The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

AI Versus AI: Why the Next Cyber Security Battle Will Be Fought by Machines
Artificial intelligence has evolved from being a technical novelty into a powerful business tool with remarkable speed. Companies are embedding generative AI into customer service, software development, and finance operations to unlock efficiency gains and accelerate innovation. However, as adoption deepens, cyber security leaders are confronting a new ...

Eliminating the Technical Debt Caused by AI-Assisted Software Development
The software development community is experiencing a near ubiquitous usage of AI coding tools as teams face pressure to generate more output in less time. While the huge efficiency gains from the tools help significantly, teams too often fail to incorporate adequate safety controls and practices into AI deployments. Industry leaders are pushing for ...

Why Identity Security Is Breaking Under the Weight of Silos
Identity has become the connective tissue of the modern enterprise, and the connective tissue of modern attacks. As digital environments grow more complex and AI-driven identities multiply, the cost of managing identity security in silos will only rise.

Inside the DIY Scam Economy
Introduction
The headquarters of the scam economy have always been elusive, shifting between countries, towns and cities like a shadow. Western Africa, once heralded as a hotbed for digital fraud operations, has now been superseded by Southeast Asia, where hundreds of major scam centres are scattered.
The operations of these criminal groups transcend ...

Closing the Human Gap in SAP Security: The Case for Cybersecurity Training
Cyber threats are happening at an overwhelming pace, and organizations using SAP systems have become favorite targets for cybercriminals. While specialized tools exist, there is a shortage of skilled professionals with expertise in SAP security. The need for training individuals in this area has never been greater.

Rushing AI Adoption? Security Leaders Say to Slow Down
Artificial intelligence isn’t just transforming business. It’s reshaping risk.At the recent Genetec Press Summit in Montréal, Manager and Principal Security Architect, Mathieu Chevalier delivered a presentation that the promise of AI is real, but so are the vulnerabilities.“It feels like everyone is talking about [AI], and with good reason… this ...

Navigating AI With Cyber-Resilient Storage: Use Cases Lead, Infrastructure Enables
This article discusses how intelligent data infrastructure enables AI adoption and innovation while providing robust cybersecurity protection through features like AI-powered ransomware detection and multi-layered security approaches. The piece emphasizes that while use cases drive technology adoption, secure and resilient data infrastructure is the ...
Security Metrics That Matter
Introduction
Organisations must move beyond reactive security postures and embrace data-driven decision-making as the sophistication and prevalence of threat actors continues to increase. For start-ups, especially those scaling rapidly or navigating compliance requirements, understanding and tracking the right cybersecurity metrics is ...
No results found.
In the News
Vulnetix Named Australia’s First GCVE Numbering Authority, Brings Real-time Vulnerability Intelligence Into AI Coding Workflows
Australian-owned cyber security company opens local developer community with free database access
Exabeam Confronts AI Insider Threats Extending Behaviour Detection and Response to OpenAI ChatGPT and Microsoft Copilot
Applies behaviour profiling and analytics to the digital workforce, giving security teams full visibility into how users and AI agents interact across the enterprise
Macquarie Technology Group Named APJ MSP of the Year by Netskope, Raising the Bar Across the Region
Award signals strong momentum following strategic partnerships and reflect dedication to delivering top-tier SASE security solutions to help business and government customers navigate future of cloud and AI security
Suspected North Korean Actor Linked to Major NPM Supply Chain Attack, Google Warns
A recent software supply chain attack involving the widely used axios npm package has been attributed to a suspected North Korean threat actor, underscoring growing concerns about the security of open-source ecosystems relied on by Australian organisations.
According to the Google Threat Intelligence Group (GTIG), the attack is not connected to the ...
ESET Launches AI-Powered MDR Service in APAC With Industry-Leading 6-minute Response Time
ESET MDR delivers industry-leading real-time detection and a mean-time-to-respond | (MTTR) of 6 minutes to keep businesses secure
Dataiku Appoints Andrew Boyd as Senior Vice President and General Manager for Asia Pacific and Japan
Seasoned enterprise technology leader Andrew Boyd to drive Dataiku’s next phase of growth across Asia Pacific and Japan as organisations scale AI from experimentation to impact.
AI Acceleration in APAC Exposes Growing API Security Gap, Akamai Research Finds
As organisations across Asia-Pacific adopt AI-first strategies, APIs emerge as the primary attack surface
CrowdStrike and HCLTech Expand Strategic Partnership With AI-Powered Continuous Threat Exposure Management Services
March 31, 2026, CrowdStrike (NASDAQ: CRWD) and HCLTech today announced an expansion of their strategic partnership with the launch of Continuous Threat Exposure Management (CTEM) services. This joint offering enables continuous, intelligence-led identification, prioritisation, and remediation of exposure across endpoints, cloud, identity, applications, ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
