The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Caught in the Middle – How Diverse Cyber Laws Affect Global Organisations

Caught in the Middle – How Diverse Cyber Laws Affect Global Organisations

Regulatory fragmentation has become one of the most pressing yet overlooked concerns for global organisations, particularly as governments introduce differing cybersecurity laws. The issue lies not in the creation per se, but in the fact that these rules and regulations are developed in silos. Every country has its own perspective, shaped by the ...
Overcoming the Security Risks of Using AI In Software Development

Overcoming the Security Risks of Using AI In Software Development

Development teams face relentless pressure to deliver, yet they must continue to prioritise building secure, high-quality software. Leaders play a crucial role in reinforcing how a Secure by Design approach, supported by observability, benchmarking, and ongoing education, directly enhances code quality. By embedding these practices, organisations can ...
Speed, Identity, and AI: Redefining Cybersecurity for Australian Organisations

Speed, Identity, and AI: Redefining Cybersecurity for Australian Organisations

Speed, Identity, and AI: Redefining Cybersecurity for Australian Organisations Cybersecurity teams have always grappled with emerging technologies, increasingly sophisticated attacks and new regulations. However, as organisations accelerate AI and cloud adoption, digitise services, and adapt to evolving compliance regulations, security challenges ...
How to Invest in AI to Overcome the Challenges of Identity-based Security

How to Invest in AI to Overcome the Challenges of Identity-based Security

AI is reshaping what’s possible when it comes to protecting organisations against identity-based attacks. By offering prescriptive recommendations on how to harden identity security, together with advanced detection of evolving threats, organisations can improve their ability to operate now and into the future.
How One Vendor Breach Becomes a Global Risk

How One Vendor Breach Becomes a Global Risk

Today, businesses run on an invisible thread: supply chain. It links industries and consumers through numerous pathways, whether physical or digital. From ports to airlines to healthcare and finances, organisations rely on these networks to operate efficiently and at scale. But here’s the catch, recent events revealed that the same interdependence and ...
How Drawing On The Power Of AI Technology Can Help Your Institution Stay A Step Ahead Of Scammers And Fraudsters In 2026

How Drawing On The Power Of AI Technology Can Help Your Institution Stay A Step Ahead Of Scammers And Fraudsters In 2026

Shielding customers from scams and fraud and providing a safe online experience is paramount. Institutions that fail to do so will find themselves punished financially and reputationally, as regulators continue to bear down and consumers and businesses take their accounts elsewhere.
Resilience, Not Just Compliance: A Zero Trust Perspective for Federal Cybersecurity

Resilience, Not Just Compliance: A Zero Trust Perspective for Federal Cybersecurity

Introduction For decades, cybersecurity in government has been defined by a familiar cycle: secure the perimeter, block the intruders, respond to the audits. That model no longer works. As adversaries grow more sophisticated and resources remain tight, the federal community needs a new mindset. Prevention still matters, but resilience must come ...
Breaking the Mold: How the CISO Role Has Outgrown Its Technical Roots

Breaking the Mold: How the CISO Role Has Outgrown Its Technical Roots

​Recently on the DevSecOops podcast, hosts Tom Walker and Scott Fletcher sat down with George Abraham, CISO at Influx, to discuss the changing nature of cybersecurity leadership, the human challenges of leading teams, and the complex security risks emerging from new technologies. George began with a note that cybersecurity careers rarely follow a ...
No results found.

In The News

Elastic Brings LLM Observability to Azure AI Foundry to Optimize AI Agents

Elastic Brings LLM Observability to Azure AI Foundry to Optimize AI Agents

Developers on Azure AI Foundry can now quickly identify bottlenecks, optimize configurations and improve reliability of agentic AI applications
EY Selects CrowdStrike Falcon Next-Gen SIEM to Power Global Cybersecurity Managed Services

EY Selects CrowdStrike Falcon Next-Gen SIEM to Power Global Cybersecurity Managed Services

Expanded collaboration makes Falcon Next-Gen SIEM the foundation of EY global cyber managed services for security and non-security data, accelerating AI-driven security transformation for clients
CrowdStrike, AWS, and NVIDIA Expand Global Cybersecurity Startup Accelerator to Drive Cloud and Agentic AI Innovation

CrowdStrike, AWS, and NVIDIA Expand Global Cybersecurity Startup Accelerator to Drive Cloud and Agentic AI Innovation

Third annual program expands to startups worldwide, offering mentorship, partnership, and funding opportunities for the next generation of AI-driven cloud security companies
Infoblox Surpasses 200 Customers in Breakout Year for Universal DDI™ and Announces New Capabilities for Network Transformation

Infoblox Surpasses 200 Customers in Breakout Year for Universal DDI™ and Announces New Capabilities for Network Transformation

Delivering the industry’s first and only protective DDI platform, which achieved rapid adoption and impact in just one year. Simplifying hybrid multi-cloud operations, breaking down silos and accelerating deployments with new integrations across Akamai, Cloudflare, Google Cloud and Microsoft. Delivering the foundational, critical network services that ...
Cisco Simplifies Security for Managed Service Providers, Accelerating Their Hybrid Mesh Firewall Deployments and Business Growth

Cisco Simplifies Security for Managed Service Providers, Accelerating Their Hybrid Mesh Firewall Deployments and Business Growth

Cisco introduces foundational multi-customer management capabilities within Cisco Security Cloud Control, purpose-built for Managed Service Providers (MSPs). | The innovation streamlines operations, significantly reduces costs, and accelerates time-to-value for MSPs to deliver advanced managed security services. | MSPs can efficiently deploy and manage ...
Cisco Debuts New Unified Edge Platform for Distributed Agentic AI Workloads

Cisco Debuts New Unified Edge Platform for Distributed Agentic AI Workloads

Cisco Unified Edge extends data center power and scale to the edge, enabling real-time applications and AI inferencing where data is generated. | Cisco is first-to-market with an edge optimized platform that’s more than a server - integrating compute, networking, and storage into a single system backed by an extensive partner ecosystem. | The new ...
Ping Identity Strengthens Defence Against AI-Driven Impersonation with Privacy-Preserving Biometrics

Ping Identity Strengthens Defence Against AI-Driven Impersonation with Privacy-Preserving Biometrics

Signs agreement to acquire Keyless, expanding privacy-first authentication across the entire user journey.
Kaseya Connect APAC 2025 Awards Celebrate Regional MSP Excellence

Kaseya Connect APAC 2025 Awards Celebrate Regional MSP Excellence

The awards recognise outstanding innovation and service excellence from MSPs and IT professionals across the Asia Pacific region.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This