The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Australia’s 2025 Federal Budget: Is Cybersecurity Still a Priority?

Australia’s 2025 Federal Budget: Is Cybersecurity Still a Priority?

Treasurer Jim Chalmers' 2025 federal budget marks a significant departure from previous robust commitments to cybersecurity, sparking concerns about Australia's cyber resilience. With notable investments like REDSPICE and the 2023–2030 Cybersecurity Strategy now in the past, questions arise about maintaining momentum amid escalating cyber threats.
Overcoming the Social Media Fraud Challenge With Graph Databases

Overcoming the Social Media Fraud Challenge With Graph Databases

Every year, organisations and consumers alike lose billions of dollars to online scams. Busting fraud and protecting users is all about finding and investigating the connections between various online entities, and modern technologies are helping to do so. Operating like a master detective, graph technology is capable of mapping patterns and ...
Microsoft’s Platforms and Services Prioritise Security From Inception, Rather Than as an Afterthought

Microsoft’s Platforms and Services Prioritise Security From Inception, Rather Than as an Afterthought

Overview Microsoft’s long-standing Executive, Bret Arsenault, Corporate Vice President and Chief Cybersecurity advisor at Microsoft, detailed Microsoft’s Secure Future Initiative (SFI) - their strategic approach to addressing emerging cyber threats and managing secure software development. With decades of experience at Microsoft, what Arsenault ...
Why Cybercriminals Never Take a Day Off

Why Cybercriminals Never Take a Day Off

Cyber criminals don’t take days off. They hit when we’re taking some ‘down time’. Why? Because our guards are down and it’s a perfect time to strike. Gerry Sillars, Vice President of APJ at Semperis discusses the relentless nature of cyber threats and the realities of ransomware attacks, as revealed in Semperis' latest holiday risk report.“Think ...
Securing Society: Cyber-Physical Safety in Australia’s Critical Infrastructure

Securing Society: Cyber-Physical Safety in Australia’s Critical Infrastructure

Why Cyber-Physical Security Must Be a Leadership Priority   Australia’s critical infrastructure faces escalating cyber-physical threats, with adversaries targeting industrial control systems, operational technology (OT) and critical medical services. Security failures in these environments don’t just disrupt operations; they pose real risks to ...
Are Defenders Prepped for the Next Cyber Chapter?

Are Defenders Prepped for the Next Cyber Chapter?

Securing AI isn’t just about defending against cyber threats - it’s about establishing governance frameworks that ensure AI is used responsibly. With AI adoption accelerating, organisations are needing to align leadership, compliance teams, and IT security to manage risks without stifling innovation. Janice Le, General Manager of Microsoft Security, ...
Zero Trust – the Secret Sauce Behind Breach Readiness

Zero Trust – the Secret Sauce Behind Breach Readiness

Discover how ColorTokens' integrated Zero Trust solution enhances security by unifying Identity Governance, Microsegmentation, and Software-Defined Perimeters.
Cooperate or Collapse: The Prisoner’s Dilemma in Cybersecurity Strategy

Cooperate or Collapse: The Prisoner’s Dilemma in Cybersecurity Strategy

Introduction In the interconnected world of cybersecurity, organisations, nations, and individuals constantly confront strategic decisions regarding resource allocation, information sharing, and defence against cyber threats. One of the most compelling frameworks for analysing these challenges is the Prisoner’s Dilemma, a foundational game theory ...
No results found.

In the News

New Global CDO Report Shows That Closing Skills and Data Governance Gaps Is Critical to Australia’s AI Success

New Global CDO Report Shows That Closing Skills and Data Governance Gaps Is Critical to Australia’s AI Success

Informatica from Salesforce, a leader in AI-powered cloud data management, has published a new global study revealing that while Australian organisations are rapidly accelerating their use of AI, many lack the data skills, governance frameworks and infrastructure needed to support responsible and scalable AI.   The study, which surveyed 600 global ...
Check Point Software’s 2026 Cyber Security Report Shows Global Attacks Reach Record Levels as AI Accelerates the Threat Landscape

Check Point Software’s 2026 Cyber Security Report Shows Global Attacks Reach Record Levels as AI Accelerates the Threat Landscape

Organisations face nearly 2,000 cyber attacks per week as attackers combine automation, AI, and social engineering across multiple channels
Mesh Security Raises $12 Million Series a to Power Autonomous Execution for Cybersecurity Mesh at Enterprise Scale

Mesh Security Raises $12 Million Series a to Power Autonomous Execution for Cybersecurity Mesh at Enterprise Scale

PALO ALTO, Calif., Jan. 28, 2026 -- Mesh Security, the company delivering the world's first Cybersecurity Mesh Architecture (CSMA) platform, today announced a $12 million Series A funding round led by Lobby Capital, with participation from S Ventures (SentinelOne CVC), and Bright Pixel Capital. Mesh provides the execution layer for modern security ...
Fortinet Expands FortiCNAPP Cloud Risk Management With Network, Data, and Unified Risk Context

Fortinet Expands FortiCNAPP Cloud Risk Management With Network, Data, and Unified Risk Context

New enhancements integrate network security posture, native data security posture management, and runtime validation to help security teams prioritise real-world cloud risk 
Silvus Technologies Unveils StreamCaster MINI 5200 Tactical MANET Radio

Silvus Technologies Unveils StreamCaster MINI 5200 Tactical MANET Radio

Silvus Technologies, a Motorola Solutions company and a global leader in advanced tactical wireless communications, today announced the StreamCaster® MINI 5200 (SM5200). It is Silvus’ smallest, fully featured mobile ad hoc network (MANET) radio, designed to equip ground forces with next-generation mesh networking to securely share voice, video, and ...
DigiCert Named a Leader in IDC MarketScape for Worldwide Certificate Lifecycle Management 2026 

DigiCert Named a Leader in IDC MarketScape for Worldwide Certificate Lifecycle Management 2026 

Sydney, AUSTRALIA -- January 28, 2026 — DigiCert, a global leader in intelligent trust, today announced that the company has been named a Leader in the IDC MarketScape: Worldwide Certificate Lifecycle Management (CLM) Vendor Assessment (doc #US52990725, January 2026).  The recognition highlights DigiCert’s leadership in helping organisations ...
Achieving Remote Code Execution on N8n via Sandbox Escape – CVE-2026-1470 &Amp; CVE-2026-0863

Achieving Remote Code Execution on N8n via Sandbox Escape – CVE-2026-1470 &Amp; CVE-2026-0863

The JFrog Security Research team recently discovered and disclosed two vulnerabilities in n8n’s sandbox mechanism: CVE-2026-1470, rated 9.9 Critical, impacting the expression evaluation engine, and CVE-2026-0863, rated 8.5 High, affecting Python execution in the Code node (“Internal” mode). n8n is a popular AI workflow automation platform that ...
Tenable Extends Exposure Management to AI Attack Surface

Tenable Extends Exposure Management to AI Attack Surface

Tenable One unifies AI discovery, protection and governance within a single exposure management platform
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This