The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why Does Recovery Take so Long? But IT Doesn’t Have To

Why Does Recovery Take so Long? But IT Doesn’t Have To

Recently, Commvault released the State of Data Readiness Report, which surveyed more than 400 leaders from across Australia and New Zealand. Executives believe their companies must recover within 24-48 hours. IT and security teams estimate five to seven days if they are to be realistic. The actual global average is about 24 days offline. I sat down ...
NBN or Mobile broadband? How to Choose the Right Business Internet Setup

NBN or Mobile broadband? How to Choose the Right Business Internet Setup

Introduction Setting up internet for your business is not a one size fits all exercise. Whether you're running a solo consultancy, managing a busy retail outlet, or coordinating a remote team, choosing between NBN and mobile broadband can significantly impact your daily operations. With digital connectivity now critical for everything from cloud ...
Alleged Russian Hackers Target Norwegian DAM

Alleged Russian Hackers Target Norwegian DAM

Why this cyber attack on a Norwegian dam should have you paying attention
How Consumer Data Rights Are Changing the Way Australian Businesses Operate

How Consumer Data Rights Are Changing the Way Australian Businesses Operate

Introduction Consumer data rights reforms in Australia are reshaping how enterprises handle personal information by introducing operational, legal, and technical responsibilities that apply across every part of the business. That includes how data is collected, how it is stored, and how it moves between internal teams and external systems. John ...
The Rising Role of Citizen Automators in Business Innovation

The Rising Role of Citizen Automators in Business Innovation

Australia is facing a deepening shortage of technology skills in the coming years, putting pressure on businesses that need developers and other ICT professionals to innovate successfully. But new tools are enabling the rise of citizen developers to fill these tech gaps, here’s how.
Identity: The New Currency in Cybersecurity

Identity: The New Currency in Cybersecurity

Digital identity is now cybercriminals' top target. With data breaches up 78% globally, businesses must invest in Identity & Access Management to protect employees and customers—it's both a security imperative and ethical obligation.
Qantas Breached and Customers Are Fuming

Qantas Breached and Customers Are Fuming

Earlier today it was announced across mainstream media channels that Qantas suffered a data breach, affecting approximately six million customers. The breach was linked to a cyber attack targeting a third-party platform used by the prominent airline’s contact centre. Exposed information includes names, email addresses, phone numbers, and frequent ...
What Happens When the World’s Biggest Vulnerability Database Goes Dark?

What Happens When the World’s Biggest Vulnerability Database Goes Dark?

MITRE, the cornerstone of global vulnerability tracking, announcing it could go dark. For years, the field had relied on this single repository, the bedrock for tracking software vulnerabilities. What happens when that rug is pulled from beneath an entire industry? Tal Zarfati, Architect Lead at JFrog Security, still recalls the tremor this news sent ...
No results found.

In the News

Kinetic IT Appoints Dean Langenbach as CEO to Accelerate Sovereign Technology Leadership and Drive National Growth

Kinetic IT Appoints Dean Langenbach as CEO to Accelerate Sovereign Technology Leadership and Drive National Growth

13 March 2026 – Kinetic IT, a leading Australian-owned technology services partner, today announced Dean Langenbach as its new Chief Executive Officer to shape the company’s next phase of growth and drive technology-driven transformation. The appointment underscores Kinetic IT’s continued momentum as it strengthens its position as the trusted ...
Kyndryl Confirms Converging Quantum, Data Sovereignty and Network Demands Expose Enterprise Readiness Gap

Kyndryl Confirms Converging Quantum, Data Sovereignty and Network Demands Expose Enterprise Readiness Gap

Kyndryl Readiness Report reveals misalignment between infrastructure investment and preparedness for converging modernisation demands
Telstra Joins Forces With Major Banks to Tackle Money Laundering

Telstra Joins Forces With Major Banks to Tackle Money Laundering

Recent pilot reports potential to bring forward detection of suspected money mule activity by as much as 90 days, as cross-industry collaboration takes on growing threat.
Equinix Unveils the Distributed AI Hub to Simplify and Secure Enterprise AI Infrastructure

Equinix Unveils the Distributed AI Hub to Simplify and Secure Enterprise AI Infrastructure

Equinix has launched the Distributed AI Hub, a unified framework designed to help organisations scale AI efficiently, run workloads closer to data, and overcome the challenges of distributed intelligence.
Motorola Solutions Helps Victorian Search and Rescue Dog Teams Perform Safe and Successful Missions

Motorola Solutions Helps Victorian Search and Rescue Dog Teams Perform Safe and Successful Missions

Robust radio technology supports interagency collaboration in the state’s most rugged and remote terrain
Palo Alto Networks Unit 42 Uncovers Vulnerability in Google Chrome’s Gemini AI Panel

Palo Alto Networks Unit 42 Uncovers Vulnerability in Google Chrome’s Gemini AI Panel

Google confirmed the findings and released a fix in early January 2026
ControlPlane Launches Enterprise Support for OpenBao to Strengthen Secrets Security

ControlPlane Launches Enterprise Support for OpenBao to Strengthen Secrets Security

ControlPlane, a specialist AI Security and DevSecOps consultancy, today announced the launch of ControlPlane Enterprise for OpenBao, a new offering designed to help organisations across Asia Pacific and globally to securely adopt and operate the OpenBao secrets management platform.
KnowBe4 Research Reveals Over Half of Australians Prioritise Work Accounts Over Personal Security

KnowBe4 Research Reveals Over Half of Australians Prioritise Work Accounts Over Personal Security

New study finds 76% of Australians feel confident spotting cyber threats, but risky habits like password reuse and credential sharing remain widespread  
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This