The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why Does Recovery Take so Long? But IT Doesn’t Have To

Why Does Recovery Take so Long? But IT Doesn’t Have To

Recently, Commvault released the State of Data Readiness Report, which surveyed more than 400 leaders from across Australia and New Zealand. Executives believe their companies must recover within 24-48 hours. IT and security teams estimate five to seven days if they are to be realistic. The actual global average is about 24 days offline. I sat down ...
NBN or Mobile broadband? How to Choose the Right Business Internet Setup

NBN or Mobile broadband? How to Choose the Right Business Internet Setup

Introduction Setting up internet for your business is not a one size fits all exercise. Whether you're running a solo consultancy, managing a busy retail outlet, or coordinating a remote team, choosing between NBN and mobile broadband can significantly impact your daily operations. With digital connectivity now critical for everything from cloud ...
Alleged Russian Hackers Target Norwegian DAM

Alleged Russian Hackers Target Norwegian DAM

Why this cyber attack on a Norwegian dam should have you paying attention
How Consumer Data Rights Are Changing the Way Australian Businesses Operate

How Consumer Data Rights Are Changing the Way Australian Businesses Operate

Introduction Consumer data rights reforms in Australia are reshaping how enterprises handle personal information by introducing operational, legal, and technical responsibilities that apply across every part of the business. That includes how data is collected, how it is stored, and how it moves between internal teams and external systems. John ...
The Rising Role of Citizen Automators in Business Innovation

The Rising Role of Citizen Automators in Business Innovation

Australia is facing a deepening shortage of technology skills in the coming years, putting pressure on businesses that need developers and other ICT professionals to innovate successfully. But new tools are enabling the rise of citizen developers to fill these tech gaps, here’s how.
Identity: The New Currency in Cybersecurity

Identity: The New Currency in Cybersecurity

Digital identity is now cybercriminals' top target. With data breaches up 78% globally, businesses must invest in Identity & Access Management to protect employees and customers—it's both a security imperative and ethical obligation.
Qantas Breached and Customers Are Fuming

Qantas Breached and Customers Are Fuming

Earlier today it was announced across mainstream media channels that Qantas suffered a data breach, affecting approximately six million customers. The breach was linked to a cyber attack targeting a third-party platform used by the prominent airline’s contact centre. Exposed information includes names, email addresses, phone numbers, and frequent ...
What Happens When the World’s Biggest Vulnerability Database Goes Dark?

What Happens When the World’s Biggest Vulnerability Database Goes Dark?

MITRE, the cornerstone of global vulnerability tracking, announcing it could go dark. For years, the field had relied on this single repository, the bedrock for tracking software vulnerabilities. What happens when that rug is pulled from beneath an entire industry? Tal Zarfati, Architect Lead at JFrog Security, still recalls the tremor this news sent ...
No results found.

In the News

NinjaOne Revolutionises Vulnerability Management With AI-driven Assessment to Reduce Risk Faster

NinjaOne Revolutionises Vulnerability Management With AI-driven Assessment to Reduce Risk Faster

NinjaOne has announced its new solution NinjaOne Vulnerability Management, which helps IT teams identify, prioritise, and remediate vulnerabilities faster, without relying on periodic scans from security teams that often lack context and connection to remediation workflows. Built natively into the NinjaOne platform, the new solution brings together ...
Cisco Secure AI Factory With NVIDIA Makes AI Easier to Deploy and Secure, Anywhere Organizations Need IT

Cisco Secure AI Factory With NVIDIA Makes AI Easier to Deploy and Secure, Anywhere Organizations Need IT

Expanded architecture lets businesses run AI at scale, from central data centers to the factory floor, without sacrificing performance or security
TrendAI Delivers Security-by-design for AI Factories Powered by NVIDIA

TrendAI Delivers Security-by-design for AI Factories Powered by NVIDIA

SYDNEY, Australia – 17 March 2026 – TrendAI™, the enterprise AI security leader from Trend Micro Incorporated (TYO: 4704; TSE: 4704), today announced a new integration with the NVIDIA DSX Air Platform, which will empower customers to design, test, and prove AI factory security before deployment, rather than after. To learn more about the TrendAI and ...
Logicalis Australia Bolsters Erica Smith’s Remit to Head of Marketing and Vendor Alliances

Logicalis Australia Bolsters Erica Smith’s Remit to Head of Marketing and Vendor Alliances

MELBOURNE, AUSTRALIA, MARCH 16, 2026:  Logicalis Australia, a leading global technology service provider, has expanded Erica Smith's remit to Head of Marketing and Vendor Alliances. The new role unifies brand strategy, demand generation, and partner engagement to turbocharge growth and channel alliances across Logicalis Australia.  Erica’s expanded ...
F5 Advances Enterprise Application Security for the AI and Post-quantum Era

F5 Advances Enterprise Application Security for the AI and Post-quantum Era

New security innovations in the F5 Application Delivery and Security Platform unify AI-driven protection, zero trust access, and post-quantum readiness across hybrid multicloud environments
LastPass Launches Secure Access Essentials to Tackle SaaS and AI Access Risks

LastPass Launches Secure Access Essentials to Tackle SaaS and AI Access Risks

LastPass has unveiled a new security approach designed to help organisations manage access across a growing ecosystem of SaaS applications, AI tools and browser-based workflows. The company announced Secure Access Essentials, which combines application discovery, access controls and secure authentication capabilities into a single solution delivered ...
Kinetic IT Appoints Dean Langenbach as CEO to Accelerate Sovereign Technology Leadership and Drive National Growth

Kinetic IT Appoints Dean Langenbach as CEO to Accelerate Sovereign Technology Leadership and Drive National Growth

13 March 2026 – Kinetic IT, a leading Australian-owned technology services partner, today announced Dean Langenbach as its new Chief Executive Officer to shape the company’s next phase of growth and drive technology-driven transformation. The appointment underscores Kinetic IT’s continued momentum as it strengthens its position as the trusted ...
Kyndryl Confirms Converging Quantum, Data Sovereignty and Network Demands Expose Enterprise Readiness Gap

Kyndryl Confirms Converging Quantum, Data Sovereignty and Network Demands Expose Enterprise Readiness Gap

Kyndryl Readiness Report reveals misalignment between infrastructure investment and preparedness for converging modernisation demands
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This