The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Cybersecurity Paradox: Mastering a Game That Has Already Changed

The Cybersecurity Paradox: Mastering a Game That Has Already Changed

For decades, enterprises have invested billions into mastering the art of cybersecurity firewalls, antivirus programs, perimeter defenses, and compliance checklists. Many have grown adept, even excellent, at these measures. However, excellence is a moving target in a world of relentless digital transformation. What if the tools we have perfected are no ...
How Unchecked Third-Party Access Is Undermining Supply Chains

How Unchecked Third-Party Access Is Undermining Supply Chains

As supply chains continue to evolve, so too must the frameworks that secure them. In an era where every digital interaction carries risk, identity is not just a technical concern: it’s the foundation of trust in the modern enterprise.
Why Securing Digital Identities Is Now a Business-Wide Imperative

Why Securing Digital Identities Is Now a Business-Wide Imperative

In the face of rising cyber risks, businesses that embed identity security into the fabric of their cybersecurity strategy will be better positioned to defend against attacks, protect data, and ensure operational resilience.
The Top Cyber Movies That Shaped Our View for Better or for Worse?

The Top Cyber Movies That Shaped Our View for Better or for Worse?

From flickering CRT monitors to sophisticated cyber heists, the proliferation of cyber films that mirrors our growing anxiety and fascination with life online. Hollywood has long toyed with the tension between human curiosity and digital dystopia. While some cyber films exaggerate for dramatic flair, others eerily foreshadow real world breaches, hacks, ...
7 Reasons Certifications Are Critical to Secure Communications

7 Reasons Certifications Are Critical to Secure Communications

Picture this scenario. You’re a government leader or a critical infrastructure operator. Suddenly, your communication systems go dark. The network has been breached, and sensitive information is exposed. Foreign adversaries are listening, decisions are delayed, and operations are paralyzed. Worse yet, you have no way of getting in touch with your ...
EOFY 2025: Australian Businesses Need to Mount Defences Against Rising Threat of Cyberwarfare

EOFY 2025: Australian Businesses Need to Mount Defences Against Rising Threat of Cyberwarfare

Modern cyberwarfare is a rising threat for Australian organisations and requires proactive exposure management for businesses to harden their defence against AI-enabled attacks.
Overcoming the Complexity and Security Issues Posed by AI Coding Tools

Overcoming the Complexity and Security Issues Posed by AI Coding Tools

The advantages AI tools deliver in speed and efficiency are impossible for time-crunched developers to resist. But the complexity and risk created by AI-generated code can’t be ignored either. Organisations need to thoroughly upskill their developers so that they can work with security professionals to nip software security problems in the bud. Only by ...
Insider Threats: The Silent Cybersecurity Crisis Facing Australian Businesses

Insider Threats: The Silent Cybersecurity Crisis Facing Australian Businesses

In a climate where data is currency and trust is critical, defending against insider threats is not just a technical necessity - it’s a business imperative.
No results found.

In the News

VAST Data and CrowdStrike Partner to Establish a Unified Security Model for the AI Lifecycle

VAST Data and CrowdStrike Partner to Establish a Unified Security Model for the AI Lifecycle

At VAST Forward 2026, VAST Data, the AI Operating System company, and CrowdStrike (NASDAQ: CRWD) announced a strategic partnership that combines VAST’s native data-layer governance and platform-level controls with CrowdStrike’s enterprise-grade threat detection and automated response. By integrating these capabilities within the VAST AI Operating ...
BeyondTrust Recognised as a Leader and Outperformer in the 2026 GigaOm Radar for Cloud Infrastructure Entitlement Management (CIEM)

BeyondTrust Recognised as a Leader and Outperformer in the 2026 GigaOm Radar for Cloud Infrastructure Entitlement Management (CIEM)

BeyondTrust’s Pathfinder platform earns Leader distinction in Innovation / Platform Play quadrant GigaOm highlights BeyondTrust’s AI-driven analytics, just-in-time access, lifecycle governance, and multicloud compliance capabilities  Atlanta, GA – February 26, 2026 — BeyondTrust, the global leader in privilege-centric identity security protecting ...
Genetec Sets a New Standard for Enterprise Physical Security With Cloudlink 2210

Genetec Sets a New Standard for Enterprise Physical Security With Cloudlink 2210

New high-density appliance enables enterprises to scale cloud-managed physical security without forcing cloud-only storage or infrastructure replacement Sydney, 2 March 2026 — Genetec Inc. (“Genetec”), the global leader in enterprise physical security software, today announced Genetec Cloudlink™ 2210. Designed for complex, enterprise-scale ...
Macquarie Technology Delivers Twenty-two Consecutive Halves of EBITDA Growth

Macquarie Technology Delivers Twenty-two Consecutive Halves of EBITDA Growth

Macquarie Technology Group Ltd (ASX: MAQ) (the Company) today announced its results for the half-year ended 31 December 2025, which were in line with guidance. Chairman Peter James said, “Macquarie Technology Group is pleased to announce its 22nd consecutive half of EBITDA growth. The Company continues to grow and evolve and sees ongoing opportunities ...
VAST Data Introduces Polaris to Orchestrate Globally Distributed AI Data Infrastructure Across Hybrid Multicloud Environments

VAST Data Introduces Polaris to Orchestrate Globally Distributed AI Data Infrastructure Across Hybrid Multicloud Environments

At VAST Forward 2026, AI operating system VAST Data announced Polaris, a global control plane designed to provision, operate and orchestrate distributed AI infrastructure across public cloud, neocloud and on-premises datacentre environments. Polaris transforms VAST deployments into a unified, fleet-scale platform, enabling enterprises to manage AI data ...
New Phishing Campaigns Weaponise Reserved Domain Name Space  

New Phishing Campaigns Weaponise Reserved Domain Name Space  

New research from Infoblox Threat Intel shows how criminals twist a core part of the internet to slip past many of today’s standard security checks. Phishing attacks are everywhere, but historically, their tactics follow clear patterns and trends. Research by Infoblox Threat Intel uncovers an anomaly – a new method utilised by cybercriminals to ...
Saviynt Bolsters Its AI-Powered Identity Security Through Integrations With Amazon Quick

Saviynt Bolsters Its AI-Powered Identity Security Through Integrations With Amazon Quick

New Amazon Q integrations deliver deeper context and agentic AI workflows for identity teams Sydney – February 27, 2026 – Saviynt, a leading provider of AI-powered identity security solutions, has announced a new agentic AI-based conversational capability built on Amazon Quick and the general availability of its Amazon Quick Index ...
ManageEngine Introduces Causal Intelligence and Autonomous AI to IT Operations for Faster Incident Response

ManageEngine Introduces Causal Intelligence and Autonomous AI to IT Operations for Faster Incident Response

New Site24x7 Capabilities Combine Domain-Aware Correlations, autonomous AI, And Workflow Orchestration To Drive Self-Healing IT Operations Delivers faster root-cause identification with causal intelligence–driven correlation Improves incident response efficiency using AI Enables controlled remediation at scale through governed workflow ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This