The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Insider Threats: The Silent Cybersecurity Crisis Facing Australian Businesses

Insider Threats: The Silent Cybersecurity Crisis Facing Australian Businesses

In a climate where data is currency and trust is critical, defending against insider threats is not just a technical necessity - it’s a business imperative.
Uncomfortable Truths Behind Cybersecurity Failures

Uncomfortable Truths Behind Cybersecurity Failures

In Episode 4 of the DevSecOops podcast, hosts Tom Walker and Scott Fletcher discussed what’s really dragging security down in modern organisations. And spoiler, it’s not the hackers. If you’re someone in tech, security, or just trying to make sense of how to run a safer, smarter organisation, this one is for you. No Longer a Departmental ...
Why ‘Boring’ Data Backups Could Save Millions

Why ‘Boring’ Data Backups Could Save Millions

Imran Husain, Global Chief Internet Information Security Officer at MillerKnoll, spoke about the often underestimated arena of manufacturing. Data backups may be boring, Husain warns, but ignoring them comes at a potential large cost.Manufacturing has long been viewed as slow to adopt new technologies. As Husain describes, for years the sector’s ...
The Risky Race to AI: How DeepSeek Is Reshaping the AI Landscape

The Risky Race to AI: How DeepSeek Is Reshaping the AI Landscape

The launch of DeepSeek-R1, a cost-effective, open-source large language model (LLM) by Chinese startup DeepSeek, is shaking up the AI landscape by offering high-quality tools at a fraction of the cost of Western competitors. While this democratizes access to advanced AI and could spark a wave of open-source innovation, it has also triggered significant ...
When Priorities Collide, How Do You Make the Right Call?

When Priorities Collide, How Do You Make the Right Call?

In Episode 2 of the DevSecOops podcast, hosts Tom Walker, James Vincent, and Scott Fletcher explored one of the biggest yet most overlooked challenges in organisations today: how to make the right decisions, especially when business, technology, and security priorities clash or collide. So, how can organisations balance these three? Equal ...
Why Hack in When You Can Log In

Why Hack in When You Can Log In

The identity security game has changed, and we’ve made it easier for attackers to win. Not because they’re smarter or more sophisticated (though many are), but because we’ve handed them the keys. Through unchecked identity sprawl, we’ve given cybercriminals a golden ticket to infiltrate what is arguably an organisation’s most valuable asset: its ...
Is Platformisation the New Rage?

Is Platformisation the New Rage?

We’ve seen trends come and go. But is platformisation here to stay? Venkat Balakrishnan, Chief Information Security Officer at TAL shares his opinion on why this is the best approach forward. The industry is witnessing a forward shift towards ‘platformisation’ - a newish trend that consolidates multiple cyber functions into a single integrated ...
No Breach Doesn’t Mean No Risk: Rethinking Cybersecurity Metrics in the Boardroom

No Breach Doesn’t Mean No Risk: Rethinking Cybersecurity Metrics in the Boardroom

“Measuring peace by the absence of war is a flawed benchmark, so is judging cybersecurity solely by a lack of incidents.” In boardrooms across industries, directors increasingly grapple with one of the most misunderstood performance indicators in modern governance: cybersecurity effectiveness. At first glance, it’s tempting to celebrate a spotless ...
No results found.

In the News

Macquarie Technology Announces Successful Upsizing of Debt Capacity From $450m to $500m

Macquarie Technology Announces Successful Upsizing of Debt Capacity From $450m to $500m

Macquarie Technology Group Limited (ASX: MAQ) has announced the successful completion of a $50 million incremental debt facility, increasing MAQ’s secured revolving loan facility to $500 million. The newly secured $50 million will enable Macquarie Data Centres to expedite capacity delivery beyond the initial 6 megawatts (MW) at the company’s ...
Group-IB Report: Networked Supply Chain Cyber Attacks to Significantly Transform Asia-Pacific Cyber Risk Landscape in 2026

Group-IB Report: Networked Supply Chain Cyber Attacks to Significantly Transform Asia-Pacific Cyber Risk Landscape in 2026

Cyber threats like phishing and ransomware are now often links in a supply-chain attack ecosystem – a single compromise can reach thousands of downstream victims.    Group-IB uncovered 263 instances of corporate access in Asia-Pacific being sold on the dark web in 2025     Artificial Intelligence (AI) is making supply chain attacks cheaper, ...
Dragos OT Cybersecurity Report: Adversaries Increase Real-World Impact, Map Control Loops Across Industrial Infrastructure

Dragos OT Cybersecurity Report: Adversaries Increase Real-World Impact, Map Control Loops Across Industrial Infrastructure

The latest Dragos 2026 OT/ICS Cybersecurity Report finds cyber adversaries are progressing from reconnaissance to real-world operational disruption, including across Asia-Pacific.
Palo Alto Networks Unit 42 Releases Global Incident Response Report 2026

Palo Alto Networks Unit 42 Releases Global Incident Response Report 2026

AI-Driven Attacks, Identity Abuse and Supply Chain Exploitation Reshape the Cyber Threat Landscape
Arctic Wolf Threat Report Highlights 11x Growth in Data Extortion Incidents and Continued Dominance of Ransomware

Arctic Wolf Threat Report Highlights 11x Growth in Data Extortion Incidents and Continued Dominance of Ransomware

New insights reveal the pivot to data-only extortion, attacker abuse of remote access tools, and how early detection is reshaping ransomware outcomes
New Report Finds APAC Enterprises Facing Agentic AI Technical Challeneges

New Report Finds APAC Enterprises Facing Agentic AI Technical Challeneges

Sydney, 18 February 2026 - Dynatrace, the leading AI-powered observability platform, has today released the regional findings of The Pulse of Agentic AI 2026. The inaugural survey of 919 senior global leaders responsible for agentic AI implementation reveals that enterprises are not stalling because they doubt AI, but because they cannot yet ...
Check Point Software Earns Leader & Fast Mover Position in GigaOm Radar for Cloud Network Security

Check Point Software Earns Leader & Fast Mover Position in GigaOm Radar for Cloud Network Security

Analyst firm highlights Check Point’s prevention‑first architecture, strong ecosystem integrations, unified cloud security platform, and continued pace of innovation REDWOOD CITY, CA. February 17, 2026 -- Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced that it has been ...
LummaStealer Is Back at Scale as Fake CAPTCHA Campaigns Drive Global Resurgence

LummaStealer Is Back at Scale as Fake CAPTCHA Campaigns Drive Global Resurgence

Bitdefender researchers have identified a significant resurgence of one of the world’s most prolific information-stealing malware operations, less than a year after a major global law enforcement action disrupted more than 2,300 of its command-and-control domains. Despite the 2025 takedown effort, LummaStealer was not dismantled. Instead, the ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This