The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Oracle Cloud – the Late Bloomer
For years, the tech behemoth Oracle stood in the shadows of cloud giants like Amazon and Microsoft. But now, with their second-gen Oracle Cloud Infrastructure (OCI), Oracle is rewriting the cloud playbook. Oracle is far more than just the database company as most people would have memories of.Mahesh Thiagarajan, Executive Vice President of OCI, whose ...

The Invisible Siege on Our Supply Chain
Daniel Churches, Sales Director at ColorTokens, a captain in breach readiness and containment, lifts the veil on the precarious state of cybersecurity today.
"When I say breach readiness, I speak from a place of inevitability," Churches states.
The reality is that breaches aren’t just possible; they’re practically guaranteed.
"A breach is likely ...

Identity Platforms Are No Longer Just a Backend Issue
Businesses are perpetually cornered, navigating cybersecurity threats and trying to keep their head above water with their never ending laundry list of security to-do’s. Simon Hodgkinson,
Advisor from Semperis and former Chief Information Security Officer (CISO) at one of the world's largest oil companies, opened up about his experience towards ...

The Art of Mastering Cyber Risk: From Spreadsheets to Strategic Resilience in Critical Infrastructure
Critical Infrastructure leaders must move beyond compliance to integrated cyber risk management to protect services and build resilience.

Cybersecurity’s Evolution and the Shift Toward Secure-By-Design Principles
To achieve a high level of cybersecurity maturity, organisations must move beyond reliance on security tools and AppSec experts, embracing a culture of security at all levels. Effective Secure-by-Design adoption depends on building a security-conscious workforce through structured, ongoing education and incentives that encourage developers to take ...

Navigating the Identity Security Maze: Critical Challenges for Australian Financial Services in 2025
Australia's digital payments sector is booming, but many financial institutions, particularly smaller ones, face significant challenges due to outdated identity security systems. These challenges are compounded by increasing cyberattacks, stringent regulatory pressures, inefficient manual processes, and the growing complexity of machine identities. In ...

Cyber Resilience in Focus: Five Areas Every Board Must Prioritise
Boards need a robust risk management program and have to foster a cyber-aware culture throughout the organisation starting from the very top to help drive cyber maturity.

The Persistent Challenge: Cybersecurity in the Era of Hybrid Work
As businesses balance between office returns and remote work, cybersecurity challenges remain a critical concern for IT managers. Strategies to secure remote workforces against evolving threats like phishing, credential theft, and ransomware remain difficult, but essential.
No results found.
In the News
Jan 2026 Patch Tuesday Comment From Tenable
Microsoft patched 113 CVEs in its January 2026 Patch Tuesday release, with eight rated critical and 105 rated as important. Our counts omitted one CVE that was assigned by MITRE, CVE-2023-31096. Elevation of privilege (EoP) vulnerabilities accounted for 49.6% of the vulnerabilities patched this month, followed by remote code execution (RCE) ...
Delinea and StrongDM to Unite to Redefine Identity Security for the Agentic AI Era
Strategic acquisition to unify PAM and just-in-time runtime authorisation for administrators, developers, non-human identities, and AI agents in a single platform
DroneShield Selected for LAND 156 LoE 3 Panel
DroneShield has been selected as a supplier for the Australian Department of Defence’s Project LAND 156’s Line of Effort 3, which supports the Defence’s strategy to address evolving threats posed by small drones in domestic security.
The selection relates to Line of Effort 3, establishing a Counter-small Unmanned Aerial Systems (C-sUAS) Services ...
Microsoft and ACTU Sign Landmark Agreement to Put Workers’ Voices and Skilling at the Heart of Australia’s AI Transformation
Microsoft Australia and the Australian Council of Trade Unions (ACTU) today announced a landmark Framework Agreement to prioritise skilling and elevate workers’ voices in the design, development and deployment of artificial intelligence (AI) across Australian workplaces. This Australian-first agreement outlines a set of commitments that recognise the ...
Threat Spotlight: The Number of Phishing Kits Doubled in 2025, Bringing stealth, innovation and the Same Old themes
SYDNEY, Australia – 13 January 2026 – In 2025, the number of known phishing-as-a-service (PhaaS) kits doubled in number, increasing the pressure on security teams trying to defend against this ever-evolving threat, according to Barracuda’s phishing review of 2025.
Aggressive newcomers such as Whisper 2FA and GhostFrame introduced inventive ...
Nozomi Networks Announces Major Investment in Singapore
Nozomi Networks, the leader in OT, IoT and CPS security, today announced it has established its new Asia Pacific & Japan headquarters in Singapore.
The company chose Singapore as its regional headquarters as its location and skilled workforce will enable Nozomi to accelerate innovation and provide enhanced local support to a growing customer ...
Infoblox Expands Its Preemptive Security Offering to Combat Brand Abuse, Credential Exposure and External Threats With Planned Acquisition of Axur
Infoblox, a leader in hybrid, multi-cloud networking and preemptive security, today announced that it has entered into a definitive agreement to acquire Axur, a global provider of AI-powered security solutions that protect businesses from a wide range of threats beyond the perimeter. This planned acquisition is subject to regulatory approvals and ...
Rapid7 and ARMO Enable Organisations to Stop Cloud Attacks Earlier With Runtime Security
Rapid7 has announced a new partnership with ARMO to bring full cloud and application runtime security to the Command Platform,
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
