The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

What Happens When the World’s Biggest Vulnerability Database Goes Dark?
MITRE, the cornerstone of global vulnerability tracking, announcing it could go dark. For years, the field had relied on this single repository, the bedrock for tracking software vulnerabilities. What happens when that rug is pulled from beneath an entire industry? Tal Zarfati, Architect Lead at JFrog Security, still recalls the tremor this news sent ...
Minimising Third-party Risk
Minimise third-party risk with smart vendor management. Learn how to protect data, ensure compliance, and streamline reviews with automation.

The Blind Spot in Your Cyber Strategy
Recently on the DevSecOops podcast, Hosts Tom Walker, James Vincent, and Scott Fletcher unpacked the modern threats in the cybersecurity space. With years of experience in IT and cybersecurity, the hosts shared real world experiences, from everyday technical mishaps to nation sponsored cyberattacks, offering practical advice for staying secure amid ...

How Wiz Is Rewriting the Cloud Security Story
In Episode 7 of the DevSecOops podcast, hosts Tom Walker, Scott Fletcher, and James Vincent sat down with Matt Preswick, Principal Solutions Engineer at Wiz APJ, to unpack how Wiz has become an emerging favourite of both engineering teams and the executive suite. Beyond that, they also discussed the broader issue of the everyday realities of cloud ...

What Australian Businesses Need to Do to Bolster Their Cyber Defences During the EOFY
Introduction
With the end of the financial year (EOFY) fast approaching, it’s more important now than ever for businesses to be even more vigilant and take stock of their online security. Tax season is a time of increased cyber threats and is ripe for cybercriminals and scammers to strike.
Ways AI Is Being Utilised In EOFY Scams
While the ...

WTF Is Happening in Tech?
In the latest episode of the DevSecOops podcast, hosts Tom Walker and Scott Fletcher discussed three of the most talked about topics in enterprise IT including Kubernetes, the March 2025 Oracle Cloud security breach, and how AI is reshaping both productivity and cybersecurity.
Kubernetes - Necessary Evolution or Needless Complexity?
Tom did not ...

Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets
Computer Emergency Response Teams (CERTs) are the unsung heroes of cybersecurity. There are many myths about their role and function. Contrary to popular belief they don’t certify cybersecurity professionals, and many don’t do emergency response. Operating in the background, CERTs provide vital functions in anticipating and reducing the impact of ...

Don’t Let Generative AI and LLMs Become a Third-Party Vulnerability
As Large language models (LLMs) are increasingly being embedded into software development, organisations must ensure they understand the cyber security risks that come with it. Developer tools that have generative AI capability integrated to assist developers when writing code are on the rise. But the LLMs they rely on could be altered by threat actors.
No results found.
In the News
Saviynt Bolsters Its AI-Powered Identity Security Through Integrations With Amazon Quick
New Amazon Q integrations deliver deeper context and agentic AI workflows for identity teams
Sydney – February 27, 2026 – Saviynt, a leading provider of AI-powered identity security solutions, has announced a new agentic AI-based conversational capability built on Amazon Quick and the general availability of its Amazon Quick Index ...
ManageEngine Introduces Causal Intelligence and Autonomous AI to IT Operations for Faster Incident Response
New Site24x7 Capabilities Combine Domain-Aware Correlations, autonomous AI, And Workflow Orchestration To Drive Self-Healing IT Operations
Delivers faster root-cause identification with causal intelligence–driven correlation
Improves incident response efficiency using AI
Enables controlled remediation at scale through governed workflow ...
Darktrace Annual Threat Report Finds Identity Is Now Primary Target as Global Vulnerabilities Rise 20%
• Only 42% of APJ organisations have a formal policy for safe AI use • Registered software vulnerabilities rose 20% in 2025, even as attackers increasingly shifted toward credential abuse over traditional exploitation • 32 million phishing emails detected globally with a 28% increase in QR code-based attacks as email attacks continue to grow in ...
Oracle Red Bull Racing Extends Title Partnership With Oracle in Multi-Year Deal to Power a New Era of Data-Driven Performance
The most integrated F1 team technology partnership accelerates innovation, with Red Bull Ford Powertrains’ power unit developed on Oracle Cloud Infrastructure and a ground-breaking AI-powered strategy agent launching trackside this season
AI-First Businesses Are Paying an “AI Speed Tax” When Recovering From Cybersecurity Incidents, According to Fastly’s Global Security Research Report
Fast moving AI adopters are paying the price with 100 day longer recovery times, higher breach costs and expanding attack surfaces
SYDNEY/AUCKLAND – 26 February, 2026 – Fastly, Inc. (NASDAQ: FSLY), a leader in global edge cloud platforms, today published the Australian and New Zealand findings from its fourth annual Global Security Research Report. ...
xReality Group Limited (ASX: XRG) Interim Financial Report for the Half Year Ended 31 December 2025
XRG delivered its strongest half-year performance to date, with total revenue exceeding $10.4 million, representing 41% growth on the prior corresponding period, and EBITDA of $2.6 million, up 190%. This performance was driven by strong momentum in Operator XR, which continues to scale as the Group’s primary growth engine.
Operations Summary:
...
VAST Data Unveils a Platform for Secure, Trusted, and Self-Learning Agentic AI Systems
VAST Data has announced the VAST Data PolicyEngine and VAST Data TuningEngine, two new computing services that will allow the next generation of the VAST AI Operating System to deliver key requirements for organisations looking to scale their mission-critical AI initiatives.
Specifically, PolicyEngine and TuningEngine work in tandem within the VAST ...
DroneShield Secures $21.7M Western Military Contracts
DroneShield Limited (ASX:DRO) has announced that it has received a package of six standalone contracts for $21.7 million from an in-country reseller for delivery to a western military end-customer.
The contracts are for the supply of dismounted counter-drone systems, spare kits, and software subscriptions. All items ae readily available from ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
