The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

What Australian Businesses Need to Do to Bolster Their Cyber Defences During the EOFY

What Australian Businesses Need to Do to Bolster Their Cyber Defences During the EOFY

Introduction With the end of the financial year (EOFY) fast approaching, it’s more important now than ever for businesses to be even more vigilant and take stock of their online security. Tax season is a time of increased cyber threats and is ripe for cybercriminals and scammers to strike. Ways AI Is Being Utilised In EOFY Scams While the ...
WTF Is Happening in Tech?

WTF Is Happening in Tech?

In the latest episode of the DevSecOops podcast, hosts Tom Walker and Scott Fletcher discussed three of the most talked about topics in enterprise IT including Kubernetes, the March 2025 Oracle Cloud security breach, and how AI is reshaping both productivity and cybersecurity. Kubernetes - Necessary Evolution or Needless Complexity? Tom did not ...
Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets

Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets

Computer Emergency Response Teams (CERTs) are the unsung heroes of cybersecurity. There are many myths about their role and function. Contrary to popular belief they don’t certify cybersecurity professionals, and many don’t do emergency response.  Operating in the background, CERTs provide vital functions in anticipating and reducing the impact of ...
Don’t Let Generative AI and LLMs Become a Third-Party Vulnerability

Don’t Let Generative AI and LLMs Become a Third-Party Vulnerability

As Large language models (LLMs) are increasingly being embedded into software development, organisations must ensure they understand the cyber security risks that come with it. Developer tools that have generative AI capability integrated to assist developers when writing code are on the rise. But the LLMs they rely on could be altered by threat actors.  
Creating Infrastructure Foundations for a Scalable Future

Creating Infrastructure Foundations for a Scalable Future

Meeting the complex demands of the future - including GenAI and ML - starts with getting ‘Network As a Service’ (NaaS) fundamentals right - right now.
The Cybersecurity Paradox: Mastering a Game That Has Already Changed

The Cybersecurity Paradox: Mastering a Game That Has Already Changed

For decades, enterprises have invested billions into mastering the art of cybersecurity firewalls, antivirus programs, perimeter defenses, and compliance checklists. Many have grown adept, even excellent, at these measures. However, excellence is a moving target in a world of relentless digital transformation. What if the tools we have perfected are no ...
How Unchecked Third-Party Access Is Undermining Supply Chains

How Unchecked Third-Party Access Is Undermining Supply Chains

As supply chains continue to evolve, so too must the frameworks that secure them. In an era where every digital interaction carries risk, identity is not just a technical concern: it’s the foundation of trust in the modern enterprise.
Why Securing Digital Identities Is Now a Business-Wide Imperative

Why Securing Digital Identities Is Now a Business-Wide Imperative

In the face of rising cyber risks, businesses that embed identity security into the fabric of their cybersecurity strategy will be better positioned to defend against attacks, protect data, and ensure operational resilience.
No results found.

In the News

WatchGuard Marks 30 Years of Setting the MSP Security Standard

WatchGuard Marks 30 Years of Setting the MSP Security Standard

Cybersecurity leader has helped MSPs reduce complexity, scale protection, and profitably grow through every market shift  SYDNEY – February 25, 2026 — WatchGuard® Technologies, a global leader in unified cybersecurity for managed service providers (MSPs), celebrates 30 years this month of helping MSPs protect businesses through every era of threat ...
Firmus Technologies Group Selects VAST AI Operating System to Power Sovereign, Energy-Efficient AI Factories in Asia Pacific

Firmus Technologies Group Selects VAST AI Operating System to Power Sovereign, Energy-Efficient AI Factories in Asia Pacific

VAST Data today announced that Firmus Technologies Group, an AI infrastructure specialist founded in Australia with operations across Asia Pacific, has selected the VAST AI Operating System as a foundational data layer for its next generation of sovereign, energy-efficient AI factories.   Firmus, a NVIDIA Cloud Partner (NCP), is building ...
2026 CrowdStrike Global Threat Report: AI Accelerates Adversaries and Reshapes the Attack Surface

2026 CrowdStrike Global Threat Report: AI Accelerates Adversaries and Reshapes the Attack Surface

AI-enabled attacks surge 89% as breakout time falls to 29 minutes; AI tools and development platforms are actively exploited
Exabeam Research: AI Accountability Becomes the New Mandate as Cybersecurity Economics Shift

Exabeam Research: AI Accountability Becomes the New Mandate as Cybersecurity Economics Shift

95% of organisations are increasing cybersecurity budgets in 2026 with AI as the top spending driver despite being the hardest investment to justify BROOMFIELD, Colo. – February 24, 2026 – Exabeam, a global leader in intelligence and automation that powers security operations, today announced the findings of its new multinational report, From Adoption ...
Appointment: Zepto Creates New Chief Business Resilience Officer Role to Lead Security and Risk

Appointment: Zepto Creates New Chief Business Resilience Officer Role to Lead Security and Risk

Zepto appoints Mariana Paun as Chief Business Resilience Officer. The newly created role will unify teams to strengthen security, risk and compliance under Paun’s leadership.
Sophos Active Adversary Report Finds Identity Attacks Dominate as Threat Groups Proliferate

Sophos Active Adversary Report Finds Identity Attacks Dominate as Threat Groups Proliferate

Sophos has released the 2026 Sophos Active Adversary Report, which reveals that 67% of all incidents investigated by Sophos Incident Response (IR) and Managed Detection and Response (MDR) teams last year were rooted in identity-related attacks. The findings highlight how attackers continue to exploit compromised credentials, weak or missing multifactor ...
Armis Launches Developer Portal to Help Global Organisations Operationalise Asset Intelligence

Armis Launches Developer Portal to Help Global Organisations Operationalise Asset Intelligence

“The Armis Developer Portal provides more than just documentation; we are giving the developer and security community direct access to the world’s most robust asset intelligence. This empowers them to move beyond simple monitoring to an intelligent, proactive security posture.”
Veeam Introduces Agent Commander to Confront Agentic AI Risk at Enterprise Scale

Veeam Introduces Agent Commander to Confront Agentic AI Risk at Enterprise Scale

Veeam® Software, the Data and AI Trust Company, today announced Agent Commander, the first unified solution to help organisations safely detect AI risk, protect AI systems, and undo AI mistakes, empowering them to proactively address AI-driven risks and securely scale AI agents everywhere. The first integration from Veeam’s successful acquisition of ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This