The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Chris Lloyd-Jones – Head of Platforms and Incubation, Office of the CTO at Avanade
Watch the Interview
Biography
As a technology leader in Platforms & Incubation, Chris is focused on driving strategic growth, delivering impact at scale, and fostering innovation across the Microsoft ecosystem, from GitHub to ISVs. He is passionate about harnessing the power of Open Source, demonstrated through his leadership roles at OpenUK ...

Why Is Energy Monitoring Technology so Important for Achieving Sustainability Goals?
While many organisations are setting ambitious goals (planning for decarbonisation, cleaner electrification or other reductions in emissions) they are failing to implement the tech to make them a reality.

Janice Le – GM, Microsoft Security, Compliance, Identity & Privacy
Watch the Interview
Biography
Janice is GM, Microsoft Security Compliance, Identity & Privacy at Microsoft where she oversees strategy, operations, and portfolio marketing for Microsoft Security.
She has served the tech industry in Silicon Valley over the last 20+ years at enterprises and startups in product, marketing, and GM roles for ...

The End of Pentest Reporting Chaos: OWASP Standardises the Industry
For years, penetration testing reports have been inconsistent, manual, and difficult to integrate into modern security workflows. Every provider has its own format, slowing down remediation and making automation nearly impossible. The OWASP Penetration Test Reporting Standard (OPTRS) is designed to fix this. It provides a structured, machine-readable ...

2024 Lessons Shaping 2025 Cybersecurity Trends
Discover key lessons from 2024 cyberattacks and how they’ll shape 2025 cybersecurity trends. Learn to build resilience with breach ready defenses.

Navigating and Combatting Scams in Banking
By adopting a comprehensive cybersecurity strategy that integrates multiple data sources and streams and enhances the digital experience, banks can significantly bolster their defences and protect their customers.

The Two Forces Reshaping Our Cyber Defences for the Better
Introduction
It’s very hard to catch a ball in flight without being able to make real-time calculations based on a continuous and uninterrupted stream of information from your eyes to your brain. The same can be said for cyber security. It’s tough to catch threats in play without truly real-time data.
The need for real-time data and data processing ...

Understanding the Risks Associated With ‘Shadow AI’ in Software Development
There are ways for CISOs to bring AI-assisted coding out of the shadows, allowing staff to get the most out of productivity benefits while avoiding vulnerabilities. This can be done by embracing it – as opposed to blanket suppression – and pursuing a three-point plan to establish reasonable guardrails and raise security awareness capabilities among ...
No results found.
In the News
Logicalis Strengthens Technology Assurance Capability With Appointment of Luke Gardiner
Melbourne, Australia – 9 February, 2026: Logicalis Australia, a leading global technology services provider, has announced the appointment of Luke Gardiner as principal of its Technology Assurance Services (TAS) group, strengthening the company’s advisory capability for organisations operating in financial services and ...
Taoiseach Micheál Martin Opens Motorola Solutions’ New Global R&D Centre in Cork
Motorola Solutions has announced the opening of its Global Research and Development Centre in Cork, Ireland, focused on software design for its public safety land mobile radio (LMR) portfolio. The sophisticated software and applications developed at the centre help increase the safety and efficiency of first responders.
The company has hired nearly ...
Healthcare Organisations Prioritise Deployment Flexibility, AI, and Collaboration Amid Rising Security Incidents, Genetec Report Finds
2026 State of Physical Security Report highlights modernisation priorities across the healthcare sector
Semperis Acquires Identity Resilience Provider MightyID to Extend Identity Protection for Okta and Ping Multi-cloud Environments
Semperis acquires identity resilience provider MightyID to extend identity protection for Okta and Ping multi-cloud environments
Palo Alto Networks NextWave Program Accelerates Partner Profitability and AI-Driven Security Outcomes
Evolution shifts focus to "Platformisation," rewarding technical expertise and service-led growth
Tenable Research Uncovers Major Vulnerabilities in Google Looker
Tenable has discovered two major vulnerabilities in Google Looker that could potentially allow attackers to hijack entire systems.
Network Attacks Outpace Malware in Australia: WatchGuard Q4 2025 Threat Landscape
Australian businesses are now facing more network attacks than malware, according to WatchGuard Technologies’ Q4 2025 Threat Landscape. Between October and December, WatchGuard blocked 96,049 network attacks, compared to 8,510 malware attacks.
In contrast, the wider APAC region saw far more malware than network attacks, highlighting Australia’s ...
When Your Internet’s “GPS” Starts Lying: Infoblox Threat Intel Uncovers Actor Compromising Routers
New Infoblox Threat Intel research reveals how attackers quietly break into routers and redirect their DNS traffic to a shadow DNS network, silently steering users through a hidden web of malicious activity.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
- 353
- 354
- 355
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
