

In Episode 7 of the DevSecOops podcast, hosts Tom Walker, Scott Fletcher, and James Vincent sat down with Matt Preswick, Principal Solutions Engineer at Wiz APJ, to unpack how Wiz has become an emerging favourite of both engineering teams and the executive suite. Beyond that, they also discussed the broader issue of the everyday realities of cloud ...
What Australian Businesses Need to Do to Bolster Their Cyber Defences During the EOFY

What Australian Businesses Need to Do to Bolster Their Cyber Defences During the EOFY

Introduction With the end of the financial year (EOFY) fast approaching, it’s more important now than ever for businesses to be even more vigilant and take stock of their online security. Tax season is a time of increased cyber threats and is ripe for cybercriminals and scammers to strike. Ways AI Is Being Utilised In EOFY Scams While the ...
WTF Is Happening in Tech?

WTF Is Happening in Tech?

In the latest episode of the DevSecOops podcast, hosts Tom Walker and Scott Fletcher discussed three of the most talked about topics in enterprise IT including Kubernetes, the March 2025 Oracle Cloud security breach, and how AI is reshaping both productivity and cybersecurity. Kubernetes - Necessary Evolution or Needless Complexity? Tom did not ...
Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets

Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets

Computer Emergency Response Teams (CERTs) are the unsung heroes of cybersecurity. There are many myths about their role and function. Contrary to popular belief they don’t certify cybersecurity professionals, and many don’t do emergency response.  Operating in the background, CERTs provide vital functions in anticipating and reducing the impact of ...
Don’t Let Generative AI and LLMs Become a Third-Party Vulnerability

Don’t Let Generative AI and LLMs Become a Third-Party Vulnerability

As Large language models (LLMs) are increasingly being embedded into software development, organisations must ensure they understand the cyber security risks that come with it. Developer tools that have generative AI capability integrated to assist developers when writing code are on the rise. But the LLMs they rely on could be altered by threat actors.  
No results found.

In the News

Exabeam Research: AI Accountability Becomes the New Mandate as Cybersecurity Economics Shift

Exabeam Research: AI Accountability Becomes the New Mandate as Cybersecurity Economics Shift

95% of organisations are increasing cybersecurity budgets in 2026 with AI as the top spending driver despite being the hardest investment to justify BROOMFIELD, Colo. – February 24, 2026 – Exabeam, a global leader in intelligence and automation that powers security operations, today announced the findings of its new multinational report, From Adoption ...
Appointment: Zepto Creates New Chief Business Resilience Officer Role to Lead Security and Risk

Appointment: Zepto Creates New Chief Business Resilience Officer Role to Lead Security and Risk

Zepto appoints Mariana Paun as Chief Business Resilience Officer. The newly created role will unify teams to strengthen security, risk and compliance under Paun’s leadership.
Sophos Active Adversary Report Finds Identity Attacks Dominate as Threat Groups Proliferate

Sophos Active Adversary Report Finds Identity Attacks Dominate as Threat Groups Proliferate

Sophos has released the 2026 Sophos Active Adversary Report, which reveals that 67% of all incidents investigated by Sophos Incident Response (IR) and Managed Detection and Response (MDR) teams last year were rooted in identity-related attacks. The findings highlight how attackers continue to exploit compromised credentials, weak or missing multifactor ...
Armis Launches Developer Portal to Help Global Organisations Operationalise Asset Intelligence

Armis Launches Developer Portal to Help Global Organisations Operationalise Asset Intelligence

“The Armis Developer Portal provides more than just documentation; we are giving the developer and security community direct access to the world’s most robust asset intelligence. This empowers them to move beyond simple monitoring to an intelligent, proactive security posture.”
Veeam Introduces Agent Commander to Confront Agentic AI Risk at Enterprise Scale

Veeam Introduces Agent Commander to Confront Agentic AI Risk at Enterprise Scale

Veeam® Software, the Data and AI Trust Company, today announced Agent Commander, the first unified solution to help organisations safely detect AI risk, protect AI systems, and undo AI mistakes, empowering them to proactively address AI-driven risks and securely scale AI agents everywhere. The first integration from Veeam’s successful acquisition of ...
Sharon AI & Cisco Launch Australia’s First Cisco Secure AI Factory With NVIDIA

Sharon AI & Cisco Launch Australia’s First Cisco Secure AI Factory With NVIDIA

Cisco and Sharon AI launch Australia’s first Cisco Secure AI Factory with NVIDIA, providing secure, high-performance AI infrastructure with all data processing remaining in the country | Powered by 1024 NVIDIA Blackwell Ultra GPUs, Cisco’s UCS servers and Nexus Hyperfabric technology, it supports Australia’s National AI Plan and accelerates enterprise ...
Akamai Secures Critical Infrastructure With Agentless Zero Trust Segmentation Powered by NVIDIA

Akamai Secures Critical Infrastructure With Agentless Zero Trust Segmentation Powered by NVIDIA

Akamai Guardicore Segmentation and NVIDIA BlueField integration ends the long-standing trade-off between advanced security and system performance for energy, manufacturing, and transportation sectors
Tenable Research Reveals Growing AI Exposure Gap Fuelled by Supply Chain Risks and Lack of Identity Controls

Tenable Research Reveals Growing AI Exposure Gap Fuelled by Supply Chain Risks and Lack of Identity Controls

Tenable report finds 86% of organisations have installed third-party code packages with critical-severity vulnerabilities; 65% expose high-value assets through forgotten cloud credentials
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This