The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets

Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets

Computer Emergency Response Teams (CERTs) are the unsung heroes of cybersecurity. There are many myths about their role and function. Contrary to popular belief they don’t certify cybersecurity professionals, and many don’t do emergency response.  Operating in the background, CERTs provide vital functions in anticipating and reducing the impact of ...
Don’t Let Generative AI and LLMs Become a Third-Party Vulnerability

Don’t Let Generative AI and LLMs Become a Third-Party Vulnerability

As Large language models (LLMs) are increasingly being embedded into software development, organisations must ensure they understand the cyber security risks that come with it. Developer tools that have generative AI capability integrated to assist developers when writing code are on the rise. But the LLMs they rely on could be altered by threat actors.  
Creating Infrastructure Foundations for a Scalable Future

Creating Infrastructure Foundations for a Scalable Future

Meeting the complex demands of the future - including GenAI and ML - starts with getting ‘Network As a Service’ (NaaS) fundamentals right - right now.
The Cybersecurity Paradox: Mastering a Game That Has Already Changed

The Cybersecurity Paradox: Mastering a Game That Has Already Changed

For decades, enterprises have invested billions into mastering the art of cybersecurity firewalls, antivirus programs, perimeter defenses, and compliance checklists. Many have grown adept, even excellent, at these measures. However, excellence is a moving target in a world of relentless digital transformation. What if the tools we have perfected are no ...
How Unchecked Third-Party Access Is Undermining Supply Chains

How Unchecked Third-Party Access Is Undermining Supply Chains

As supply chains continue to evolve, so too must the frameworks that secure them. In an era where every digital interaction carries risk, identity is not just a technical concern: it’s the foundation of trust in the modern enterprise.
Why Securing Digital Identities Is Now a Business-Wide Imperative

Why Securing Digital Identities Is Now a Business-Wide Imperative

In the face of rising cyber risks, businesses that embed identity security into the fabric of their cybersecurity strategy will be better positioned to defend against attacks, protect data, and ensure operational resilience.
The Top Cyber Movies That Shaped Our View for Better or for Worse?

The Top Cyber Movies That Shaped Our View for Better or for Worse?

From flickering CRT monitors to sophisticated cyber heists, the proliferation of cyber films that mirrors our growing anxiety and fascination with life online. Hollywood has long toyed with the tension between human curiosity and digital dystopia. While some cyber films exaggerate for dramatic flair, others eerily foreshadow real world breaches, hacks, ...
7 Reasons Certifications Are Critical to Secure Communications

7 Reasons Certifications Are Critical to Secure Communications

Picture this scenario. You’re a government leader or a critical infrastructure operator. Suddenly, your communication systems go dark. The network has been breached, and sensitive information is exposed. Foreign adversaries are listening, decisions are delayed, and operations are paralyzed. Worse yet, you have no way of getting in touch with your ...
No results found.

In the News

Sharon AI & Cisco Launch Australia’s First Cisco Secure AI Factory With NVIDIA

Sharon AI & Cisco Launch Australia’s First Cisco Secure AI Factory With NVIDIA

Cisco and Sharon AI launch Australia’s first Cisco Secure AI Factory with NVIDIA, providing secure, high-performance AI infrastructure with all data processing remaining in the country | Powered by 1024 NVIDIA Blackwell Ultra GPUs, Cisco’s UCS servers and Nexus Hyperfabric technology, it supports Australia’s National AI Plan and accelerates enterprise ...
Akamai Secures Critical Infrastructure With Agentless Zero Trust Segmentation Powered by NVIDIA

Akamai Secures Critical Infrastructure With Agentless Zero Trust Segmentation Powered by NVIDIA

Akamai Guardicore Segmentation and NVIDIA BlueField integration ends the long-standing trade-off between advanced security and system performance for energy, manufacturing, and transportation sectors
Tenable Research Reveals Growing AI Exposure Gap Fuelled by Supply Chain Risks and Lack of Identity Controls

Tenable Research Reveals Growing AI Exposure Gap Fuelled by Supply Chain Risks and Lack of Identity Controls

Tenable report finds 86% of organisations have installed third-party code packages with critical-severity vulnerabilities; 65% expose high-value assets through forgotten cloud credentials
KBI.Media Engaged to Deliver Executive Interview Coverage at Atmos SPHERE 2026

KBI.Media Engaged to Deliver Executive Interview Coverage at Atmos SPHERE 2026

Sydney, Australia Feb 23rd - KBI.Media has been engaged to provide on-site podcast interview coverage for Atmos SPHERE 2026. SPHERE 2026, hosted by Atmos, Australia and New Zealand’s leading legal and advisory firm, is the flagship cyber security forum being held on Thursday the 5th of March 2026, in Sydney, Australia. The event brings together senior ...
Nozomi Networks Labs Report Finds Healthcare Services the Most Targeted Industry in Australia

Nozomi Networks Labs Report Finds Healthcare Services the Most Targeted Industry in Australia

The latest Nozomi Networks Labs OT & IoT Security Report released today finds healthcare services was the most targeted industry in Australia, followed by manufacturing. During the second half of last year, threat actors increased their usage of generative AI in their activity, attacks against companies in English-speaking countries are increasing ...
DataDog Announces DASH 2026 AI and Observability Conference

DataDog Announces DASH 2026 AI and Observability Conference

Datadog has announced that registration is open for DASH, the company’s ninth annual global conference. DASH brings together builders, engineers, security leaders, and technology decision-makers to explore how observability and security are evolving in an era of increasingly complex, AI-driven systems. The event will take place June 9–10, 2026, at the ...
CrowdStrike and Qualtrics Extend Security for Customer and Employee Experience Programs With New Integration

CrowdStrike and Qualtrics Extend Security for Customer and Employee Experience Programs With New Integration

CrowdStrike and Qualtrics have announced a new integration that brings enterprise-grade SaaS security directly into customer and employee experience programs.
Barracuda Found That 90% of Ransomware Incidents Exploit Firewalls

Barracuda Found That 90% of Ransomware Incidents Exploit Firewalls

90% of Ransomware Incidents Exploit Firewalls | New Barracuda Report Shows How Attackers Target Organisations and The Security Gaps Increasing Risk
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This