The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

AI Versus AI: Why the Next Cyber Security Battle Will Be Fought by Machines

AI Versus AI: Why the Next Cyber Security Battle Will Be Fought by Machines

Artificial intelligence has evolved from being a technical novelty into a powerful business tool with remarkable speed. Companies are embedding generative AI into customer service, software development, and finance operations to unlock efficiency gains and accelerate innovation. However, as adoption deepens, cyber security leaders are confronting a new ...
Eliminating the Technical Debt Caused by AI-Assisted Software Development

Eliminating the Technical Debt Caused by AI-Assisted Software Development

The software development community is experiencing a near ubiquitous usage of AI coding tools as teams face pressure to generate more output in less time. While the huge efficiency gains from the tools help significantly, teams too often fail to incorporate adequate safety controls and practices into AI deployments. Industry leaders are pushing for ...
Why Identity Security Is Breaking Under the Weight of Silos

Why Identity Security Is Breaking Under the Weight of Silos

Identity has become the connective tissue of the modern enterprise, and the connective tissue of modern attacks. As digital environments grow more complex and AI-driven identities multiply, the cost of managing identity security in silos will only rise.
Inside the DIY Scam Economy

Inside the DIY Scam Economy

Introduction The headquarters of the scam economy have always been elusive, shifting between countries, towns and cities like a shadow. Western Africa, once heralded as a hotbed for digital fraud operations, has now been superseded by Southeast Asia, where hundreds of major scam centres are scattered. The operations of these criminal groups transcend ...
Closing the Human Gap in SAP Security: The Case for Cybersecurity Training

Closing the Human Gap in SAP Security: The Case for Cybersecurity Training

Cyber threats are happening at an overwhelming pace, and organizations using SAP systems have become favorite targets for cybercriminals. While specialized tools exist, there is a shortage of skilled professionals with expertise in SAP security. The need for training individuals in this area has never been greater.
Rushing AI Adoption? Security Leaders Say to Slow Down

Rushing AI Adoption? Security Leaders Say to Slow Down

Artificial intelligence isn’t just transforming business. It’s reshaping risk.At the recent Genetec Press Summit in Montréal, Manager and Principal Security Architect, Mathieu Chevalier delivered a presentation that the promise of AI is real, but so are the vulnerabilities.“It feels like everyone is talking about [AI], and with good reason… this ...
Navigating AI With Cyber-Resilient Storage: Use Cases Lead, Infrastructure Enables

Navigating AI With Cyber-Resilient Storage: Use Cases Lead, Infrastructure Enables

This article discusses how intelligent data infrastructure enables AI adoption and innovation while providing robust cybersecurity protection through features like AI-powered ransomware detection and multi-layered security approaches. The piece emphasizes that while use cases drive technology adoption, secure and resilient data infrastructure is the ...
Security Metrics That Matter

Security Metrics That Matter

Introduction Organisations must move beyond reactive security postures and embrace data-driven decision-making as the sophistication and prevalence of threat actors continues to increase. For start-ups, especially those scaling rapidly or navigating compliance requirements, understanding and tracking the right cybersecurity metrics is ...
No results found.

In the News

Vulnetix Named Australia’s First GCVE Numbering Authority, Brings Real-time Vulnerability Intelligence Into AI Coding Workflows

Vulnetix Named Australia’s First GCVE Numbering Authority, Brings Real-time Vulnerability Intelligence Into AI Coding Workflows

Australian-owned cyber security company opens local developer community with free database access
Exabeam Confronts AI Insider Threats Extending Behaviour Detection and Response to OpenAI ChatGPT and Microsoft Copilot

Exabeam Confronts AI Insider Threats Extending Behaviour Detection and Response to OpenAI ChatGPT and Microsoft Copilot

Applies behaviour profiling and analytics to the digital workforce, giving security teams full visibility into how users and AI agents interact across the enterprise
Macquarie Technology Group Named APJ MSP of the Year by Netskope, Raising the Bar Across the Region

Macquarie Technology Group Named APJ MSP of the Year by Netskope, Raising the Bar Across the Region

Award signals strong momentum following strategic partnerships and reflect dedication to delivering top-tier SASE security solutions to help business and government customers navigate future of cloud and AI security
Suspected North Korean Actor Linked to Major NPM Supply Chain Attack, Google Warns

Suspected North Korean Actor Linked to Major NPM Supply Chain Attack, Google Warns

A recent software supply chain attack involving the widely used axios npm package has been attributed to a suspected North Korean threat actor, underscoring growing concerns about the security of open-source ecosystems relied on by Australian organisations. According to the Google Threat Intelligence Group (GTIG), the attack is not connected to the ...
ESET Launches AI-Powered MDR Service in APAC With Industry-Leading 6-minute Response Time

ESET Launches AI-Powered MDR Service in APAC With Industry-Leading 6-minute Response Time

ESET MDR delivers industry-leading real-time detection and a mean-time-to-respond | (MTTR) of 6 minutes to keep businesses secure
Dataiku Appoints Andrew Boyd as Senior Vice President and General Manager for Asia Pacific and Japan

Dataiku Appoints Andrew Boyd as Senior Vice President and General Manager for Asia Pacific and Japan

Seasoned enterprise technology leader Andrew Boyd to drive Dataiku’s next phase of growth across Asia Pacific and Japan as organisations scale AI from experimentation to impact.
AI Acceleration in APAC Exposes Growing API Security Gap, Akamai Research Finds

AI Acceleration in APAC Exposes Growing API Security Gap, Akamai Research Finds

As organisations across Asia-Pacific adopt AI-first strategies, APIs emerge as the primary attack surface
CrowdStrike and HCLTech Expand Strategic Partnership With AI-Powered Continuous Threat Exposure Management Services

CrowdStrike and HCLTech Expand Strategic Partnership With AI-Powered Continuous Threat Exposure Management Services

March 31, 2026, CrowdStrike (NASDAQ: CRWD) and HCLTech today announced an expansion of their strategic partnership with the launch of Continuous Threat Exposure Management (CTEM) services. This joint offering enables continuous, intelligence-led identification, prioritisation, and remediation of exposure across endpoints, cloud, identity, applications, ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This