The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Voices Under Siege: The New Frontline of Secure Communication
Cyber threats have moved to mobile communications, where identity, metadata exposure, and AI impersonation undermine trust.

Why Trust Is Reshaping Digital Assets
Introduction
For years, digital assets have been spoken about in extremes. Either as the future of finance, or as a space filled with risk and uncertainty. In my view, the truth sits somewhere in the middle.
Over the past decade, digital assets have delivered extraordinary returns. Entire fortunes were built in a relatively short period. Yet many ...

‘Everything Has Changed’ as Cyber Threats Explode Across Physical World
Introduction
The line between physical security and cybersecurity is officially done and dusted. Experts warn companies that fail to adapt are putting their entire business at risk as both of these worlds interchange.
Simon Cook, Director of New Offerings at Genetec observes the physical and security world stating “Everything has changed, right? In ...
How BlackBerry UEM Enables Trusted Mobile Operations Across the German Federal Government
Government in Constant Motion
Federal government work now extends beyond offices to secure facilities, international forums, temporary work sites and even on the daily commute. Mobility has shifted from a supporting function into a core pillar of daily operations while expectations around security, sovereignty, and regulatory compliance have ...

Is This the End of the Road for AppSec?
Maintaining a clear line of sight over the AI coding tools and model control platforms in use, alongside a realistic assessment of the security capabilities of the developers deploying them, is becoming a critical requirement for enterprises.

Your AI Is Only as Good as Your Data, According to NetApp’s President
Forget dashboards and customer insights, the game has changed. The royal flush is in the data and lots of it. Countries and corporations that can prove the integrity of their data will dominate the next stage of global trade and innovation.Recently, NetApp’s President César Cernuda walked through the AI gold rush. It’s meaningless if companies can’t ...

North Korean ‘Laptop Farm’ Scheme Nets Prison Time for US Operatives
Two US nationals have been sentenced years behind bars after federal prosecutors say they helped fuel a sophisticated North Korean scheme that infiltrated American companies, stole identities and funnelled millions to a hostile regime.
The United States Department of Justice announced that Kejia Wang, 42, and Zhenxing Wang, 39, were sentenced for ...
The Mission-Critical Standard: Why Mission-Certified Communications Are the Future of High-Stakes Operations
Mission-certified communications deliver secure, unified support in high-stakes operations.
No results found.
In the News
ESET Uncovers CallPhantom Scam on Google Play: Fake Logs for Real Money
A new Android scam, CallPhantom, falsely claims to provide access to call logs, SMS records, and WhatsApp call history for any phone number in exchange for payment. We identified and reported 28 separate CallPhantom apps on Google Play, cumulatively downloaded more than 7.3 million times. 53.7% of all CallPhantom detections worldwide were found in ...
Boomi and Couchbase Partner to Power Enterprise AI Agents with Trusted Recollection, Connectivity, and Governance
AI data activation company Boomi and operational AI data platform Couchbase, Inc. today announced a partnership through which the two companies are collaborating closely to accelerate AI pilots to production. The companies will co-engineer solutions that give customers a production-ready foundation for agentic AI, combining Boomi's connectivity, ...
EXL Unveils New Agentic AI Solutions to Accelerate Enterprise Transformation Across the Full AI Value Chain
Expanded portfolio integrates agent development, governance, decision intelligence and domain workflows to help enterprises scale AI responsibly and deliver measurable business outcomes
Semperis Publishes Study on AI’s Effect on the Attack Surface of Identity Systems
Study reveals Australian organisations are granting AI agents access to essential systems faster than safety measures are implemented. Without comprehensive security for identity systems, hackers can speed attempts to compromise Active Directory, EntraID or Okta
Palo Alto Networks Introduces Idira: The Next-Generation Identity Security Platform Built for the AI Enterprise
Delivers modern privileged access management by democratising security controls for every human, machine and agentic identity
Veeam Previews New Release of Veeam Data Platform at VeeamON New York City, Further Advancing Unified Data Trust
Veeam Data Platform v13.1 advances secure-by-design data resilience with more than 70 new features and enhancements, and extends management with a new DataAI Resilience Module in the Veeam DataAI Command Platform
80% of Australian Organisations Suffered at Least One Identity Breach in the Past Year, Sophos Research Finds
Today, Sophos released the State of Identity Security 2026, a vendor-agnostic survey of 5,000 IT and cybersecurity leaders across 17 countries, including 300 in Australia. The survey found that 80% of Australian organisations surveyed suffered at least one identity-related breach in the past year, and on average organisations reported three separate ...
Infosys Launches Dedicated Global Security Operations Center in Australia; Expands Cybersecurity Capabilities Across ANZ
Infosys has launched its first dedicated Global Security Operations Center (GSOC) in Australia, at its North Sydney office. The GSOC will bring together specialist security talent, established operations capabilities, and proven delivery processes under Infosys’ global security framework. Following Infosys’ acquisition of The Missing Link, a leading ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
- 353
- 354
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
