The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why Is Energy Monitoring Technology so Important for Achieving Sustainability Goals?

Why Is Energy Monitoring Technology so Important for Achieving Sustainability Goals?

While many organisations are setting ambitious goals (planning for decarbonisation, cleaner electrification or other reductions in emissions) they are failing to implement the tech to make them a reality.
Janice Le – GM, Microsoft Security, Compliance, Identity & Privacy

Janice Le – GM, Microsoft Security, Compliance, Identity & Privacy

Watch the Interview  Biography Janice is GM, Microsoft Security Compliance, Identity & Privacy at Microsoft where she oversees strategy, operations, and portfolio marketing for Microsoft Security. She has served the tech industry in Silicon Valley over the last 20+ years at enterprises and startups in product, marketing, and GM roles for ...
The End of Pentest Reporting Chaos: OWASP Standardises the Industry

The End of Pentest Reporting Chaos: OWASP Standardises the Industry

For years, penetration testing reports have been inconsistent, manual, and difficult to integrate into modern security workflows. Every provider has its own format, slowing down remediation and making automation nearly impossible. The OWASP Penetration Test Reporting Standard (OPTRS) is designed to fix this. It provides a structured, machine-readable ...
2024 Lessons Shaping 2025 Cybersecurity Trends

2024 Lessons Shaping 2025 Cybersecurity Trends

Discover key lessons from 2024 cyberattacks and how they’ll shape 2025 cybersecurity trends. Learn to build resilience with breach ready defenses.
Navigating and Combatting Scams in Banking

Navigating and Combatting Scams in Banking

By adopting a comprehensive cybersecurity strategy that integrates multiple data sources and streams and enhances the digital experience, banks can significantly bolster their defences and protect their customers.
The Two Forces Reshaping Our Cyber Defences for the Better

The Two Forces Reshaping Our Cyber Defences for the Better

Introduction It’s very hard to catch a ball in flight without being able to make real-time calculations based on a continuous and uninterrupted stream of information from your eyes to your brain. The same can be said for cyber security. It’s tough to catch threats in play without truly real-time data. The need for real-time data and data processing ...
Understanding the Risks Associated With ‘Shadow AI’ in Software Development

Understanding the Risks Associated With ‘Shadow AI’ in Software Development

There are ways for CISOs to bring AI-assisted coding out of the shadows, allowing staff to get the most out of productivity benefits while avoiding vulnerabilities. This can be done by embracing it – as opposed to blanket suppression – and pursuing a three-point plan to establish reasonable guardrails and raise security awareness capabilities among ...
Six Trends Shaping the Future of the Security Industry in 2025

Six Trends Shaping the Future of the Security Industry in 2025

In 2025, security will be transformed by hybrid architectures, advanced AI, and high-resolution imaging, enabling smarter, more flexible systems. Security technologies will deliver business intelligence, while software-driven solutions and core technology ownership ensure resilience, efficiency, and innovation.
No results found.

In the News

Australia’s Critical Infrastructure Unprepared for Emerging Drone Cyber Threats Warns University of Canberra Report

Australia’s Critical Infrastructure Unprepared for Emerging Drone Cyber Threats Warns University of Canberra Report

As drone technology becomes both more sophisticated and accessible across the country, researchers from Innovation Central Canberra (ICC) at the University of Canberra have teamed up with Australian tech company DroneShield to understand the risk profile of cyber-attacks to critical infrastructure. With the rapid expansion of drone tech reshaping ...
Rubrik Supports Companies to Take Control of Their Data

Rubrik Supports Companies to Take Control of Their Data

Global enterprises and governments gain jurisdictional control and advanced data protection without compromising data sovereignty
Nozomi Networks Unleashes Vantage IQ: The World’s First Private OT/IoT Cybersecurity Assistant

Nozomi Networks Unleashes Vantage IQ: The World’s First Private OT/IoT Cybersecurity Assistant

Nozomi Networks, the leader in OT, IoT, and CPS security, today announced the all-new Vantage IQ™ – the world’s first private, company-trained AI assistant for OT/IoT security teams. Cyberattacks on critical infrastructure have reached historic highs and the shortage of skilled OT/IoT defenders has become a crisis for strong protection. ...
Jan 2026 Patch Tuesday Comment From Tenable

Jan 2026 Patch Tuesday Comment From Tenable

Microsoft patched 113 CVEs in its January 2026 Patch Tuesday release, with eight rated critical and 105 rated as important. Our counts omitted one CVE that was assigned by MITRE, CVE-2023-31096. Elevation of privilege (EoP) vulnerabilities accounted for 49.6% of the vulnerabilities patched this month, followed by remote code execution (RCE) ...
Delinea and StrongDM to Unite to Redefine Identity Security for the Agentic AI Era

Delinea and StrongDM to Unite to Redefine Identity Security for the Agentic AI Era

Strategic acquisition to unify PAM and just-in-time runtime authorisation for administrators, developers, non-human identities, and AI agents in a single platform 
DroneShield Selected for LAND 156 LoE 3 Panel

DroneShield Selected for LAND 156 LoE 3 Panel

DroneShield has been selected as a supplier for the Australian Department of Defence’s Project LAND 156’s Line of Effort 3, which supports the Defence’s strategy to address evolving threats posed by small drones in domestic security. The selection relates to Line of Effort 3, establishing a Counter-small Unmanned Aerial Systems (C-sUAS) Services ...
Microsoft and ACTU Sign Landmark Agreement to Put Workers’ Voices and Skilling at the Heart of Australia’s AI Transformation

Microsoft and ACTU Sign Landmark Agreement to Put Workers’ Voices and Skilling at the Heart of Australia’s AI Transformation

Microsoft Australia and the Australian Council of Trade Unions (ACTU) today announced a landmark Framework Agreement to prioritise skilling and elevate workers’ voices in the design, development and deployment of artificial intelligence (AI) across Australian workplaces. This Australian-first agreement outlines a set of commitments that recognise the ...
Threat Spotlight: The Number of Phishing Kits Doubled in 2025, Bringing stealth, innovation and the Same Old themes 

Threat Spotlight: The Number of Phishing Kits Doubled in 2025, Bringing stealth, innovation and the Same Old themes 

SYDNEY, Australia – 13 January 2026 – In 2025, the number of known phishing-as-a-service (PhaaS) kits doubled in number, increasing the pressure on security teams trying to defend against this ever-evolving threat, according to Barracuda’s phishing review of 2025. Aggressive newcomers such as Whisper 2FA and GhostFrame introduced inventive ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This