The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Do you use free Wi-Fi in public places?
In today's modern life, we find ourselves highly dependent on the connected world. Think about it, almost everything we do or need in some form requires being connected via a website, app or computer platform. We carry most of us smartphones which are smarter than the computer systems that enabled man to land on the moon.
Seriously, just think ...

AI Broke Cybersecurity and Corporate Leadership Still Hasn’t Noticed
Code is now being written and shipped faster than most security programs were ever built to withstand. Developers are moving at speed. Product teams are pushing releases earlier. And companies are racing to stay competitive often without fully grasping the risks they’ve just signed up for.Sonali Chaudhuri, Founder of MySmartOps commented,“...Exposing ...

Blockchain Auditing in Practice: What Executives Need to Understand Now
Blockchain doesn’t remove trust, it relocates it into code, consensus, and governance. Learn how to audit blockchain systems using ISO 27001, COBIT, and NIST without starting over, and where risk truly lives.

Cyber Powerhouse Ben Doyle Walks Away From Thales
After 22 years as the longest tenured CISO in Australia at the same organisation, beloved Ben Doyle is officially stepping away from his role at Thales... and yep, the cyber industry is feeling it.
“I have been extremely lucky having the tenure, support, and career opportunity at an organisation like Thales that allowed me to grow as the cyber ...
In the Age of Microsegmentation Enforcement in Hours, Are You Still Shutting Down Operations?
I was researching cyberattacks, and a common theme popped out. “We had an unprecedented cyberattack… and we shut down our operations to protect stakeholder interests.”
I know, breaches can be strenuous.
The initial hours following a breach are often marked by chaos and urgency as crisis leaders call vendors, disconnect systems, analyze logs, and ...

Economic Statecraft is the New Force Multiplier
Defence power is no longer defined by platforms alone. It’s shaped upstream, by capital allocation, ownership rules and the speed at which states can convert technology into deployable capability.
That shift is already underway. Many governments recognise it. Some have redesigned their systems around it. Australia is still adapting, albeit slowly, to ...

How Strider Technologies is Mapping Foreign Interference Across Western Innovation
Foreign states are extracting openly, legally and at scale from Western systems that were built on trust, transparency, and collaboration. Paul Maddison, Australia, and New Zealand Country Manager at Strider Technologies, talks about a threat that rarely announces itself.
“Strider is a company that was founded six years ago in response to this sort ...

Encryption Isn’t Enough: The Hidden Threat of Messaging Metadata
Today’s Digital Landscape
Metadata is one of the most overlooked security risks in modern digital communications. Adversaries no longer need to break into encrypted chats to understand your intent; all they need is your metadata.
For government officials who deal with national security, foreign relations, or coordination of high-stakes operations ...
No results found.
In The News
Sophos Active Adversary Report Finds Identity Attacks Dominate as Threat Groups Proliferate
Sophos has released the 2026 Sophos Active Adversary Report, which reveals that 67% of all incidents investigated by Sophos Incident Response (IR) and Managed Detection and Response (MDR) teams last year were rooted in identity-related attacks. The findings highlight how attackers continue to exploit compromised credentials, weak or missing multifactor ...
Armis Launches Developer Portal to Help Global Organisations Operationalise Asset Intelligence
“The Armis Developer Portal provides more than just documentation; we are giving the developer and security community direct access to the world’s most robust asset intelligence. This empowers them to move beyond simple monitoring to an intelligent, proactive security posture.”
Veeam Introduces Agent Commander to Confront Agentic AI Risk at Enterprise Scale
Veeam® Software, the Data and AI Trust Company, today announced Agent Commander, the first unified solution to help organisations safely detect AI risk, protect AI systems, and undo AI mistakes, empowering them to proactively address AI-driven risks and securely scale AI agents everywhere. The first integration from Veeam’s successful acquisition of ...
Sharon AI & Cisco Launch Australia’s First Cisco Secure AI Factory with NVIDIA
Cisco and Sharon AI launch Australia’s first Cisco Secure AI Factory with NVIDIA, providing secure, high-performance AI infrastructure with all data processing remaining in the country | Powered by 1024 NVIDIA Blackwell Ultra GPUs, Cisco’s UCS servers and Nexus Hyperfabric technology, it supports Australia’s National AI Plan and accelerates enterprise ...
Akamai Secures Critical Infrastructure with Agentless Zero Trust Segmentation Powered by NVIDIA
Akamai Guardicore Segmentation and NVIDIA BlueField integration ends the long-standing trade-off between advanced security and system performance for energy, manufacturing, and transportation sectors
Tenable Research Reveals Growing AI Exposure Gap Fuelled by Supply Chain Risks and Lack of Identity Controls
Tenable report finds 86% of organisations have installed third-party code packages with critical-severity vulnerabilities; 65% expose high-value assets through forgotten cloud credentials
KBI.Media Engaged to Deliver Executive Interview Coverage at Atmos SPHERE 2026
Sydney, Australia Feb 23rd - KBI.Media has been engaged to provide on-site podcast interview coverage for Atmos SPHERE 2026. SPHERE 2026, hosted by Atmos, Australia and New Zealand’s leading legal and advisory firm, is the flagship cyber security forum being held on Thursday the 5th of March 2026, in Sydney, Australia. The event brings together senior ...
Nozomi Networks Labs Report Finds Healthcare Services the Most Targeted Industry in Australia
The latest Nozomi Networks Labs OT & IoT Security Report released today finds healthcare services was the most targeted industry in Australia, followed by manufacturing. During the second half of last year, threat actors increased their usage of generative AI in their activity, attacks against companies in English-speaking countries are increasing ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
