The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

From Gallipoli to the Digital Frontier: The ANZAC Spirit in Cybersecurity

From Gallipoli to the Digital Frontier: The ANZAC Spirit in Cybersecurity

Context As dawn breaks on ANZAC Day, Australians and New Zealanders pause to remember the sacrifices of the soldiers who stormed the beaches of Gallipoli in 1915. However, in a hyperconnected 21st-century world, the fight for national sovereignty has shifted from trenches and shores to servers and silicon. Today, a new generation of defenders stands ...
The Shadowy Threats Stalking Australia’s Ballot Box

The Shadowy Threats Stalking Australia’s Ballot Box

As Australia edges toward another election, a new and invisible threat stalks our democratic process, not from hackers in dark rooms, but from sophisticated, well-funded nation states wielding artificial intelligence. According to Ginny Badanes, General Manager of Democracy Forward at Microsoft, 2024 has seen democracy itself placed in the ...
How Adopting Maturity Models Can Improve Enterprise IT Security

How Adopting Maturity Models Can Improve Enterprise IT Security

Having developers well trained in security techniques is vital for the production of resilient code. Taking time to achieve this now can avoid significant disruption and losses in the future.
Why Web Application Firewalls Are a Critical Shield for Fintech Security

Why Web Application Firewalls Are a Critical Shield for Fintech Security

The implementation of AI-driven, cloud-native WAF solutions offers financial institutions a robust defence mechanism against cyber threats.
The Real Corporate Penetration Testing Process: How Companies Get Hacked Before the Hackers Do! 🚀

The Real Corporate Penetration Testing Process: How Companies Get Hacked Before the Hackers Do! 🚀

Hey guys, I’m sn0x — a cybersecurity researcher, bug hunter, and security enthusiast. I hold multiple certifications, including CNSP, EWPTXv2, CEH v11–12, GRC, RHCSA, and Cisco Cyber Threat Management. I’ve been ranked #1 in India and #2 globally on TryHackMe, secured #134 on Hack The Box in 2021, and even won HTB Battlegrounds twice. But hey, this ...
What in the DeepSeek?

What in the DeepSeek?

DeepSeek, the tool designed to exploit vulnerabilities in AI systems, raises significant concerns amongst the security industry, particularly OpenAI. The DeepSeek competitor discussed the potential for DeepSeek to undermine the security of AI applications, which could have far-reaching consequences for technology as we know it. Satnam Narang, Senior ...
AI First, Human Second: The New Cybersecurity Command Structure

AI First, Human Second: The New Cybersecurity Command Structure

"Man is the measure of all things." ― Protagora - pre-Socratic Greek philosopher It’s an ancient idea, yet it feels more relevant than ever as machines start making decisions that were once left to human minds. In today’s high-stakes cybersecurity landscape, artificial intelligence is no longer a future wager; it’s a frontline asset. AI systems detect ...
Data Management – It’s a High-stakes Game

Data Management – It’s a High-stakes Game

This article explores the security risks associated with poorly managed data, and details how regulations from OAIC and APRA are raising the stakes for both professionals and organisations alike.
No results found.

In the News

Sophos Expands Portfolio With Workspace Protection to Secure Hybrid Work and Govern Employee AI Use

Sophos Expands Portfolio With Workspace Protection to Secure Hybrid Work and Govern Employee AI Use

Sophos today announced Sophos Workspace Protection, expanding its portfolio to help organisations secure hybrid work and govern the use of emerging technologies, including AI. Built around the Sophos Protected Browser, powered by Island, the solution enables organisations to protect applications, data, users, and guests wherever work takes place, while ...
Five Enterprise Security Predictions for 2026 for Australia’s Most Critical Services

Five Enterprise Security Predictions for 2026 for Australia’s Most Critical Services

Weaponised AI and the cyber arms race
Ping Identity Advances Universal Services to Redefine Trust in the Age of AI-Driven Fraud

Ping Identity Advances Universal Services to Redefine Trust in the Age of AI-Driven Fraud

A new model for continuous, verified trust across every identity, every interaction, and every environment
Lenovo Releases New AI Inferencing Servers

Lenovo Releases New AI Inferencing Servers

Lenovo announced a suite of purpose-built enterprise servers, solutions and services for AI inferencing workloads expanding the Lenovo Hybrid AI Advantage portfolio. Setting the stage for the next era of AI, Lenovo is advancing the field of inferencing and eliminating hurdles to power real-world AI use cases ranging from storefront customer ...
Australia’s Critical Infrastructure Unprepared for Emerging Drone Cyber Threats Warns University of Canberra Report

Australia’s Critical Infrastructure Unprepared for Emerging Drone Cyber Threats Warns University of Canberra Report

As drone technology becomes both more sophisticated and accessible across the country, researchers from Innovation Central Canberra (ICC) at the University of Canberra have teamed up with Australian tech company DroneShield to understand the risk profile of cyber-attacks to critical infrastructure. With the rapid expansion of drone tech reshaping ...
Rubrik Supports Companies to Take Control of Their Data

Rubrik Supports Companies to Take Control of Their Data

Global enterprises and governments gain jurisdictional control and advanced data protection without compromising data sovereignty
Nozomi Networks Unleashes Vantage IQ: The World’s First Private OT/IoT Cybersecurity Assistant

Nozomi Networks Unleashes Vantage IQ: The World’s First Private OT/IoT Cybersecurity Assistant

Nozomi Networks, the leader in OT, IoT, and CPS security, today announced the all-new Vantage IQ™ – the world’s first private, company-trained AI assistant for OT/IoT security teams. Cyberattacks on critical infrastructure have reached historic highs and the shortage of skilled OT/IoT defenders has become a crisis for strong protection. ...
Jan 2026 Patch Tuesday Comment From Tenable

Jan 2026 Patch Tuesday Comment From Tenable

Microsoft patched 113 CVEs in its January 2026 Patch Tuesday release, with eight rated critical and 105 rated as important. Our counts omitted one CVE that was assigned by MITRE, CVE-2023-31096. Elevation of privilege (EoP) vulnerabilities accounted for 49.6% of the vulnerabilities patched this month, followed by remote code execution (RCE) ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This