The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Generative AI: Striking a Balance Between Innovation and Overreliance

Generative AI: Striking a Balance Between Innovation and Overreliance

The threats posed by AI are distinct in many ways from those that target user identity, software code, or business data. While traditional cybersecurity risks often focus on protecting specific assets, AI introduces new challenges - such as hallucinations, deepfakes, and ethical concerns - that can impact decision-making and public trust. The key for ...
Bridging AI Readiness in Australia

Bridging AI Readiness in Australia

With AI reshaping industries at unprecedented rates, findings from the 2024 CISCO Live Report suggest Australian companies are trailing, with only four percent ready to leverage the technology, a decline from the previous year. Here's how we bridge the gap to AI readiness for Australian companies.
Private Satellites, Public Dangers: Be Alarmed!

Private Satellites, Public Dangers: Be Alarmed!

Introduction Can governments and large businesses rely on private Starlink-type networks? In pursuing global connectivity and broader reach, many may overlook the risks associated with private satellite networks. The emergence of private satellite internet networks, led by Starlink and its expanding roster of competitors, has sparked debate about ...
How to Foster an Inclusive and Empowering Workplace This International Women’s Day 2025

How to Foster an Inclusive and Empowering Workplace This International Women’s Day 2025

Ruma Balasubramanian at Check Point Software Technologies provides advice on fostering an inclusive workplace this International Women's Day 2025.
Compliance in Healthcare Is Not a Security Strategy

Compliance in Healthcare Is Not a Security Strategy

Australia’s healthcare sector is failing at cybersecurity. The latest MediSecure breach, compromising the data of 12.9 million Australians, isn’t an isolated incident—it’s a symptom of a much larger, systemic problem. The industry’s outdated, compliance-driven approach to security is not working. Without a fundamental shift towards data-centric ...
A Supercharged Security Culture Is Needed to Navigate Australia’s Cybersecurity Rules

A Supercharged Security Culture Is Needed to Navigate Australia’s Cybersecurity Rules

By focusing on an organisation-wide security culture, CISOs can best prepare to meet burgeoning security requirements. Being able to prove the effectiveness of their program with easy-to-understand scoring is also invaluable in maintaining trust, ongoing budget and funding.
The Feminine Firewall: Securing Cyberspace With Heart and Smarts

The Feminine Firewall: Securing Cyberspace With Heart and Smarts

Introduction Diversity is the art of thinking independently together. In ancient times, women played vital roles far beyond their local communities. From the powerful priestesses of Delphi in ancient Greece to strong leaders like Hatshepsut in Egypt, women were not just keepers of cultural heritage but also catalysts for meaningful change. Their ...
CISOs and the C-Suite: The Start of a Beautiful Relationship?

CISOs and the C-Suite: The Start of a Beautiful Relationship?

Introduction Cyber incidents are no longer distant threats, and the scale of challenge is clear - 94% of organisations globally have experienced a disruptive cyberattack, with more than half facing multiple incidents. In the past year alone, data breaches at major corporations and government agencies in Australia have dominated headlines, forcing ...
No results found.

In the News

Palo Alto Networks Unit 42 Releases Global Incident Response Report 2026

Palo Alto Networks Unit 42 Releases Global Incident Response Report 2026

AI-Driven Attacks, Identity Abuse and Supply Chain Exploitation Reshape the Cyber Threat Landscape
Arctic Wolf Threat Report Highlights 11x Growth in Data Extortion Incidents and Continued Dominance of Ransomware

Arctic Wolf Threat Report Highlights 11x Growth in Data Extortion Incidents and Continued Dominance of Ransomware

New insights reveal the pivot to data-only extortion, attacker abuse of remote access tools, and how early detection is reshaping ransomware outcomes
New Report Finds APAC Enterprises Facing Agentic AI Technical Challeneges

New Report Finds APAC Enterprises Facing Agentic AI Technical Challeneges

Sydney, 18 February 2026 - Dynatrace, the leading AI-powered observability platform, has today released the regional findings of The Pulse of Agentic AI 2026. The inaugural survey of 919 senior global leaders responsible for agentic AI implementation reveals that enterprises are not stalling because they doubt AI, but because they cannot yet ...
Check Point Software Earns Leader & Fast Mover Position in GigaOm Radar for Cloud Network Security

Check Point Software Earns Leader & Fast Mover Position in GigaOm Radar for Cloud Network Security

Analyst firm highlights Check Point’s prevention‑first architecture, strong ecosystem integrations, unified cloud security platform, and continued pace of innovation REDWOOD CITY, CA. February 17, 2026 -- Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced that it has been ...
LummaStealer Is Back at Scale as Fake CAPTCHA Campaigns Drive Global Resurgence

LummaStealer Is Back at Scale as Fake CAPTCHA Campaigns Drive Global Resurgence

Bitdefender researchers have identified a significant resurgence of one of the world’s most prolific information-stealing malware operations, less than a year after a major global law enforcement action disrupted more than 2,300 of its command-and-control domains. Despite the 2025 takedown effort, LummaStealer was not dismantled. Instead, the ...
Macquarie Tech Appoints Kate Vidgen as Independent Non-Executive Director

Macquarie Tech Appoints Kate Vidgen as Independent Non-Executive Director

Macquarie Technology Group (ASX: MAQ) has announced Kate Vidgen will join the Company’s board as an Independent Non-executive Director following the release of the Company’s FY26 half-year results. Kate will bring more than 30 years’ experience to the company as a senior finance executive and non-executive director with a demonstrated history of ...
Kyndryl Unveils Agentic AI Workflow Governance for Trusted Deployment of Mission‑Critical AI Agents

Kyndryl Unveils Agentic AI Workflow Governance for Trusted Deployment of Mission‑Critical AI Agents

Policy as code capability transforms compliance in regulated agentic AI workflows | Automated policy enforcement establishes guardrails, codifies compliance and boosts transparency across enterprise operations
Palo Alto Networks Completes Acquisition of CyberArk to Secure the AI Era

Palo Alto Networks Completes Acquisition of CyberArk to Secure the AI Era

Adds the leading platform that delivers unified security for human, machine and agentic identity.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This