The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Oracle Cloud – the Late Bloomer

Oracle Cloud – the Late Bloomer

For years, the tech behemoth Oracle stood in the shadows of cloud giants like Amazon and Microsoft. But now, with their second-gen Oracle Cloud Infrastructure (OCI), Oracle is rewriting the cloud playbook. Oracle is far more than just the database company as most people would have memories of.Mahesh Thiagarajan, Executive Vice President of OCI, whose ...
The Invisible Siege on Our Supply Chain

The Invisible Siege on Our Supply Chain

Daniel Churches, Sales Director at ColorTokens, a captain in breach readiness and containment, lifts the veil on the precarious state of cybersecurity today. "When I say breach readiness, I speak from a place of inevitability," Churches states. The reality is that breaches aren’t just possible; they’re practically guaranteed. "A breach is likely ...
Identity Platforms Are No Longer Just a Backend Issue

Identity Platforms Are No Longer Just a Backend Issue

Businesses are perpetually cornered, navigating cybersecurity threats and trying to keep their head above water with their never ending laundry list of security to-do’s. Simon Hodgkinson, Advisor from Semperis and former Chief Information Security Officer (CISO) at one of the world's largest oil companies, opened up about his experience towards ...
The Art of Mastering Cyber Risk: From Spreadsheets to Strategic Resilience in Critical Infrastructure

The Art of Mastering Cyber Risk: From Spreadsheets to Strategic Resilience in Critical Infrastructure

Critical Infrastructure leaders must move beyond compliance to integrated cyber risk management to protect services and build resilience.
Cybersecurity’s Evolution and the Shift Toward Secure-By-Design Principles

Cybersecurity’s Evolution and the Shift Toward Secure-By-Design Principles

To achieve a high level of cybersecurity maturity, organisations must move beyond reliance on security tools and AppSec experts, embracing a culture of security at all levels. Effective Secure-by-Design adoption depends on building a security-conscious workforce through structured, ongoing education and incentives that encourage developers to take ...
Navigating the Identity Security Maze: Critical Challenges for Australian Financial Services in 2025

Navigating the Identity Security Maze: Critical Challenges for Australian Financial Services in 2025

Australia's digital payments sector is booming, but many financial institutions, particularly smaller ones, face significant challenges due to outdated identity security systems. These challenges are compounded by increasing cyberattacks, stringent regulatory pressures, inefficient manual processes, and the growing complexity of machine identities. In ...
Cyber Resilience in Focus: Five Areas Every Board Must Prioritise

Cyber Resilience in Focus: Five Areas Every Board Must Prioritise

Boards need a robust risk management program and have to foster a cyber-aware culture throughout the organisation starting from the very top to help drive cyber maturity.
The Persistent Challenge: Cybersecurity in the Era of Hybrid Work

The Persistent Challenge: Cybersecurity in the Era of Hybrid Work

As businesses balance between office returns and remote work, cybersecurity challenges remain a critical concern for IT managers. Strategies to secure remote workforces against evolving threats like phishing, credential theft, and ransomware remain difficult, but essential.
No results found.

In the News

Five Enterprise Security Predictions for 2026 for Australia’s Most Critical Services

Five Enterprise Security Predictions for 2026 for Australia’s Most Critical Services

Weaponised AI and the cyber arms race
Ping Identity Advances Universal Services to Redefine Trust in the Age of AI-Driven Fraud

Ping Identity Advances Universal Services to Redefine Trust in the Age of AI-Driven Fraud

A new model for continuous, verified trust across every identity, every interaction, and every environment
Lenovo Releases New AI Inferencing Servers

Lenovo Releases New AI Inferencing Servers

Lenovo announced a suite of purpose-built enterprise servers, solutions and services for AI inferencing workloads expanding the Lenovo Hybrid AI Advantage portfolio. Setting the stage for the next era of AI, Lenovo is advancing the field of inferencing and eliminating hurdles to power real-world AI use cases ranging from storefront customer ...
Australia’s Critical Infrastructure Unprepared for Emerging Drone Cyber Threats Warns University of Canberra Report

Australia’s Critical Infrastructure Unprepared for Emerging Drone Cyber Threats Warns University of Canberra Report

As drone technology becomes both more sophisticated and accessible across the country, researchers from Innovation Central Canberra (ICC) at the University of Canberra have teamed up with Australian tech company DroneShield to understand the risk profile of cyber-attacks to critical infrastructure. With the rapid expansion of drone tech reshaping ...
Rubrik Supports Companies to Take Control of Their Data

Rubrik Supports Companies to Take Control of Their Data

Global enterprises and governments gain jurisdictional control and advanced data protection without compromising data sovereignty
Nozomi Networks Unleashes Vantage IQ: The World’s First Private OT/IoT Cybersecurity Assistant

Nozomi Networks Unleashes Vantage IQ: The World’s First Private OT/IoT Cybersecurity Assistant

Nozomi Networks, the leader in OT, IoT, and CPS security, today announced the all-new Vantage IQ™ – the world’s first private, company-trained AI assistant for OT/IoT security teams. Cyberattacks on critical infrastructure have reached historic highs and the shortage of skilled OT/IoT defenders has become a crisis for strong protection. ...
Jan 2026 Patch Tuesday Comment From Tenable

Jan 2026 Patch Tuesday Comment From Tenable

Microsoft patched 113 CVEs in its January 2026 Patch Tuesday release, with eight rated critical and 105 rated as important. Our counts omitted one CVE that was assigned by MITRE, CVE-2023-31096. Elevation of privilege (EoP) vulnerabilities accounted for 49.6% of the vulnerabilities patched this month, followed by remote code execution (RCE) ...
Delinea and StrongDM to Unite to Redefine Identity Security for the Agentic AI Era

Delinea and StrongDM to Unite to Redefine Identity Security for the Agentic AI Era

Strategic acquisition to unify PAM and just-in-time runtime authorisation for administrators, developers, non-human identities, and AI agents in a single platform 
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This