The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Why Is Energy Monitoring Technology So Important For Achieving Sustainability Goals?
While many organisations are setting ambitious goals (planning for decarbonisation, cleaner electrification or other reductions in emissions) they are failing to implement the tech to make them a reality.

Janice Le – GM, Microsoft Security, Compliance, Identity & Privacy
Watch The Interview
Biography
Janice is GM, Microsoft Security Compliance, Identity & Privacy at Microsoft where she oversees strategy, operations, and portfolio marketing for Microsoft Security.
She has served the tech industry in Silicon Valley over the last 20+ years at enterprises and startups in product, marketing, and GM roles for ...

The End of Pentest Reporting Chaos: OWASP Standardises the Industry
For years, penetration testing reports have been inconsistent, manual, and difficult to integrate into modern security workflows. Every provider has its own format, slowing down remediation and making automation nearly impossible. The OWASP Penetration Test Reporting Standard (OPTRS) is designed to fix this. It provides a structured, machine-readable ...

2024 Lessons Shaping 2025 Cybersecurity Trends
Discover key lessons from 2024 cyberattacks and how they’ll shape 2025 cybersecurity trends. Learn to build resilience with breach ready defenses.

Navigating And Combatting Scams In Banking
By adopting a comprehensive cybersecurity strategy that integrates multiple data sources and streams and enhances the digital experience, banks can significantly bolster their defences and protect their customers.

The Two Forces Reshaping Our Cyber Defences For The Better
Introduction
It’s very hard to catch a ball in flight without being able to make real-time calculations based on a continuous and uninterrupted stream of information from your eyes to your brain. The same can be said for cyber security. It’s tough to catch threats in play without truly real-time data.
The need for real-time data and data processing ...

Understanding The Risks Associated With ‘Shadow AI’ In Software Development
There are ways for CISOs to bring AI-assisted coding out of the shadows, allowing staff to get the most out of productivity benefits while avoiding vulnerabilities. This can be done by embracing it – as opposed to blanket suppression – and pursuing a three-point plan to establish reasonable guardrails and raise security awareness capabilities among ...

Six Trends Shaping The Future Of The Security Industry In 2025
In 2025, security will be transformed by hybrid architectures, advanced AI, and high-resolution imaging, enabling smarter, more flexible systems. Security technologies will deliver business intelligence, while software-driven solutions and core technology ownership ensure resilience, efficiency, and innovation.
In The News
New Relic Advances Intelligent Observability with AI-Strengthened Innovations Across Every Corner of Its Platform, Accelerating Enterprise Business
“Observability provides the lens on digital business, and as such, the ideal place for these intelligent capabilities to live. All businesses will demand observability innovations that make these outcomes achievable.”
Genetec Enhances Security Center SaaS With The Addition Of Intrusion Management
New functionality enhances real-time threat detection, verification, and automated response
Wavelink Appoints Jonathan Odria as Board Advisor to Strengthen Partner and Vendor Engagement and Launch Inaugural Partner Advisory Board
February 26, 2025 – Wavelink, an Infinigate Group company and ANZ leader in technology distribution, channel services and business development, has announced the appointment of Jonathan Odria as board advisor. Jonathan is a highly respected figure in the Australian IT channel and brings extensive experience in distribution, partner engagement, and ...
Dragos Reports OT/ICS Cyber Threats Escalate Amid Geopolitical Conflicts and Increasing Ransomware Attacks
The 2025 Dragos OT Cybersecurity Year in Review is an annual overview and analysis of OT-focused global threat activities, vulnerabilities, and industry insights and trends. It is the industry’s most comprehensive report on cyber threats facing industrial organisations.
Rapid7 Delivers Command Platform Innovations to Identify, Prioritise, and Remediate Critical Exposures
Rapid7 has announced new features to its Exposure Command offering, designed to protect sensitive data across multi-cloud environments and drive effective prioritisation and accelerated remediation of exposures with AI-driven CVSS scoring and integrated asset context between Surface Command and Remediation Hub.
Backbase and MeaWallet Partner To Transform Digital Payment Security in Australia and New Zealand
Banks and fintechs set to deliver secure, frictionless digital payment experiences through advanced tokenisation technology
Fortinet Completes the Infosec Registered Assessors Program Assessment for FortiSASE
Fortinet continues to deliver innovative cybersecurity solutions to support Australian public-sector and critical infrastructure use cases
NinjaOne Secures US$5 Billion Valuation and $500 Million Funding to Redefine Automated Endpoint Management
NinjaOne today announced $500 million in Series C extensions at a $5 billion valuation. The venture funding came in separate tranches that were led by ICONIQ Growth and CapitalG, Alphabet’s independent investment fund, with participation from other prominent private investors. The raise will drive research and development focused on autonomous endpoint ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..