The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why Hack In When You Can Log In

Why Hack In When You Can Log In

The identity security game has changed, and we’ve made it easier for attackers to win. Not because they’re smarter or more sophisticated (though many are), but because we’ve handed them the keys. Through unchecked identity sprawl, we’ve given cybercriminals a golden ticket to infiltrate what is arguably an organisation’s most valuable asset: its ...
Is Platformisation the New Rage?

Is Platformisation the New Rage?

We’ve seen trends come and go. But is platformisation here to stay? Venkat Balakrishnan, Chief Information Security Officer at TAL shares his opinion on why this is the best approach forward. The industry is witnessing a forward shift towards ‘platformisation’ - a newish trend that consolidates multiple cyber functions into a single integrated ...
No Breach Doesn’t Mean No Risk: Rethinking Cybersecurity Metrics in the Boardroom

No Breach Doesn’t Mean No Risk: Rethinking Cybersecurity Metrics in the Boardroom

“Measuring peace by the absence of war is a flawed benchmark, so is judging cybersecurity solely by a lack of incidents.” In boardrooms across industries, directors increasingly grapple with one of the most misunderstood performance indicators in modern governance: cybersecurity effectiveness. At first glance, it’s tempting to celebrate a spotless ...
Enhancing Software Development the EveryOps Way

Enhancing Software Development the EveryOps Way

Software has become the undisputed driver of business today. As the reliance on software has grown, so have the moving parts needed to make it, especially amid the rise of generative artificial intelligence (GenAI). As a result, software development has become a complex process, potentially hampering innovation.  According to Deloitte, GenAI usage ...
Why Agentic Automation Is the Next Evolution in Advanced Manufacturing

Why Agentic Automation Is the Next Evolution in Advanced Manufacturing

Policy efforts like Future Made in Australia emphasise a renewed national commitment to rebuilding sovereign capability and invigorating advanced manufacturing. One of the most promising developments enabling this shift is agentic automation – a new frontier in intelligent enterprise automation that is already beginning to reshape how leading ...
The Blur Between Cloud, OT, and Critical Infrastructure

The Blur Between Cloud, OT, and Critical Infrastructure

Cordant’s DevSecOops podcast brings together trio Tom, Scott, and James for what turned into a timely, thoughtful discussion about the intersections of cloud technology, operational technology (OT), and critical infrastructure. With recent news out of the US and Australia about the US regulatory crackdown on Chinese smart vehicle tech due to ...
Shaping The Future Of AI: How Australia’s National AI Capability Plan Sets The Stage For Ethical And Secure AI Adoption

Shaping The Future Of AI: How Australia’s National AI Capability Plan Sets The Stage For Ethical And Secure AI Adoption

As artificial intelligence (AI) continues to revolutionise industries worldwide, its rapid advancement brings both vast opportunities and significant responsibilities. AI has the potential to transform sectors like healthcare, finance, manufacturing, and education, driving innovation and efficiency in unprecedented ways. However, as AI becomes embedded ...
How a Veteran Project Manager Tames Cyber Chaos

How a Veteran Project Manager Tames Cyber Chaos

Recently, on DevSecOops podcast; Hosts Tom Walker, James Vincent, and Scott Fletcher bring on a special guest, Natalie Haslam, an industry veteran with 25 years of project management experience within traditional IT, application development, and more recently, cybersecurity. Natalie’s reflection on the challenges of delivering cyber projects in the ...
No results found.

In The News

Tecala Strengthens Cyber Security Leadership with Microsoft Solutions Partner Designation for Security and Expanded ISO 27001:2022 Certification

Tecala Strengthens Cyber Security Leadership with Microsoft Solutions Partner Designation for Security and Expanded ISO 27001:2022 Certification

Sydney, 27 January 2026 - Leading technology service provider, Tecala, today announced that the company has achieved two significant security milestones that reinforce its position as one of Australia’s most trusted technology partners. The company has been awarded the Microsoft Solutions Partner Designation for Security and successfully completed ...
Genetec Outlines Data Privacy Best Practices For Physical Security Teams Ahead Of Data Protection Day

Genetec Outlines Data Privacy Best Practices For Physical Security Teams Ahead Of Data Protection Day

Recommendations help organisations safeguard sensitive data while maintaining effective security operations
New Elastic Tools Aim to Fix Why Security Agents Fail When Data is Scattered Across Dozens of Systems

New Elastic Tools Aim to Fix Why Security Agents Fail When Data is Scattered Across Dozens of Systems

New Elastic tools aim to fix why security agents fail when data is scattered across dozens of systems
CrowdStrike Achieves ISO 42001 Certification for Responsible AI-Powered Cybersecurity

CrowdStrike Achieves ISO 42001 Certification for Responsible AI-Powered Cybersecurity

Certification accelerates leadership in trusted AI governance, enabling organizations to outpace AI-accelerated threats with speed and control
Rapid7 MDR Integrates Microsoft Defender Signals to Create Tangible Security Outcomes

Rapid7 MDR Integrates Microsoft Defender Signals to Create Tangible Security Outcomes

Rapid7 announces the availability of Rapid7 MDR for Microsoft – a pre-emptive threat detection, investigation, and response service that brings together Rapid7’s global SOC, our market-leading SIEM technology, and deeper bi-directional Microsoft Defender integrations.
Check Point Introduces AI-Driven Exposure Management to Close the Cyber Security Remediation Gap

Check Point Introduces AI-Driven Exposure Management to Close the Cyber Security Remediation Gap

Designed for AI-era attacks, Exposure Management helps organisations reduce risk faster using existing security controls 
Black Kite’s 2026 Wholesale & Retail Report Reveals Over 70% of Major Retailers, Nearly 60% of Wholesalers, and 52% of the Supply Chain Have Exposed Credentials

Black Kite’s 2026 Wholesale & Retail Report Reveals Over 70% of Major Retailers, Nearly 60% of Wholesalers, and 52% of the Supply Chain Have Exposed Credentials

Report finds the sectors’ shared supply chain is the greatest risk, as attackers view wholesale and retail as an interconnected target landscape
Hiring Season Is Scam Season: How Fake Recruiters Exploit Job Seekers with Trusted Brand Names

Hiring Season Is Scam Season: How Fake Recruiters Exploit Job Seekers with Trusted Brand Names

According to Bitdefender’s Antispam Lab latest data, a wave of fake recruitment emails is actively circulating, timed to coincide with the early-year hiring surge. These scams impersonate well-known employers and staffing companies, promising easy jobs, fast interviews, and flexible work. ‘Your interview is confirmed’ These scams open with good ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This