The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Taming the Gallop on Rising Cybersecurity Risk

Taming the Gallop on Rising Cybersecurity Risk

Introduction As the Lunar New Year ushers in a new cycle of The Horse, we can look to the traits of the traditional Chinese zodiac, which provide an admirable framework for cybersecurity objectives. Horses are commonly known for unbridled speed, agility, and making forward strides. These aren't just symbolic of cyber resilience: they are the new ...
‘Year of the Agent’ Is Heating Up

‘Year of the Agent’ Is Heating Up

Australia’s top cybersecurity leaders are stepping into what some are calling the next “wild west” of technology. Agentic AI - where speed is everything and the rules are still being written in real time. While Europe tightens the bolts with strict AI laws and the United States leans on broader frameworks, Australia is carving out its own path, one of ...
Executive Search Disruptors, Hit One Year Milestone as North Star Partners Gains Traction

Executive Search Disruptors, Hit One Year Milestone as North Star Partners Gains Traction

​One year in - Josh Hill and Luca Marzorati’s Quiet Build at North Star Partners is Turning Heads In an industry we know for churn, ego and constant movement, most firms spend their first year trying to prove they belong. Recently, the pair hit one year since the launch of North Star Partners, the executive search firm which was founded in 2024 to ...
Florida’s Cyber Boom. Sunshine State Emerges as Unlikely Powerhouse in America

Florida’s Cyber Boom. Sunshine State Emerges as Unlikely Powerhouse in America

​Move over Silicon Valley, a new contender is stepping into the cybersecurity spotlight and it’s not where most people expected. Florida, long dismissed as a playground for tourists and retirees, is quickly transforming into a serious force in the tech and cyber arena, turning up the heat on Silicon Valley’s traditional turf. ​When people think of ...
Communication as Infrastructure – Why Dialogue Is a Business Advantage

Communication as Infrastructure – Why Dialogue Is a Business Advantage

Why global tech fails in APJ and how treating communication as infrastructure unlocks adoption and scale.
Australia Moves to Honour Its Secret Holders. Starting With a Crowdfunding Campaign

Australia Moves to Honour Its Secret Holders. Starting With a Crowdfunding Campaign

Australia’s intelligence community has long operated in the shadows, but now, a bold push is underway to bring those stories into the light. But instead of a government backed rollout, it’s starting with a GoFundMe page ahead of its major raise. Australia, unlike allies such as the United States and the United Kingdom, ...
Three Critical Actions for Achieving an Optimal SAP Cybersecurity Budget

Three Critical Actions for Achieving an Optimal SAP Cybersecurity Budget

Any enterprise is subject to cyberattacks. The details about incidents concerning critical enterprise applications like SAP S/4HANA are often internal, and hence, public awareness is not up to the mark of malware and phishing. As the attacks become more sophisticated, it is important to understand what your optimal budget should be to protect ...
From 398 to 200 Days: Understanding the TLS Certificate Lifespan Reduction

From 398 to 200 Days: Understanding the TLS Certificate Lifespan Reduction

Digital trust is entering a new phase, and on March 15, 2026, a policy change will take effect that reshapes how organisations approach security. In 2025, the CA/Browser Forum, a consortium of browser vendors and certificate authorities, approved revisions to public TLS standards, introducing a phased reduction in certificate lifespans to better ...
No results found.

In the News

ESET Launches eCrime Reports to Give Security Teams a Strategic Edge Against Modern Cybercriminal Groups

ESET Launches eCrime Reports to Give Security Teams a Strategic Edge Against Modern Cybercriminal Groups

ESET’s standalone eCrime reports provide security teams with curated, high‑quality insights into incidents, including key lessons, IoCs, hunting rules, and guidance to strengthen resilience | ESET Threat Intelligence eCrime Reports deliver a clear, operational view into real-world intrusions and uncover hidden clusters of activity, including TTPs and ...
Cloudflare Partners with Wiz to Secure the Global AI Attack Surface, Eliminating Blind Spots Caused by Shadow AI

Cloudflare Partners with Wiz to Secure the Global AI Attack Surface, Eliminating Blind Spots Caused by Shadow AI

New integration gives organisations a clear path from identifying AI risks to stopping attacks in real-time 
Tenable Expands Exposure Management with Instant OT Discovery to Secure Cyber-Physical Systems

Tenable Expands Exposure Management with Instant OT Discovery to Secure Cyber-Physical Systems

New asset discovery engine significantly accelerates AI-powered exposure management maturity
AI Emerges as the Key to Scaling MSP Operations as Growth Gets Harder

AI Emerges as the Key to Scaling MSP Operations as Growth Gets Harder

Kaseya’s 2026 State of the MSP Report finds 48% of MSPs rank AI as the number one client need, while shrinking deals and a widening talent gap make AI-driven efficiency essential to protecting margins.
Claroty Bridges Gap Between Asset Visibility and Actionable Risk Reduction with Industry-First Visibility Orchestration Capabilities

Claroty Bridges Gap Between Asset Visibility and Actionable Risk Reduction with Industry-First Visibility Orchestration Capabilities

Claroty xDome’s New Visibility Orchestration Transforms Incomplete Asset Data into Prioritised Security Actions for Complex Cyber-Physical Systems Environments
WatchGuard and Halo Announce Partnership to Deliver MSP Automation from Alert to Invoice

WatchGuard and Halo Announce Partnership to Deliver MSP Automation from Alert to Invoice

Integration embeds WatchGuard security operations inside HaloPSA, streamlining ticketing, provisioning, and billing workflows for MSPs 
Kyndryl Introduces Sovereignty Readiness Assessment and Solutioning to Support Business Continuity

Kyndryl Introduces Sovereignty Readiness Assessment and Solutioning to Support Business Continuity

New sovereignty services help organisations identify dependencies, risks and options to support continuity across complex IT environments
Commvault Targets AI Risk With New Platform Capabilities for Governance, Recovery and Control

Commvault Targets AI Risk With New Platform Capabilities for Governance, Recovery and Control

Commvault has launched a new set of AI-driven capabilities aimed at helping organisations adopt agentic AI while maintaining control over data, governance, and cyber resilience. Delivered through Commvault Cloud, the new offerings—Data Activate, AI Protect, and AI Studio—are designed to address one of the biggest challenges facing enterprises today: ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This