The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Oracle is More Than Just a Database Company That Everyone Remembers, says Regional Managing Director
I headed over to my almost second home Las Vegas in the United States - where I was at the coalface at the Oracle CloudWorld Event hosted at the Venetian. I, like others, have traditionally known Oracle as the database company - despite OCI generating a foothold in the market. Stephen Bovis, Regional Managing Director of Oracle Australia, New Zealand, ...

Taking a Zero Trust Approach to Managing IoT in Manufacturing
As the manufacturing industry increasingly embraces the Internet of Things (IoT), the imperative for robust cybersecurity has never been more urgent.

Vital Signs: Why Monitoring High Tech Systems And Data Is Critical For Australian Healthcare Providers
World Patient Safety Day is a timely reminder of the threat hackers and cyber-criminals pose to the country’s most vulnerable.

What you missed at TechLeaders 2024
I recently headed down to TechLeaders, which was hosted at Kirkton Park in the Hunter Valley.
TechLeaders Australia is dedicated to the Australian technology industry. It serves as a platform for professionals, businesses, and organisations to connect, collaborate, and stay informed about the latest trends and developments in the tech sector. This ...

How AI is Helping to Strengthen Corporate Cybersecurity
As AI continues to permeate an increasing portion of daily business life, the need for robust cybersecurity measures has become vital.

Acting With Intent With AI
The need for intention
Jim Carrey said, “Not one single thing has ever been accomplished without intention”.
When we intentionally set out to do something we plan to fulfil a motive, purpose, or objective as a result. There is a meaning behind the action; a sense of achieving some sort of progress after it’s done.
Modern artificial intelligence ...

Opening Up Cloud Architecture For Safer Security Infrastructure
The evolution of the humble security camera into a cloud-connected multifunction safety device we see used today has come with a plethora of new capabilities and opportunities for security practitioners. Yet with internet-connected devices come risks. Let's explore why open-source architectures are, in fact, more secure while offering greater ...

Sports Venues Must Vet Their Vendors To Maintain Security
High-profile sporting events over the last few months have presented a number of cybersecurity challenges. Sporting events generate a lot of consumer activity, from hotels and restaurants to retail. Large sporting events are held together by webs of connectivity that include vendors, sponsors, employees, and consumers. These networks connect ticketing, ...
No results found.
In The News
Over 90% of Australian Businesses Embrace Agentic AI as Enterprise Automation Accelerates
A new IDC InfoBrief, “Agentic Automation: Unlocking Seamless Orchestration for the Modern Enterprise”, sponsored by UiPath (NYSE: PATH), a global leader in agentic automation, has revealed 41% of Australian organisations are already using agentic AI and another 50% are planning to use it in the next six months.
CyberArk Recognised as a Leader for Privileged Identity Management in Independent Analyst Report
Recognition Cites CyberArk’s Innovation Focus, Platform Capabilities and Bold Vision
Dynatrace Named a Leader and an Outperformer in 2025 GigaOm Radar Report for Kubernetes Observability
Company positioned closest to the centre of the Radar, underscoring its ability to help customers understand their dynamic cloud environments beyond the capacity of competitive solutions
Australian Cybersecurity Leader Jamie Norton Appointed Vice Chair of ISACA Global Board
ISACA, the global professional association supporting digital trust professionals, has announced the appointment of Australian cybersecurity expert Jamie Norton as Vice Chair of its 2025–2026 Board of Directors.
Norton, currently Chief Information Security Officer (CISO) for the Australian Securities and Investments Commission (ASIC), steps into the ...
Fortinet expands FortiCloud with identity, secure storage, and communication services to power the modern enterprise
New services enhance identity management, secure file storage and recovery, and communication, advancing the Fortinet Security Fabric and global cloud network vision
Trend Micro’s Zero Day Initiative Celebrates 20 Years of Industry Leadership
Bug bounty program incentivises security research to make customers and industry safer
Elastic Announces Elastic AI SOC Engine for Exposing Complex, Hidden Threats
Elastic AI SOC Engine (EASE) reduces alert fatigue and investigation time by integrating context-aware AI with existing SIEM and EDR tools
43% of Australian Ransomware Victims Threatened with Physical Harm – New Semperis Report
Study shows many companies paid multiple ransoms in the past 12 months. Victims also report that hackers have threatened to physically harm executives and file regulatory complaints against their companies.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
