The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Your AI Is Only as Good as Your Data, According to NetApp’s President

Your AI Is Only as Good as Your Data, According to NetApp’s President

Forget dashboards and customer insights, the game has changed. The royal flush is in the data and lots of it.​ Countries and corporations that can prove the integrity of their data will dominate the next stage of global trade and innovation.Recently, NetApp’s President César Cernuda walked through the AI gold rush. It’s meaningless if companies can’t ...
North Korean ‘Laptop Farm’ Scheme Nets Prison Time for US Operatives

North Korean ‘Laptop Farm’ Scheme Nets Prison Time for US Operatives

​Two US nationals have been sentenced years behind bars after federal prosecutors say they helped fuel a sophisticated North Korean scheme that infiltrated American companies, stole identities and funnelled millions to a hostile regime. The United States Department of Justice announced that Kejia Wang, 42, and Zhenxing Wang, 39, were sentenced for ...
The Mission-Critical Standard: Why Mission-Certified Communications Are the Future of High-Stakes Operations

The Mission-Critical Standard: Why Mission-Certified Communications Are the Future of High-Stakes Operations

Mission-certified communications deliver secure, unified support in high-stakes operations.
Break Glass Accounts: Essential Security or a Cyber Risk?

Break Glass Accounts: Essential Security or a Cyber Risk?

Enterprises need a zero trust mindset to emergency access: least privilege, continuous monitoring and no implicit trust, even in a crisis. Break glass accounts should be treated as exceptions, not shortcuts, and governed accordingly.
The Latest Security Vulnerability Exploit Doesn’t Break Your Encryption. IT Bypasses IT.

The Latest Security Vulnerability Exploit Doesn’t Break Your Encryption. IT Bypasses IT.

A zero-day vulnerability exploit shows device compromises can bypass encryption entirely.
Building Secure Automation: Three Core Pillars That Make an iPaaS Enterprise-ready

Building Secure Automation: Three Core Pillars That Make an iPaaS Enterprise-ready

Introduction Security and governance are no longer back-office concerns, and in Australia, the stakes have never been higher. After a record 1,113 notifiable data breaches in 2024, the OAIC logged more than 530 additional breaches in the first half of 2025, with malicious attacks continuing to dominate. At the same time, major privacy reforms (e.g. ...
Identity Management Day

Identity Management Day

The sixth Identity Management Day highlights the evolving nature of identity. The meteoric rise of AI in general and its impact on nonhuman identities (NHIs) has focused attention on identity security as never before. But in the long view, it simply highlights the same issues we have seen in identity management since it was called “identity ...
Encryption Alone Is Not a Security Strategy

Encryption Alone Is Not a Security Strategy

Consumer apps lack identity and device controls, risking sensitive data.
No results found.

In the News

Boomi and ServiceNow Partner to Power Data Activation Across the Enterprise

Boomi and ServiceNow Partner to Power Data Activation Across the Enterprise

Boomi announced as the launch partner for the ServiceNow Workflow Data Network Passport Program, enabling customers to activate data enterprise-wide and accelerate AI-driven outcomes
Arctic Wolf Launches AI-Powered Mobile Threat Defense to Protect Organisations Against Growing Mobile-based Cyber Threats

Arctic Wolf Launches AI-Powered Mobile Threat Defense to Protect Organisations Against Growing Mobile-based Cyber Threats

New AI-powered mobile threat protection, expanded threat intelligence, and Concierge experience enhancements help organisations reduce risk across an increasingly distributed attack surface
Boomi Announces FY26 APJ Partner Award Winners

Boomi Announces FY26 APJ Partner Award Winners

Boomi, the data activation company, has announced the winners of its FY26 APJ Partner Awards. The program celebrates Boomi partners that are driving innovation and delivering measurable business outcomes for customers across the region. The awards highlight organisations that are leveraging the full breadth of the Boomi Enterprise Platform to ...
Nozomi Networks Platform Now Available on Google Cloud Marketplace

Nozomi Networks Platform Now Available on Google Cloud Marketplace

Nozomi Guardian and Central Management Council are now available on Google Cloud Marketplace, providing a new offering for Operational Technology cybersecurity
Secure Code Warrior Signs Strategic Collaboration Agreement With AWS to Support Security-Conscious Developers With Amazon Bedrock AI Learning Modules

Secure Code Warrior Signs Strategic Collaboration Agreement With AWS to Support Security-Conscious Developers With Amazon Bedrock AI Learning Modules

New interactive training activities simulate real-world AI risk remediation for Amazon Bedrock
PEXA Clear Partners With Simonds, Clarendon Homes and Others to Provide AML/CTF Compliance Solutions to Property Professionals

PEXA Clear Partners With Simonds, Clarendon Homes and Others to Provide AML/CTF Compliance Solutions to Property Professionals

Melbourne, Australia: PEXA Clear has announced a series of new partnerships with Simonds, Clarendon Homes, One Percent Property, YPM Property, Belle Property Townsville and The Avanti Group, building momentum ahead of impending new AML/CTF compliance obligations for property professionals, which come into effect from 1 July. A purpose-built solution ...
GTIG Warns AI Threat Actors Are Moving Faster Than Defenders

GTIG Warns AI Threat Actors Are Moving Faster Than Defenders

Google Threat Intelligence Group (GTIG) has warned that threat actors are now operationalising AI at a scale and sophistication that is rapidly reshaping the cyber threat landscape, with state-backed groups and cybercriminals using large language models to accelerate exploit development, malware creation, reconnaissance and influence operations. The ...
SailPoint Launches Agentic Fabric to Secure AI Identities Across the Enterprise

SailPoint Launches Agentic Fabric to Secure AI Identities Across the Enterprise

New solution brings visibility, governance, and real-time protection to the rapidly expanding universe of non-human identities
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This