The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

The New Priorities Driving Organisations to Uplift Web Application Security
While compliance ensures steady improvements to application security, the cadence of upgrades is not enough to meet best practice or evolving customer expectations.

Can Cyber Security Be a Platform for Innovation and Growth?
Six Preparedness and Performance Indicators to Unlock Cyber Agility

Digitally Marked: Australia’s Sensitive Position in the Global Cyberwar
Strategic advisor at Semperis, Simon Hodgkinson, discussed the ongoing state-sponsored cyberattacks, particularly in Australia. With decades of experience as a cybersecurity leader in software, financial services, and energy industry, Hodgkinson shared valuable perspectives and reflected on previous incidents, highlighting hard-learned lessons and best ...

Is Shadow AI the New Enemy Labyrinth?
Most Australian companies remain exposed to the round the clock threats, especially those exploiting AI technology. A new survey conducted by Cisco covering 8,000 organisations worldwide, with 301 from Australia unveil a new state of affairs.‘Shadow AI’ as we know it, is the use of unauthorised AI tools by employees, outside the official scrutiny of IT ...

Oracle’s Comeback to the Cloud Arena
Oracle, historically perceived as a late entrant in the cloud services market, and more commonly known for its database capability, is now pedalling a bold new trajectory that could reshape the competitive cloud landscape.
Since April 2024, Oracle has introduced several major updates such as the DR-25 initiative, which effectively shrinks its ...

Cyber Risk Is Business Risk: Qualys Calls for Strategic Shift During Global Cybersecurity Week
Sam Salehi, Managing Director ANZ at Qualys discusses why cyber risk can no longer be treated as a siloed IT issue, but must be addressed as a core business priority. As threat actors move faster and leverage AI to amplify attacks, Salehi highlights the urgent need for organisations to adopt a unified, strategic approach—bringing together security, IT, ...

World Password Day – Insight by CyberArk: Passwords Alone Can’t Defend Against Today’s Identity Threats
As the boundaries between our personal and professional lives continue to blur, World Password Day is a timely reminder that this convergence extends to how we manage passwords. The human element remains a well-known challenge for security and identity professionals. With password reuse common across personal and corporate accounts, a single ...
Active Subscription Scam Campaigns Flooding the Internet
Bitdefender researchers have uncovered a surge in subscription scams, both in scale and sophistication, spurred by a massive campaign involving hundreds of fraudulent websites. What sets this campaign apart is the significant investment cybercriminals have undertaken to make these fake sites look convincingly legitimate.
Gone are the days when a ...
No results found.
In the News
Tenable Extends Exposure Management to AI Attack Surface
Tenable One unifies AI discovery, protection and governance within a single exposure management platform
Cythera Appoints Industry Leader Jason Whyte as Managing Director to Drive Australian Expansion and Group Integration
MELBOURNE, AUSTRALIA — January 27, 2026 — Cythera, a leading Australian cybersecurity provider and a Bastion Group company, today announced the appointment of Jason Whyte as Managing Director for Australia.
In this pivotal role, Whyte will oversee the group’s overall Australian operations, including the strategic integration of Seamless Intelligence ...
Tecala Strengthens Cyber Security Leadership With Microsoft Solutions Partner Designation for Security and Expanded ISO 27001:2022 Certification
Sydney, 27 January 2026 - Leading technology service provider, Tecala, today announced that the company has achieved two significant security milestones that reinforce its position as one of Australia’s most trusted technology partners.
The company has been awarded the Microsoft Solutions Partner Designation for Security and successfully completed ...
Genetec Outlines Data Privacy Best Practices for Physical Security Teams Ahead of Data Protection Day
Recommendations help organisations safeguard sensitive data while maintaining effective security operations
New Elastic Tools Aim to Fix Why Security Agents Fail When Data Is Scattered Across Dozens of Systems
New Elastic tools aim to fix why security agents fail when data is scattered across dozens of systems
CrowdStrike Achieves ISO 42001 Certification for Responsible AI-Powered Cybersecurity
Certification accelerates leadership in trusted AI governance, enabling organizations to outpace AI-accelerated threats with speed and control
Rapid7 MDR Integrates Microsoft Defender Signals to Create Tangible Security Outcomes
Rapid7 announces the availability of Rapid7 MDR for Microsoft – a pre-emptive threat detection, investigation, and response service that brings together Rapid7’s global SOC, our market-leading SIEM technology, and deeper bi-directional Microsoft Defender integrations.
Check Point Introduces AI-Driven Exposure Management to Close the Cyber Security Remediation Gap
Designed for AI-era attacks, Exposure Management helps organisations reduce risk faster using existing security controls
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
