The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

AI-generated Code: The Fourth Component of Software

AI-generated Code: The Fourth Component of Software

There is enormous attention on generative AI (GenAI) and its potential to change software development. While the full impact of GenAI is yet to be known, organisations are eagerly vetting the technology and separating the hype from the real, pragmatic benefits. In parallel, software security professionals are closely watching the practical impact of ...
Using Annual Loss Expectancy (ALE) for Cybersecurity Tech Investment Planning and Building a Business Case

Using Annual Loss Expectancy (ALE) for Cybersecurity Tech Investment Planning and Building a Business Case

Using Annual Loss Expectancy (ALE) to build a business case for purchasing cybersecurity solutions
Transforming Tomorrow: How Women in Science, Technology, Engineering, and Mathematics (STEM) are Shaping a Better Future

Transforming Tomorrow: How Women in Science, Technology, Engineering, and Mathematics (STEM) are Shaping a Better Future

Across STEM women remain underrepresented despite the wide-ranging benefits we know they bring to the field, especially in areas like Cyber Security. So, how do we close this gap? In this article John Penn, Senior Security Propositions Manager and Lucy Mentoring Program Lead at BT, discusses how mentorship is a powerful tool to support more women in ...
Building Resilience in Australia’s Critical Infrastructure with AI-Enhanced Surveillance

Building Resilience in Australia’s Critical Infrastructure with AI-Enhanced Surveillance

In an increasingly interconnected world, the resilience of critical infrastructure is paramount. Disruption to these industries can have serious repercussions on the functioning of a society, so it is vital that those providing these services can maintain business continuity. Australia, with its vast and diverse landscape, faces unique challenges in ...
Overcoming Australia’s Faceless Threat: Identity Crime

Overcoming Australia’s Faceless Threat: Identity Crime

While identity theft is often considered a consumer issue, its impact is being felt more and more by businesses, especially in the wake of major data breaches. In response, businesses have increasingly adopted strict security strategies, and more recently, the government has introduced the Digital ID Bill to the Senate. But what does this mean for ...
A Changing of The Guard: Women In Security

A Changing of The Guard: Women In Security

“The increasing presence of women in tech and leadership roles is encouraging. The current skills shortage offers a great opportunity for women to step in and fill the gaps. For those eyeing careers in technology, whether it be coding, cybersecurity, data analysis, or design, I encourage you to embrace curiosity and chart your own course. Celebrating ...
How Decentralised ID Management can Boost Data Privacy

How Decentralised ID Management can Boost Data Privacy

With the proportion of daily life conducted online continuing to grow, adopting a decentralised approach to identity management makes increasing sense.
Including the newcomers: Why I’m laser focused on paying it forward

Including the newcomers: Why I’m laser focused on paying it forward

Women who’ve benefitted from effective advocacy and support know what a difference it can make in the early career days.
No results found.

In The News

Check Point Recognised for #1 AI-Powered Cyber Security Platform by Miercom

Check Point Recognised for #1 AI-Powered Cyber Security Platform by Miercom

Independent testing by Miercom places Check Point Infinity Platform ahead of top security vendors in threat prevention, Zero Trust architecture, and AI-powered cyber defence
Symal Group Builds On Growth, DevOps and AI Capabilities With Macquarie Cloud Services

Symal Group Builds On Growth, DevOps and AI Capabilities With Macquarie Cloud Services

Macquarie Cloud Services today announced it is providing Microsoft Azure public cloud services to Symal Group to support the company’s digital foundation and rapid growth. Symal Group was founded in Melbourne with ‘a shovel, a wheelbarrow, and a ute’ in 2001, and has since evolved into a newly ASX-listed construction giant. The Group comprises five ...
SecurityBridge Expands Popular “Secure Together” SAP Security Event To The U.S.

SecurityBridge Expands Popular “Secure Together” SAP Security Event To The U.S.

The “Secure Together on the Road” event will occur on April 10, 2025, at the NASA Space Center in Houston, TX. SAP security professionals and IT leaders will gather to tackle the evolving cybersecurity challenges in SAP enterprise landscapes.
GitHub Announces Agent Mode and MCP Support Rolling Out To All VS Code Users

GitHub Announces Agent Mode and MCP Support Rolling Out To All VS Code Users

GitHub Copilot is getting a whole lot more agentic with increased context of tools and services, powered by the world’s leading models, starting today.
Self-Inflicted Cloud Wounds Still The Top Risk In Cloud Security, New Report Finds

Self-Inflicted Cloud Wounds Still The Top Risk In Cloud Security, New Report Finds

New research by Dark Reading commissioned by Qualys, The State of Cloud & SaaS Security Report, reveals top cloud and SaaS security threats facing enterprises today.
Check Point Software Emerges As A Leader In Attack Surface Management After Acquiring Cyberint, According To Latest GigaOm Radar Report

Check Point Software Emerges As A Leader In Attack Surface Management After Acquiring Cyberint, According To Latest GigaOm Radar Report

Cyberint, rebranded as Check Point External Risk Management, offers a comprehensive view of an organization's cyber threats across the open, deep, and dark web Sydney, 4 April 2025 – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, has emerged as a leading player in Attack Surface ...
AI-Driven Attacks To Become Faster, More Sophisticated, And Harder To Detect By 2026, New Delinea Report Shows

AI-Driven Attacks To Become Faster, More Sophisticated, And Harder To Detect By 2026, New Delinea Report Shows

SYDNEY – April 4, 2025 – Delinea, a leading provider of solutions for securing human and machine identities through centralised authorisation, today released its inaugural Cybersecurity and the AI Threat Landscape report. The report, based on exclusive Delinea Labs research and an analysis of several third-party studies and real-world cyber incidents, ...
Thoughtworks Technology Radar Highlights GenAI’s Impact And Key Factors Shaping Today’s Software Development And Delivery

Thoughtworks Technology Radar Highlights GenAI’s Impact And Key Factors Shaping Today’s Software Development And Delivery

Thoughtworks, a global technology consultancy that integrates strategy, design and engineering to drive digital innovation, today presents the 32nd edition of the Technology Radar. The biannual report is built on Thoughtworks’ frontline experiences solving its clients’ most complex business challenges. The latest edition of the Thoughtworks ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This