The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How BlackBerry UEM Enables Trusted Mobile Operations Across the German Federal Government

How BlackBerry UEM Enables Trusted Mobile Operations Across the German Federal Government

Government in Constant Motion Federal government work now extends beyond offices to secure facilities, international forums, temporary work sites and even on the daily commute. Mobility has shifted from a supporting function into a core pillar of daily operations while expectations around security, sovereignty, and regulatory compliance have ...
Is This the End of the Road for AppSec?

Is This the End of the Road for AppSec?

Maintaining a clear line of sight over the AI coding tools and model control platforms in use, alongside a realistic assessment of the security capabilities of the developers deploying them, is becoming a critical requirement for enterprises.
Your AI Is Only as Good as Your Data, According to NetApp’s President

Your AI Is Only as Good as Your Data, According to NetApp’s President

Forget dashboards and customer insights, the game has changed. The royal flush is in the data and lots of it.​ Countries and corporations that can prove the integrity of their data will dominate the next stage of global trade and innovation.Recently, NetApp’s President César Cernuda walked through the AI gold rush. It’s meaningless if companies can’t ...
North Korean ‘Laptop Farm’ Scheme Nets Prison Time for US Operatives

North Korean ‘Laptop Farm’ Scheme Nets Prison Time for US Operatives

​Two US nationals have been sentenced years behind bars after federal prosecutors say they helped fuel a sophisticated North Korean scheme that infiltrated American companies, stole identities and funnelled millions to a hostile regime. The United States Department of Justice announced that Kejia Wang, 42, and Zhenxing Wang, 39, were sentenced for ...
The Mission-Critical Standard: Why Mission-Certified Communications Are the Future of High-Stakes Operations

The Mission-Critical Standard: Why Mission-Certified Communications Are the Future of High-Stakes Operations

Mission-certified communications deliver secure, unified support in high-stakes operations.
Break Glass Accounts: Essential Security or a Cyber Risk?

Break Glass Accounts: Essential Security or a Cyber Risk?

Enterprises need a zero trust mindset to emergency access: least privilege, continuous monitoring and no implicit trust, even in a crisis. Break glass accounts should be treated as exceptions, not shortcuts, and governed accordingly.
The Latest Security Vulnerability Exploit Doesn’t Break Your Encryption. IT Bypasses IT.

The Latest Security Vulnerability Exploit Doesn’t Break Your Encryption. IT Bypasses IT.

A zero-day vulnerability exploit shows device compromises can bypass encryption entirely.
Building Secure Automation: Three Core Pillars That Make an iPaaS Enterprise-ready

Building Secure Automation: Three Core Pillars That Make an iPaaS Enterprise-ready

Introduction Security and governance are no longer back-office concerns, and in Australia, the stakes have never been higher. After a record 1,113 notifiable data breaches in 2024, the OAIC logged more than 530 additional breaches in the first half of 2025, with malicious attacks continuing to dominate. At the same time, major privacy reforms (e.g. ...
No results found.

In the News

Semperis Publishes Study on AI’s Effect on the Attack Surface of Identity Systems

Semperis Publishes Study on AI’s Effect on the Attack Surface of Identity Systems

Study reveals Australian organisations are granting AI agents access to essential systems faster than safety measures are implemented. Without comprehensive security for identity systems, hackers can speed attempts to compromise Active Directory, EntraID or Okta
Palo Alto Networks Introduces Idira: The Next-Generation Identity Security Platform Built for the AI Enterprise

Palo Alto Networks Introduces Idira: The Next-Generation Identity Security Platform Built for the AI Enterprise

Delivers modern privileged access management by democratising security controls for every human, machine and agentic identity
Veeam Previews New Release of Veeam Data Platform at VeeamON New York City, Further Advancing Unified Data Trust

Veeam Previews New Release of Veeam Data Platform at VeeamON New York City, Further Advancing Unified Data Trust

Veeam Data Platform v13.1 advances secure-by-design data resilience with more than 70 new features and enhancements, and extends management with a new DataAI Resilience Module in the Veeam DataAI Command Platform
80% of Australian Organisations Suffered at Least One Identity Breach in the Past Year, Sophos Research Finds

80% of Australian Organisations Suffered at Least One Identity Breach in the Past Year, Sophos Research Finds

Today, Sophos released the State of Identity Security 2026, a vendor-agnostic survey of 5,000 IT and cybersecurity leaders across 17 countries, including 300 in Australia. The survey found that 80% of Australian organisations surveyed suffered at least one identity-related breach in the past year, and on average organisations reported three separate ...
Infosys Launches Dedicated Global Security Operations Center in Australia; Expands Cybersecurity Capabilities Across ANZ

Infosys Launches Dedicated Global Security Operations Center in Australia; Expands Cybersecurity Capabilities Across ANZ

Infosys has launched its first dedicated Global Security Operations Center (GSOC) in Australia, at its North Sydney office. The GSOC will bring together specialist security talent, established operations capabilities, and proven delivery processes under Infosys’ global security framework. Following Infosys’ acquisition of The Missing Link, a leading ...
Boomi and Red Hat Collaborate on Production-Ready Agentic AI

Boomi and Red Hat Collaborate on Production-Ready Agentic AI

Companies team to deliver a unified, enterprise-scale agentic stack to help organisations with managing data sovereignty and optimising AI costs
Veeam Launches DataAI™ Command Platform, the Industry’s First Unified Data and AI Trust Infrastructure for the Agentic Era

Veeam Launches DataAI™ Command Platform, the Industry’s First Unified Data and AI Trust Infrastructure for the Agentic Era

Combining #1 Data Resilience with #1 Data Security, Veeam delivers the missing layer in the AI stack, bringing together Data, Access, Identities, and AI in one connected trust platform
Boomi Unveils Innovations That Power the Agentic Enterprise

Boomi Unveils Innovations That Power the Agentic Enterprise

Orchestration capabilities simplify workflows, while advanced agent connectivity and an enhanced context layer activate data and scale AI
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This