The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

International Women’s Day

International Women’s Day

International Women’s Day is a moment to celebrate progress, possibility and the incredible women shaping the future of our industry. Reflecting on my own journey from engineering into leadership within the technology sector, one thing stands out, growth rarely follows a straight line. It is built through curiosity, resilience and the willingness to ...
How ‘Verified Trust’ Is Redefining Digital Authentication in the Age of AI

How ‘Verified Trust’ Is Redefining Digital Authentication in the Age of AI

When verified trust becomes embedded in every interaction, authentication transforms from a barrier into an enabler. It delivers not only protection against fraud and impersonation but also the confidence that underpins long-term relationships.
Tanium Names Satyen Desai Regional VP for ASEAN, as Company Doubles Down on Growth in the Region

Tanium Names Satyen Desai Regional VP for ASEAN, as Company Doubles Down on Growth in the Region

Cybersecurity and endpoint management firm Tanium has appointed Satyen Desai as the new Regional Vice President for ASEAN, signalling the company’s continued push to expand its presence across one of the world’s fastest growing economies. Desai announced the move while attending Tanium’s global Sales Kickoff (SKO) in Dallas, describing the opportunity ...
What Einstein Would Say About AI

What Einstein Would Say About AI

Einstein was talking about the concept of “technological unemployment,” the idea that technology will destroy jobs and lead to disaster. Will AI cause mass unemployment? Probably not, because when it comes to economics, Einstein was no Einstein. The vast majority of economists, including me, do not think that automation was an important cause of the ...
The AI Edge in Edge Security

The AI Edge in Edge Security

As Australian organisations expand into hybrid cloud and edge environments, their attack surface is rapidly growing beyond the traditional perimeter. This byline explores how AI-first, platform-led security enables real-time threat detection at the edge, strengthens Zero Trust enforcement and unifies protection across cloud, OT and endpoints. It argues ...
AI Versus AI: Why the Next Cyber Security Battle Will Be Fought by Machines

AI Versus AI: Why the Next Cyber Security Battle Will Be Fought by Machines

Artificial intelligence has evolved from being a technical novelty into a powerful business tool with remarkable speed. Companies are embedding generative AI into customer service, software development, and finance operations to unlock efficiency gains and accelerate innovation. However, as adoption deepens, cyber security leaders are confronting a new ...
Eliminating the Technical Debt Caused by AI-Assisted Software Development

Eliminating the Technical Debt Caused by AI-Assisted Software Development

The software development community is experiencing a near ubiquitous usage of AI coding tools as teams face pressure to generate more output in less time. While the huge efficiency gains from the tools help significantly, teams too often fail to incorporate adequate safety controls and practices into AI deployments. Industry leaders are pushing for ...
Why Identity Security Is Breaking Under the Weight of Silos

Why Identity Security Is Breaking Under the Weight of Silos

Identity has become the connective tissue of the modern enterprise, and the connective tissue of modern attacks. As digital environments grow more complex and AI-driven identities multiply, the cost of managing identity security in silos will only rise.
No results found.

In the News

Defender’s Guide to the Frontier AI Impact on Cybersecurity

Defender’s Guide to the Frontier AI Impact on Cybersecurity

The release of the newest frontier AI models marks a turning point for cybersecurity. Palo Alto Networks has conducted early testing of the latest frontier AI models, including Anthropic’s Mythos model as part of Project Glasswing and OpenAI’s latest models as part of Trusted Access for Cyber program. The conclusion is clear: They are extraordinarily ...
Arctic Wolf Introduces Decipio, a Community Tool to Catch Credential Theft With Defense‑First AI

Arctic Wolf Introduces Decipio, a Community Tool to Catch Credential Theft With Defense‑First AI

Community beta tool invites defenders to collaborate and help shape a new approach to exposing credential‑stealing attacks
Check Point Software Ranks #1 in Miercom’s 2026 Hybrid Mesh Network Security

Check Point Software Ranks #1 in Miercom’s 2026 Hybrid Mesh Network Security

Miercom’s 2026 Hybrid Mesh Network Security Assessment Shows Check Point achieving the highest overall security effectiveness score of 99.8%, highlighting its industry-leading threat prevention   
BeyondTrust’s 13th Annual Microsoft Vulnerabilities Report Reveals Drop in Total Volume, but Surge in Critical Risk

BeyondTrust’s 13th Annual Microsoft Vulnerabilities Report Reveals Drop in Total Volume, but Surge in Critical Risk

Critical vulnerabilities doubled year-over-year, signalling rising risk severity as AI-driven discovery and expanding attack surfaces reshape the Microsoft security landscape | Elevation of Privilege vulnerabilities accounted for 40% of all flaws, continuing to dominate threat actor pathways and reinforcing identity as the primary attack vector | Azure ...
Companies Rushing to Scale AI Are Running Into Operational Limits, DataDog Report Finds

Companies Rushing to Scale AI Are Running Into Operational Limits, DataDog Report Finds

Nearly 1 in 20 AI requests fail in production as capacity limits become the primary bottleneck to scaling AI reliably
Elastic Delivers First Embedded AI Experiences for Observability and Security Inside Third-Party AI Tools

Elastic Delivers First Embedded AI Experiences for Observability and Security Inside Third-Party AI Tools

MCP Apps bring Elastic’s security and observability workflows into third-party AI tools, enabling teams to act on data directly where they work, with additional capabilities for search and data exploration
Snowflake Expands Snowflake Intelligence and Cortex Code to Power the Control Plane for the Agentic Enterprise

Snowflake Expands Snowflake Intelligence and Cortex Code to Power the Control Plane for the Agentic Enterprise

Snowflake Intelligence transforms how business users turn insights into action through a personalised, context-aware AI agent grounded in enterprise data, while Cortex Code enables builders to move faster from code to production with AI-powered development across systems, tools, or environments
DroneShield Quarterly Activities/Appendix 4c Cash Flow Report

DroneShield Quarterly Activities/Appendix 4c Cash Flow Report

DroneShield Limited (ASX:DRO) has released its business update and Appendix 4C for the three-month period ended 31 March 2026 (1Q2026). The Company started 2026 with strong momentum, delivering the highest ever customer cash receipts in a quarter and the second‑highest revenue in a quarter. These results continue the positive trajectory from 2025, ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This