The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Resilience at Scale: How Modern Organisations Stay Fast Without Increasing Risk

Resilience at Scale: How Modern Organisations Stay Fast Without Increasing Risk

Australian organisations are not taking resilience seriously enough. According to BDO’s Tectonic States report, only 62 per cent of Australian business leaders ranked resilience as their top organisational priority, this is compared to 78 per cent of leaders in other countries, including the UK and Spain. This signals an opportunity for Australian ...
Taming the Gallop on Rising Cybersecurity Risk

Taming the Gallop on Rising Cybersecurity Risk

Introduction As the Lunar New Year ushers in a new cycle of The Horse, we can look to the traits of the traditional Chinese zodiac, which provide an admirable framework for cybersecurity objectives. Horses are commonly known for unbridled speed, agility, and making forward strides. These aren't just symbolic of cyber resilience: they are the new ...
‘Year of the Agent’ Is Heating Up

‘Year of the Agent’ Is Heating Up

Australia’s top cybersecurity leaders are stepping into what some are calling the next “wild west” of technology. Agentic AI - where speed is everything and the rules are still being written in real time. While Europe tightens the bolts with strict AI laws and the United States leans on broader frameworks, Australia is carving out its own path, one of ...
Executive Search Disruptors, Hit One Year Milestone as North Star Partners Gains Traction

Executive Search Disruptors, Hit One Year Milestone as North Star Partners Gains Traction

​One year in - Josh Hill and Luca Marzorati’s Quiet Build at North Star Partners is Turning Heads In an industry we know for churn, ego and constant movement, most firms spend their first year trying to prove they belong. Recently, the pair hit one year since the launch of North Star Partners, the executive search firm which was founded in 2024 to ...
Florida’s Cyber Boom. Sunshine State Emerges as Unlikely Powerhouse in America

Florida’s Cyber Boom. Sunshine State Emerges as Unlikely Powerhouse in America

​Move over Silicon Valley, a new contender is stepping into the cybersecurity spotlight and it’s not where most people expected. Florida, long dismissed as a playground for tourists and retirees, is quickly transforming into a serious force in the tech and cyber arena, turning up the heat on Silicon Valley’s traditional turf. ​When people think of ...
Communication as Infrastructure – Why Dialogue Is a Business Advantage

Communication as Infrastructure – Why Dialogue Is a Business Advantage

Why global tech fails in APJ and how treating communication as infrastructure unlocks adoption and scale.
Australia Moves to Honour Its Secret Holders. Starting With a Crowdfunding Campaign

Australia Moves to Honour Its Secret Holders. Starting With a Crowdfunding Campaign

Australia’s intelligence community has long operated in the shadows, but now, a bold push is underway to bring those stories into the light. But instead of a government backed rollout, it’s starting with a GoFundMe page ahead of its major raise. Australia, unlike allies such as the United States and the United Kingdom, ...
Three Critical Actions for Achieving an Optimal SAP Cybersecurity Budget

Three Critical Actions for Achieving an Optimal SAP Cybersecurity Budget

Any enterprise is subject to cyberattacks. The details about incidents concerning critical enterprise applications like SAP S/4HANA are often internal, and hence, public awareness is not up to the mark of malware and phishing. As the attacks become more sophisticated, it is important to understand what your optimal budget should be to protect ...
No results found.

In the News

Check Point Software Ranks #1 in Miercom’s 2026 Hybrid Mesh Network Security

Check Point Software Ranks #1 in Miercom’s 2026 Hybrid Mesh Network Security

Miercom’s 2026 Hybrid Mesh Network Security Assessment Shows Check Point achieving the highest overall security effectiveness score of 99.8%, highlighting its industry-leading threat prevention   
BeyondTrust’s 13th Annual Microsoft Vulnerabilities Report Reveals Drop in Total Volume, but Surge in Critical Risk

BeyondTrust’s 13th Annual Microsoft Vulnerabilities Report Reveals Drop in Total Volume, but Surge in Critical Risk

Critical vulnerabilities doubled year-over-year, signalling rising risk severity as AI-driven discovery and expanding attack surfaces reshape the Microsoft security landscape | Elevation of Privilege vulnerabilities accounted for 40% of all flaws, continuing to dominate threat actor pathways and reinforcing identity as the primary attack vector | Azure ...
Companies Rushing to Scale AI Are Running Into Operational Limits, DataDog Report Finds

Companies Rushing to Scale AI Are Running Into Operational Limits, DataDog Report Finds

Nearly 1 in 20 AI requests fail in production as capacity limits become the primary bottleneck to scaling AI reliably
Elastic Delivers First Embedded AI Experiences for Observability and Security Inside Third-Party AI Tools

Elastic Delivers First Embedded AI Experiences for Observability and Security Inside Third-Party AI Tools

MCP Apps bring Elastic’s security and observability workflows into third-party AI tools, enabling teams to act on data directly where they work, with additional capabilities for search and data exploration
Snowflake Expands Snowflake Intelligence and Cortex Code to Power the Control Plane for the Agentic Enterprise

Snowflake Expands Snowflake Intelligence and Cortex Code to Power the Control Plane for the Agentic Enterprise

Snowflake Intelligence transforms how business users turn insights into action through a personalised, context-aware AI agent grounded in enterprise data, while Cortex Code enables builders to move faster from code to production with AI-powered development across systems, tools, or environments
DroneShield Quarterly Activities/Appendix 4c Cash Flow Report

DroneShield Quarterly Activities/Appendix 4c Cash Flow Report

DroneShield Limited (ASX:DRO) has released its business update and Appendix 4C for the three-month period ended 31 March 2026 (1Q2026). The Company started 2026 with strong momentum, delivering the highest ever customer cash receipts in a quarter and the second‑highest revenue in a quarter. These results continue the positive trajectory from 2025, ...
Entrust Expands Identity Verification to Support Australia’s AML/CTF Reforms

Entrust Expands Identity Verification to Support Australia’s AML/CTF Reforms

Australia’s evolving Anti-Money Laundering and Counter-Terrorism Financing (AML/CTF) framework is reshaping how organisations approach identity verification. With Tranche 2 reforms set to extend compliance obligations across new industries, businesses are under increasing pressure to strengthen customer due diligence processes while maintaining ...
CrowdStrike Accelerates SMB Cybersecurity Transformation Across JAPAC With Expanded Distributor-Led Services

CrowdStrike Accelerates SMB Cybersecurity Transformation Across JAPAC With Expanded Distributor-Led Services

Expanded go-to-market empowers distributors to recruit and onboard MSSPs, increasing SMBs access and adoption of the Falcon platform
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This