The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

‘The Emotional Hit was Real’, reveals former CISO at Medibank during the breach
Cyber incidents rarely begin with chaos. No sirens. No flashing lights. Just a quiet alert that something isn’t right.
That’s how it started for Alex Loizou, former Chief Information Security Officer at Medibank, on an October evening in 2022. A routine detection. An anomaly that, at first glance, looked like background noise.
It wasn’t.
Within ...

Data Resilience in a Post-Quantum World
As cyber threats evolve and quantum computing looms, organizations are shifting from breach prevention to resilience-focused strategies that prioritize continuity, recovery, and adaptability. By adopting quantum-safe cryptography, tamper-proof backups, automated detection, and crypto-agile infrastructures, forward-thinking enterprises are building ...

Securing the New Gaming Frontier: Data Infrastructure at Play
The gaming industry is undergoing a transformative era, driven by immersive technologies, AI, and global online communities, but this evolution brings critical challenges in balancing innovation with security and scalability. To thrive, studios must adopt intelligent, resilient data infrastructures that ensure seamless gameplay, safeguard against cyber ...

How Fake Operatives are Landing Remote Tech Jobs
Remote workforce has changed how companies hire. It has also changed who can get in to these sought-out businesses.
Across global hiring pipelines, recruiters are encountering candidates who look legit on paper, interview well remotely and arrive with precisely the right skills organisations need. The problem isn’t poor vetting or rudimentary HR. It’s ...

Cyber Attacks Could Ground Flights, is America’s Aviation System Ready?
Over the past year, cyber incidents have quietly become one of aviation’s most disruptive operational risks. When systems go down, airlines revert to manual processes, queues stretch for hours, flights are delayed or cancelled, and the costs stack up fast financially, reputationally, and operationally. Plus, customers take to social media to air their ...

Deepfake Diplomacy – AI Impersonation’s Attack on Sovereign Security
The rise of AI-powered impersonation—ranging from synthetic voice deepfakes to algorithmically generated messages—poses a critical threat to government, defense, and national infrastructure. A recent incident involving an AI-generated impersonation of a U.S. Secretary of State underscores the urgency of this threat.
State-sponsored actors are ...

Is the Next National Security Crisis Hiding in your Supermarket?
Australians are being told the cost of living crisis is easing. But at the checkout, families know better. Grocery prices remain absorbingly high, with no plan to lower prices and increase food availability. Is Australia quietly sleepwalking into a food security crisis?
According to agricultural transparency advocate and Founder at Real Food Price ...

Building Resilience Through AI-Driven Security
The cybersecurity landscape is evolving, emphasizing the dual role of AI as both a tool for attackers and defenders. There is an urgent need for businesses to adopt resilient, security-first strategies, including AI-driven anomaly detection, data classification, and toolchain consolidation. As hybrid environments grow more complex, organizations must ...
No results found.
In The News
Akamai Secures Critical Infrastructure with Agentless Zero Trust Segmentation Powered by NVIDIA
Akamai Guardicore Segmentation and NVIDIA BlueField integration ends the long-standing trade-off between advanced security and system performance for energy, manufacturing, and transportation sectors
Tenable Research Reveals Growing AI Exposure Gap Fuelled by Supply Chain Risks and Lack of Identity Controls
Tenable report finds 86% of organisations have installed third-party code packages with critical-severity vulnerabilities; 65% expose high-value assets through forgotten cloud credentials
KBI.Media Engaged to Deliver Executive Interview Coverage at Atmos SPHERE 2026
Sydney, Australia Feb 23rd - KBI.Media has been engaged to provide on-site podcast interview coverage for Atmos SPHERE 2026. SPHERE 2026, hosted by Atmos, Australia and New Zealand’s leading legal and advisory firm, is the flagship cyber security forum being held on Thursday the 5th of March 2026, in Sydney, Australia. The event brings together senior ...
Nozomi Networks Labs Report Finds Healthcare Services the Most Targeted Industry in Australia
The latest Nozomi Networks Labs OT & IoT Security Report released today finds healthcare services was the most targeted industry in Australia, followed by manufacturing. During the second half of last year, threat actors increased their usage of generative AI in their activity, attacks against companies in English-speaking countries are increasing ...
Datadog Announces DASH 2026 AI and Observability Conference
Datadog has announced that registration is open for DASH, the company’s ninth annual global conference. DASH brings together builders, engineers, security leaders, and technology decision-makers to explore how observability and security are evolving in an era of increasingly complex, AI-driven systems. The event will take place June 9–10, 2026, at the ...
CrowdStrike and Qualtrics Extend Security for Customer and Employee Experience Programs with New Integration
CrowdStrike and Qualtrics have announced a new integration that brings enterprise-grade SaaS security directly into customer and employee experience programs.
Barracuda Found That 90% of Ransomware Incidents Exploit Firewalls
90% of Ransomware Incidents Exploit Firewalls | New Barracuda Report Shows How Attackers Target Organisations and The Security Gaps Increasing Risk
Over 1500% Increase in New, Unique Malware Highlights Growing Security Complexity, According to WatchGuard Biannual Threat Report
Over 1500% Increase in New, Unique Malware Highlights Growing Security Complexity, according to WatchGuard Biannual Threat Report
MSPs must shift from reactive security to proactive threat intelligence and unified protection
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
