The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Why Saying You’re Secure Means Nothing Without Proof
Cyberattacks strike without warning. Most organisations aren’t as ready as they claim and the consequences are mounting.
Peter Lee, CEO at Simspace talks through ‘readiness’ that can be declared without being tested.
“Confidence without evidence is just hope.” Said Lee.
Companies love to talk about resilience, but hope really is not a strategy. ...

World Cloud Security Day
This World Cloud Security Day, the message is clear for Australian organisations: security and resilience must be embedded as foundational elements of any AI and cloud strategy, never an afterthought.

The Hidden Risk Inside Australia’s Expanding IT Inventory
As the number of technologies and platforms balloons in organisations, so does an often-overlooked cybersecurity challenge. Like too many ingredients in a dish, organisations no longer have a clear, accurate understanding of what they are running, where it lives, and how it is secured. For organisations operating in Australia's increasingly regulated ...

Australia’s AI Shift From Capability to Control
Introduction
Conversations with CIOs across Australian industries tell a consistent story. AI has decisively moved beyond pilots and proofs of concept. The question is no longer whether AI works, but whether it delivers measurable returns while operating within clear boundaries of trust, governance, and accountability. As Australian enterprises look ...

Resilience at Scale: How Modern Organisations Stay Fast Without Increasing Risk
Australian organisations are not taking resilience seriously enough. According to BDO’s Tectonic States report, only 62 per cent of Australian business leaders ranked resilience as their top organisational priority, this is compared to 78 per cent of leaders in other countries, including the UK and Spain. This signals an opportunity for Australian ...

Taming the Gallop on Rising Cybersecurity Risk
Introduction
As the Lunar New Year ushers in a new cycle of The Horse, we can look to the traits of the traditional Chinese zodiac, which provide an admirable framework for cybersecurity objectives.
Horses are commonly known for unbridled speed, agility, and making forward strides. These aren't just symbolic of cyber resilience: they are the new ...

‘Year of the Agent’ Is Heating Up
Australia’s top cybersecurity leaders are stepping into what some are calling the next “wild west” of technology. Agentic AI - where speed is everything and the rules are still being written in real time.
While Europe tightens the bolts with strict AI laws and the United States leans on broader frameworks, Australia is carving out its own path, one of ...

Executive Search Disruptors, Hit One Year Milestone as North Star Partners Gains Traction
One year in - Josh Hill and Luca Marzorati’s Quiet Build at North Star Partners is Turning Heads
In an industry we know for churn, ego and constant movement, most firms spend their first year trying to prove they belong.
Recently, the pair hit one year since the launch of North Star Partners, the executive search firm which was founded in 2024 to ...
No results found.
In the News
Semperis Expands Purple Knight to Strengthen Identity Security in Line With Five Eyes Guidance
SYDNEY, Australia- 24 April 2026 – Semperis, the identity-driven cyber resilience and crisis response company, today announced expanded capabilities for Purple Knight, its free, community-driven Active Directory and Entra ID security assessment tool helping organisations strengthen identity security in line with guidance from the Five Eyes Alliance, of ...
Saviynt Appoints Tim Wedande as Field CTO for Asia Pacific and Japan
APJ appointment strengthens regional customer engagement and technical strategy leadership.
CrowdStrike Launches Project QuiltWorks, Uniting the Cybersecurity Industry as Frontier AI Models Accelerate Risk
Powered by frontier models from OpenAI and Anthropic, CrowdStrike’s coalition includes Accenture, EY, IBM Cybersecurity Services, Kroll, and OpenAI to close the AI vulnerability gap for every enterprise
Elastic Collaborates With Google Cloud to Bring Its Embedded Security Layer to Google Distributed Cloud Air-Gapped Environments
Google Distributed Cloud is embedding Elastic’s agentic security operations platform, providing security analytics, automation, and XDR capabilities to help customers secure sensitive data in air-gapped environments
EXL Announces a Strategic Services Collaboration With Google Cloud
EXL’s relationship with Google Cloud underscores EXL’s strength as a differentiated outcome-led AI and cloud transformation partner
CrowdStrike Extends Its Real-Time Cloud Detection and Response to Google Cloud
CrowdStrike expands cloud runtime security leadership, giving defenders the speed and precision to stop cloud breaches in seconds across hybrid and multi-cloud environments
Oracle Expands Powerful AI Capabilities in Oracle AI Database@Google Cloud to Supercharge Enterprise Data Innovation
Secure, natural language access to Oracle data through Gemini Enterprise speeds insights without writing SQL
Rubrik Secures and Accelerates AI Agents on Google Cloud
New Rubrik Agent Cloud Integration with Gemini Enterprise Agent Platform provides a unified control layer for AI agent operations
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
