The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Fortifying Australia’s Data Centres: A Cybersecurity Imperative

Fortifying Australia’s Data Centres: A Cybersecurity Imperative

As AI accelerates digital transformation, Australia’s booming data centre industry must embed cyber resilience into its infrastructure design to defend against increasingly complex and converging threats across IT, OT, and physical systems.
The Future of Access Control: Embracing Edge Intelligence, Cyber Hardened Hardware and Ecosystem Resilience

The Future of Access Control: Embracing Edge Intelligence, Cyber Hardened Hardware and Ecosystem Resilience

As global security threats evolve, so must the approach to access control. According to the 2025 Trends in Access Controllers Report conducted by Mercury Security, a subsidiary of HID, three transformational currents emerged: edge intelligence and embedded applications; rigorous cybersecurity hardening; and an expanding ecosystem that values openness, ...
Why Separation of Duties Is Vital to Cybersecurity

Why Separation of Duties Is Vital to Cybersecurity

By embedding Separation of Duties into the fabric of their operations, businesses position themselves to respond confidently to evolving threats while meeting the demands of regulators, partners, and customers alike.
Cyber and Physical Worlds Collide in Critical Infrastructure

Cyber and Physical Worlds Collide in Critical Infrastructure

The convergence of cyber and physical security is no longer a hypothetical future; it’s the present reality for critical infrastructure operators worldwide. Sam Mackenzie, cybersecurity committee member at the Australian Computer Society (ACS), spoke intelligently about the challenges, demands, and culture shifts now facing organisations on the ...
Why CISOs Are Now Strategic Leaders in Cyber Preparedness

Why CISOs Are Now Strategic Leaders in Cyber Preparedness

Operational resilience is no longer a niche concern for the IT department. It is a strategic imperative, one that can safeguard business continuity, protect brand reputation, and maintain customer trust.
Why Digital Identity Is the Key to a Fairer, Safer Financial System

Why Digital Identity Is the Key to a Fairer, Safer Financial System

Beyond convenience, the integration tackles real-world friction, the kind that costs both time and trust. Prior to ConnectID, if someone’s details didn’t align with outdated government records, we’d get stuck in a frustrating cycle of manual reviews, long phone calls, and delays. Now, we validate identities quickly using dynamic, bank-held data.
The Guardians that Safeguard our Critical Infrastructure

The Guardians that Safeguard our Critical Infrastructure

Introduction Every day, critical industry sectors like healthcare, government and utilities services rely on digital systems that are mission-critical but vulnerable to cyber threats. Yet, the professionals safeguarding these systems often go unrecognised. Imagine a hospital's life-support systems faltering during critical surgery, a school building’s ...
The Unseen Price of ‘Going Faster’

The Unseen Price of ‘Going Faster’

The constant talk of ‘seamless migration’ and ‘cloud first strategy’ can sometimes result in burnt out engineering teams and security risks nobody wants to look at. Iress, a leading tech company in financial services, decided to embark on decade long push to transform, accelerate, and above all, stay relevant. Technical debt, too many tools, and the ...
No results found.

In The News

Qualys Honored with Dual Win at Prestigious Pwnie Awards for Groundbreaking Cybersecurity Research

Qualys Honored with Dual Win at Prestigious Pwnie Awards for Groundbreaking Cybersecurity Research

Wins for Epic Achievement and Best RCE spotlight Qualys’ industry-leading research into critical OpenSSH vulnerabilities, reinforcing its leadership in global cybersecurity innovation
Tenable Jailbreaks OpenAI’s GPT-5 Within 24 Hours, Bypassing New Safety Features

Tenable Jailbreaks OpenAI’s GPT-5 Within 24 Hours, Bypassing New Safety Features

Just 24 hours after OpenAI launched its highly anticipated GPT−5 model with promises of “significantly more sophisticated” prompt safety, exposure management company Tenable has successfully jailbroken the platform, compelling it to provide detailed instructions on how to build a Molotov cocktail. On August 7, 2025, OpenAI unveiled GPT−5, touting its ...
Fortinet Enhances FortiRecon to Align With Continuous Threat Exposure Management Framework to Help Organisations Stay Ahead of Threats

Fortinet Enhances FortiRecon to Align With Continuous Threat Exposure Management Framework to Help Organisations Stay Ahead of Threats

New features integrate attack surface management, threat intelligence, and security orchestration to help security teams reduce risk faster and more proactively
Genetec Continues To Dominate Video Surveillance Software Market, According To Latest Analyst Reports

Genetec Continues To Dominate Video Surveillance Software Market, According To Latest Analyst Reports

Growing SaaS adoption and customer demand for flexible, open solutions strengthen company’s continued market leadership.
Trend Micro Launches Agentic SIEM to Herald New Era of Proactive Security

Trend Micro Launches Agentic SIEM to Herald New Era of Proactive Security

SYDNEY, August 13, 2025 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced new agentic AI technology designed to solve the traditional pain points associated with Security Information and Event Management (SIEM). When combined with Trend’s digital twin capabilities it will help to transform security ...
Elastic Introduces Logs Essentials: Serverless Log Analytics, in a New Low-priced Tier

Elastic Introduces Logs Essentials: Serverless Log Analytics, in a New Low-priced Tier

Site reliability engineers and developers gain access to powerful log analytics without the overhead of managing Elastic Stack
New Dragos Report Estimates Over $300 Billion in Potential Global OT Cyber Risk Exposure

New Dragos Report Estimates Over $300 Billion in Potential Global OT Cyber Risk Exposure

A new industry study has quantified the potential global financial impact of operational technology (OT) cyber incidents at up to US $329.5 billion in a severe but plausible scenario, with business interruption losses accounting for more than half that amount.
Rapid7 Access Brokers Report: New Research Reveals Depth of Compromise in Access Broker Deals, with 71% Offering Privileged Access

Rapid7 Access Brokers Report: New Research Reveals Depth of Compromise in Access Broker Deals, with 71% Offering Privileged Access

New research into underground cybercrime markets has revealed that “initial” access sold by brokers often represents a deep compromise, with 71% of listings offering privileged credentials and, in some cases, multiple access vectors bundled together.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This