The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Instagram Password Reset Emails Reveal Serious Gaps in Security

Instagram Password Reset Emails Reveal Serious Gaps in Security

The recent wave of Instagram account reset emails which impacted 17.5 million users didn’t rely on sophisticated exploits. Instead, it exposed something closer to home, which really is around the weaknesses in standard account recovery processes combined with predictable user behaviour. Like clicking the ‘reset password’ link when the email from ...
Cyber Security Trends Boards Can’t Afford to Ignore

Cyber Security Trends Boards Can’t Afford to Ignore

Cybersecurity has officially graduated from “something IT worries about” to a full-blown boardroom issue. These days, it sits somewhere between financial risk, operational resilience and reputational survival. If it still feels like a technical problem that can be delegated down the org chart, that’s usually the first warning sign. The reality is that ...
Battling Burnout in Cybersecurity

Battling Burnout in Cybersecurity

No organization is resilient without a healthy team. Cybersecurity maturity and resiliency must encompass workforce health. Leaders must treat burnout with the same seriousness as any other operational risk. ​​
Why Mobile Devices Are Now Cybercrime’s Primary Entry Point

Why Mobile Devices Are Now Cybercrime’s Primary Entry Point

​Most organisations believe their risk is under control. Endpoints are hardened. Networks are monitored. Identity systems are layered and audited. Yet breaches continue and, increasingly, they don’t start where defenders are looking. Jeff Lindholm, Chief Revenue Officer at Lookout, talks about a shift that has been quietly reshaping cyber risk. Mobile ...
Three Cybersecurity Predictions That Will Define the CISO Agenda in 2026

Three Cybersecurity Predictions That Will Define the CISO Agenda in 2026

In this byline, Sam Salehi, Managing Director ANZ at Qualys, shares his 2026 predictions for the cybersecurity industry, outlining the shifts that will define the CISO agenda as security teams grapple with an excess of signals, expanding AI-driven risk and rising board expectations. Sam argues that success in the year ahead will hinge on CISOs moving ...
Australia’s Cyber Laws Just Changed on Who Takes the Hit

Australia’s Cyber Laws Just Changed on Who Takes the Hit

There’s a new kind of tension creeping into Australian boardrooms. For years, when cyber incidents hit, accountability had a familiar landing zone to fob off and ‘talk to security’. Well, those days are over. With new federal cyber legislation now placing personal liability on company directors, responsibility has shifted upstream and everyone feels ...
How to Build Secure Communications Beyond “End-to-End” Network Encryption

How to Build Secure Communications Beyond “End-to-End” Network Encryption

For governments and critical infrastructure operators, secure communications are essential to national governance, operational continuity, and crisis response. Secure communication is the process of safeguarding communication channels and taking full control over critical information. It involves methods and technologies to ensure that all data ...
NIAP-Certified Security – A Foundation for Trusted Communications

NIAP-Certified Security – A Foundation for Trusted Communications

In government and critical infrastructure, security is not an optional feature, it is the foundation of operational integrity. For organizations responsible for protecting sensitive data and ensuring mission continuity, trust in communication systems must be earned through independent, rigorous validation. Relying on unvetted software introduces ...
No results found.

In The News

Tenable Extends Exposure Management to AI Attack Surface

Tenable Extends Exposure Management to AI Attack Surface

Tenable One unifies AI discovery, protection and governance within a single exposure management platform
Cythera Appoints Industry Leader Jason Whyte as Managing Director to Drive Australian Expansion and Group Integration

Cythera Appoints Industry Leader Jason Whyte as Managing Director to Drive Australian Expansion and Group Integration

MELBOURNE, AUSTRALIA — January 27, 2026 — Cythera, a leading Australian cybersecurity provider and a Bastion Group company, today announced the appointment of Jason Whyte as Managing Director for Australia. In this pivotal role, Whyte will oversee the group’s overall Australian operations, including the strategic integration of Seamless Intelligence ...
Tecala Strengthens Cyber Security Leadership with Microsoft Solutions Partner Designation for Security and Expanded ISO 27001:2022 Certification

Tecala Strengthens Cyber Security Leadership with Microsoft Solutions Partner Designation for Security and Expanded ISO 27001:2022 Certification

Sydney, 27 January 2026 - Leading technology service provider, Tecala, today announced that the company has achieved two significant security milestones that reinforce its position as one of Australia’s most trusted technology partners. The company has been awarded the Microsoft Solutions Partner Designation for Security and successfully completed ...
Genetec Outlines Data Privacy Best Practices For Physical Security Teams Ahead Of Data Protection Day

Genetec Outlines Data Privacy Best Practices For Physical Security Teams Ahead Of Data Protection Day

Recommendations help organisations safeguard sensitive data while maintaining effective security operations
New Elastic Tools Aim to Fix Why Security Agents Fail When Data is Scattered Across Dozens of Systems

New Elastic Tools Aim to Fix Why Security Agents Fail When Data is Scattered Across Dozens of Systems

New Elastic tools aim to fix why security agents fail when data is scattered across dozens of systems
CrowdStrike Achieves ISO 42001 Certification for Responsible AI-Powered Cybersecurity

CrowdStrike Achieves ISO 42001 Certification for Responsible AI-Powered Cybersecurity

Certification accelerates leadership in trusted AI governance, enabling organizations to outpace AI-accelerated threats with speed and control
Rapid7 MDR Integrates Microsoft Defender Signals to Create Tangible Security Outcomes

Rapid7 MDR Integrates Microsoft Defender Signals to Create Tangible Security Outcomes

Rapid7 announces the availability of Rapid7 MDR for Microsoft – a pre-emptive threat detection, investigation, and response service that brings together Rapid7’s global SOC, our market-leading SIEM technology, and deeper bi-directional Microsoft Defender integrations.
Check Point Introduces AI-Driven Exposure Management to Close the Cyber Security Remediation Gap

Check Point Introduces AI-Driven Exposure Management to Close the Cyber Security Remediation Gap

Designed for AI-era attacks, Exposure Management helps organisations reduce risk faster using existing security controls 
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This