The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Unified Powerhouse: Cisco and Splunk Together

Unified Powerhouse: Cisco and Splunk Together

Tom Casey Senior Vice President, Products & Technology at Splunk recently presented at Cisco Live in Melbourne about the critical intersection of digital resilience, network assurance, and cloud observability during his keynote on the main stage. Highlighting Cisco's integration with Splunk, Casey laid out a comprehensive vision for the future ...
How Growing Australian Organisations Can Keep Their Physical Security On Lock

How Growing Australian Organisations Can Keep Their Physical Security On Lock

Businesses thrive on periods of sustained growth, but it’s important to have systems and security settings that can keep up with the requirements of an expanding physical and geographical footprint.
Claroty 2025 Cyber Security Predictions

Claroty 2025 Cyber Security Predictions

The use of cyberattacks in executing modern warfare, which is already happening, will enter public awareness A major cyberattack will be executed on critical infrastructure as part of a wartime scenario and this will enter mainstream news, as world leaders recognise the need to protect their domestic critical infrastructure from being attacked by an ...
AI Ethics: Developing AI models with intent, transparency and diversity

AI Ethics: Developing AI models with intent, transparency and diversity

As humans, we all walk through the world with a certain level of uncious bias. It makes sense then that anything we ‘invent’ is inherently riddled with this bias whether we think so or not. It’s no surprise that the development of AI has come with a laundry list of ethical concerns.
Yubico Enrollment Suite With Okta Now Available: An Inside Look At How Okta Became A Phishing-Resistant Enterprise

Yubico Enrollment Suite With Okta Now Available: An Inside Look At How Okta Became A Phishing-Resistant Enterprise

Phishing-resistant users build phishing-resistant enterprises. With the growing sophistication of cyber threats, enterprises that can efficiently raise the bar for security helps ensure protection of users and their data to effectively drive digital acceleration.
The Role of Data And AI In Cyber Defence

The Role of Data And AI In Cyber Defence

With cyber-attacks are becoming increasingly sophisticated and frequent, there’s a compelling need to better leverage Artificial Intelligence (AI) capabilities in cyber, from automating threat detection, analysing vast amounts of data for anomalies, and responding to potential breaches in real-time as well as providing a more effective response which ...
Taking A Borderless Approach To Cybersecurity Governance

Taking A Borderless Approach To Cybersecurity Governance

Robust cybersecurity has never been more important as cyberattacks continue to increase. In fact, according to the Australian Cyber Security Centre (ACSC), there were over 76,000 reported cyber incidents in 2022-2023, marking a rise in cyber activity across all sectors. With attacks becoming more frequent and sophisticated, there’s a compelling need ...
Why The First Stage Of Cyber Incident Response Is No Longer To Hit The Killswitch

Why The First Stage Of Cyber Incident Response Is No Longer To Hit The Killswitch

Containing an incident often means disconnecting whole environments, but technology is giving IR teams more optimal choices.
No results found.

In The News

Falcon for IT Risk-based Patching Accelerates Cybersecurity and IT Consolidation on CrowdStrike

Falcon for IT Risk-based Patching Accelerates Cybersecurity and IT Consolidation on CrowdStrike

AI-powered Risk-based Patching enables customers to identify, prioritize, and fix the vulnerabilities that matter most through a single unified platform
CrowdStrike Threat AI Leads Threat Intelligence into the Agentic Era

CrowdStrike Threat AI Leads Threat Intelligence into the Agentic Era

System of autonomous agents reason, hunt, and take decisive action across the kill chain, supercharging analyst investigations and threat response
Ping Identity Shapes the Future of Enterprise Security With AI-Driven Trust Framework

Ping Identity Shapes the Future of Enterprise Security With AI-Driven Trust Framework

Safeguards Autonomous Agents While Keeping Humans in Control 
DroneShield Surpasses 4,000 Systems Sold, $7.9m orders

DroneShield Surpasses 4,000 Systems Sold, $7.9m orders

ASX-listed DroneShield has announced it has surpassed 4,000 systems sold worldwide with the receipt of a package of two standalone contracts totalling A$7.9 million for handheld systems for delivery to the U.S. Department of Defense. DroneShield expects to deliver all equipment in Q4 2025, with cash payment expected in Q4 2025. No additional material ...
New Research Uncovers Large-Scale Malicious Ad Network, Illuminating Connection Between AdTech Platforms and Malicious Actors

New Research Uncovers Large-Scale Malicious Ad Network, Illuminating Connection Between AdTech Platforms and Malicious Actors

Sydney, Australia; September 17, 2025 - Infoblox Threat Intel has released groundbreaking reporting on “Vane Viper,” a threat actor masquerading as a legitimate adtech enterprise. This group is responsible for facilitating a variety of scams and malware distribution through their affiliate advertising programs but also are directly involved in malware ...
Oracle AI Agents Help HR Leaders Boost Workforce Productivity and Enhance Performance Management

Oracle AI Agents Help HR Leaders Boost Workforce Productivity and Enhance Performance Management

New AI agents embedded in Oracle Fusion Cloud Applications to help HR leaders automate workflows, deliver personalised career guidance, and improve talent management
ColorTokens Announces Integration with the CrowdStrike Falcon Platform

ColorTokens Announces Integration with the CrowdStrike Falcon Platform

SAN JOSE, Calif., September 11, 2025 — ColorTokens Inc., today announced the integration of its Xshield Enterprise Microsegmentation Platform™ with the CrowdStrike Falcon® platform. Now available on the CrowdStrike Marketplace, the integration enables customers to accelerate Zero Trust adoption by leveraging CrowdStrike Falcon Firewall Management to ...
ColorTokens Appoints Louis (Lou) Eichenbaum as Federal Chief Technology Officer

ColorTokens Appoints Louis (Lou) Eichenbaum as Federal Chief Technology Officer

Former U.S. Department of the Interior Chief Information Security Officer and Nationally Recognized Zero Trust Advocate to Advance Company’s Federal Cybersecurity Strategy.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This