The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Why Agentic Automation Is the Next Evolution in Advanced Manufacturing
Policy efforts like Future Made in Australia emphasise a renewed national commitment to rebuilding sovereign capability and invigorating advanced manufacturing. One of the most promising developments enabling this shift is agentic automation – a new frontier in intelligent enterprise automation that is already beginning to reshape how leading ...

The Blur Between Cloud, OT, and Critical Infrastructure
Cordant’s DevSecOops podcast brings together trio Tom, Scott, and James for what turned into a timely, thoughtful discussion about the intersections of cloud technology, operational technology (OT), and critical infrastructure.
With recent news out of the US and Australia about the US regulatory crackdown on Chinese smart vehicle tech due to ...

Shaping the Future of AI: How Australia’s National AI Capability Plan Sets the Stage for Ethical and Secure AI Adoption
As artificial intelligence (AI) continues to revolutionise industries worldwide, its rapid advancement brings both vast opportunities and significant responsibilities. AI has the potential to transform sectors like healthcare, finance, manufacturing, and education, driving innovation and efficiency in unprecedented ways. However, as AI becomes embedded ...

How a Veteran Project Manager Tames Cyber Chaos
Recently, on DevSecOops podcast; Hosts Tom Walker, James Vincent, and Scott Fletcher bring on a special guest, Natalie Haslam, an industry veteran with 25 years of project management experience within traditional IT, application development, and more recently, cybersecurity.
Natalie’s reflection on the challenges of delivering cyber projects in the ...

What in the Cloud?
DevSecOops podcast hosts Tom Walker, James Vincent, and Scott Fletcher debate which cloud platform reigns supreme. Choosing between major cloud providers can get overwhelming. The three Co-Hosts set aside their usual neutrality to champion AWS (Amazon Web Services), Microsoft Azure, and Oracle Cloud Infrastructure (OCI), diving deep into what each ...
How Analysing 700,000 Security Incidents Helped Our Understanding of Living off the Land Tactics
This article shares initial findings from internal Bitdefender Labs research into Living off the Land (LOTL) techniques. Our team at Bitdefender Labs, comprised of hundreds of security researchers with close ties to academia, conducted this analysis as foundational research during the development of our GravityZone Proactive Hardening and Attack ...

Postmortem: Australian Retailer, the Iconic Incident Review
In 2024, a sophisticated credential stuffing attack targeted The Iconic, a leading Australian online fashion retailer. This breach compromised customer accounts, raising serious concerns about cybersecurity measures within the retail industry. Affected individuals faced unauthorized transactions and potential data exposure. The Iconic has initiated a ...

What Makes You Board Ready?
Discover why serving on a corporate board might be more than just a career milestone. Dr. Keith Dorsey challenges conventional thinking, urging reflection and strategic planning. Learn what boards now seek: unique skills and genuine purpose. Are you ready to add real value?
No results found.
In the News
AI-First Businesses Are Paying an “AI Speed Tax” When Recovering From Cybersecurity Incidents, According to Fastly’s Global Security Research Report
Fast moving AI adopters are paying the price with 100 day longer recovery times, higher breach costs and expanding attack surfaces
SYDNEY/AUCKLAND – 26 February, 2026 – Fastly, Inc. (NASDAQ: FSLY), a leader in global edge cloud platforms, today published the Australian and New Zealand findings from its fourth annual Global Security Research Report. ...
xReality Group Limited (ASX: XRG) Interim Financial Report for the Half Year Ended 31 December 2025
XRG delivered its strongest half-year performance to date, with total revenue exceeding $10.4 million, representing 41% growth on the prior corresponding period, and EBITDA of $2.6 million, up 190%. This performance was driven by strong momentum in Operator XR, which continues to scale as the Group’s primary growth engine.
Operations Summary:
...
VAST Data Unveils a Platform for Secure, Trusted, and Self-Learning Agentic AI Systems
VAST Data has announced the VAST Data PolicyEngine and VAST Data TuningEngine, two new computing services that will allow the next generation of the VAST AI Operating System to deliver key requirements for organisations looking to scale their mission-critical AI initiatives.
Specifically, PolicyEngine and TuningEngine work in tandem within the VAST ...
DroneShield Secures $21.7M Western Military Contracts
DroneShield Limited (ASX:DRO) has announced that it has received a package of six standalone contracts for $21.7 million from an in-country reseller for delivery to a western military end-customer.
The contracts are for the supply of dismounted counter-drone systems, spare kits, and software subscriptions. All items ae readily available from ...
VAST Data Introduces End-to-End Fully Accelerated AI Data Stack With NVIDIA
Today at VAST Forward 2026, VAST Data, the AI Operating System company, announced an end-to-end, fully CUDA accelerated AI data stack, delivered through an expanded collaboration with NVIDIA. With the VAST AI Operating System now running directly on NVIDIA-powered servers, customers can eliminate data bottlenecks across the AI pipeline and deliver ...
CIOs Accelerate AI-Driven Transformation Amid Rising Threat Complexity
New report finds just 20 per cent of CIOs feel highly effective at defending against AI-enabled adversaries
February 26, 2026 – LevelBlue, the world’s largest pure-play provider of managed security services, has released Persona Spotlight: CIO (Chief Information Officer), the latest report in its ongoing research examining how technology leaders ...
New Malicious Npm Package Highlights the Speed at Which Supply Chain Risks Propagate
Tenable Research investigated a malicious package in the npm public registry named “amber-src” that underscores the rapid nature of modern supply chain attacks. The package, which was downloaded approximately 50,000 times before its removal, was designed to mimic a popular package “ember-source”, to infect developers’ systems across Windows, macOS, and ...
WatchGuard Marks 30 Years of Setting the MSP Security Standard
Cybersecurity leader has helped MSPs reduce complexity, scale protection, and profitably grow through every market shift
SYDNEY – February 25, 2026 — WatchGuard® Technologies, a global leader in unified cybersecurity for managed service providers (MSPs), celebrates 30 years this month of helping MSPs protect businesses through every era of threat ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
