The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Cybersecurity’s Evolution And The Shift Toward Secure-By-Design Principles

Cybersecurity’s Evolution And The Shift Toward Secure-By-Design Principles

To achieve a high level of cybersecurity maturity, organisations must move beyond reliance on security tools and AppSec experts, embracing a culture of security at all levels. Effective Secure-by-Design adoption depends on building a security-conscious workforce through structured, ongoing education and incentives that encourage developers to take ...
Navigating The Identity Security Maze: Critical Challenges For Australian Financial Services In 2025

Navigating The Identity Security Maze: Critical Challenges For Australian Financial Services In 2025

Australia's digital payments sector is booming, but many financial institutions, particularly smaller ones, face significant challenges due to outdated identity security systems. These challenges are compounded by increasing cyberattacks, stringent regulatory pressures, inefficient manual processes, and the growing complexity of machine identities. In ...
Cyber Resilience In Focus: Five Areas Every Board Must Prioritise

Cyber Resilience In Focus: Five Areas Every Board Must Prioritise

Boards need a robust risk management program and have to foster a cyber-aware culture throughout the organisation starting from the very top to help drive cyber maturity.
The Persistent Challenge: Cybersecurity in the Era of Hybrid Work

The Persistent Challenge: Cybersecurity in the Era of Hybrid Work

As businesses balance between office returns and remote work, cybersecurity challenges remain a critical concern for IT managers. Strategies to secure remote workforces against evolving threats like phishing, credential theft, and ransomware remain difficult, but essential.
The Invisible Battlefield: The “Grey Zone” Warfare Threatening Global Stability

The Invisible Battlefield: The “Grey Zone” Warfare Threatening Global Stability

Recently, KBI.Media was included in the AUKUS Advanced Technology Dialogue here in Australia across Sydney and Canberra. Some of the dialogue is not allowed to be publicised, but some which can be shared premiered on podcast, KBKast. Former Deputy Director for Mission Integration at ODNI, Beth Sanner, made clear on an alarming but largely unseen ...
2025 Cybersecurity Predictions By Qualys

2025 Cybersecurity Predictions By Qualys

Richard Seiersen, Chief Risk Tech Officer at Qualys shares six key predictions for the cybersecurity industry in 2025.
2025 Cybersecurity Predictions by CyberArk

2025 Cybersecurity Predictions by CyberArk

The cybersecurity landscape is poised for transformative shifts in 2025 driven by technological innovation and evolving threats. As cybercriminals become more sophisticated, organisations must stay ahead by proactively adopting strategies that prioritise identity security and business resiliency. Thomas Fikentscher, CyberArk’s Area Vice President for ...
How Breach Readiness Will Shape Cyber Defense In 2025

How Breach Readiness Will Shape Cyber Defense In 2025

Rajesh Khazanchi, co-founder and CEO of ColorTokens, writes how breach ready strategies and AI-powered cyber defense can drive cyber resilience and protect your business.
No results found.

In The News

Genetec Brings Audio Communications To Security Center SaaS

Genetec Brings Audio Communications To Security Center SaaS

New feature integrates intercom support and SIP-based audio into unified platform to accelerate incident response and enhance situational awareness.  
Tenable Analysis – Cisco Zero-day Vulnerabilities

Tenable Analysis – Cisco Zero-day Vulnerabilities

Cisco published advisories and a supplemental post about three zero-day vulnerabilities, two of which were exploited in the wild by an advanced threat actor associated with the ArcaneDoor campaign. The two flaws, CVE-2025-20333 and CVE-2025-20362, when combined or “chained” together, would give an attacker full control over the vulnerable ...
Camelot Secure and DigiFlight Named Finalists in Three Categories within Maryland’s Cybersecurity Association 2025 Cybersecurity Awards

Camelot Secure and DigiFlight Named Finalists in Three Categories within Maryland’s Cybersecurity Association 2025 Cybersecurity Awards

The recognition reflects Camelot Secure’s groundbreaking work advancing its Secure360 platform, which unifies cyber and physical security to meet the growing convergence challenge. Secure360 integrates AI, machine learning, and advanced threat intelligence to provide a proactive, holistic defense—helping enterprises and government clients protect ...
Darktrace Unveils Automated Forensics Capabilities in its ActiveAI Security Platform™ to Advance Hybrid and Multi-Cloud Security 

Darktrace Unveils Automated Forensics Capabilities in its ActiveAI Security Platform™ to Advance Hybrid and Multi-Cloud Security 

Launch of Darktrace / Forensic Acquisition & Investigation™, the industry’s first truly automated cloud forensics solution, can cut investigation times from days to minutes   The launch comes amid a widening cloud security gap, with nearly 90% of surveyed organisations across the US and UK reporting that they suffered damage before they could contain ...
Proofpoint Secures Collaboration and Data in the Agentic Workspace with Industry-First Innovations

Proofpoint Secures Collaboration and Data in the Agentic Workspace with Industry-First Innovations

New solutions, including AI tools and intelligent agents, enable organizations to embrace the promise of AI while mitigating unprecedented risks
Cisco Announces Splunk and Australian Signals Directorate Joining Forces to Strengthen Australia’s Cyber Threat Intelligence Sharing

Cisco Announces Splunk and Australian Signals Directorate Joining Forces to Strengthen Australia’s Cyber Threat Intelligence Sharing

SYDNEY – September 25, 2025 – Today Cisco, the worldwide leader in networking and security, announced that Splunk has partnered with the Australian Signals Directorate (ASD) to deliver a new plug-in that integrates Splunk Enterprise Security with ASD’s Cyber Threat Intelligence Sharing (CTIS) platform. This integration allows Splunk customers who are ...
ShadowLeak and the Internet of Agents: The Next Frontier in AI Exploits 

ShadowLeak and the Internet of Agents: The Next Frontier in AI Exploits 

The September 2025 disclosure of ShadowLeak by Radware marks a turning point in the way the security community must think about artificial intelligence. This was not just another prompt injection. It was the first service-side, zero-click indirect prompt injection (IPI) against a widely deployed AI system—OpenAI’s ChatGPT. More importantly, it ...
Lenovo Launches New IT Infrastructure Solutions to Help Australian SMBs Scale

Lenovo Launches New IT Infrastructure Solutions to Help Australian SMBs Scale

Lenovo announced new IT infrastructure solutions tailored to help small and medium businesses (SMBs) easily deploy, scale and leverage modern IT in the era of AI. The solutions are designed to accelerate growth and innovation from day one with pre-tested and validated bundles of servers, software and consumption-based pricing options that help growing ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This