The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

International Women’s Day

International Women’s Day

International Women’s Day is a moment to celebrate progress, possibility and the incredible women shaping the future of our industry. Reflecting on my own journey from engineering into leadership within the technology sector, one thing stands out, growth rarely follows a straight line. It is built through curiosity, resilience and the willingness to ...
How ‘Verified Trust’ Is Redefining Digital Authentication in the Age of AI

How ‘Verified Trust’ Is Redefining Digital Authentication in the Age of AI

When verified trust becomes embedded in every interaction, authentication transforms from a barrier into an enabler. It delivers not only protection against fraud and impersonation but also the confidence that underpins long-term relationships.
Tanium Names Satyen Desai Regional VP for ASEAN, as Company Doubles Down on Growth in the Region

Tanium Names Satyen Desai Regional VP for ASEAN, as Company Doubles Down on Growth in the Region

Cybersecurity and endpoint management firm Tanium has appointed Satyen Desai as the new Regional Vice President for ASEAN, signalling the company’s continued push to expand its presence across one of the world’s fastest growing economies. Desai announced the move while attending Tanium’s global Sales Kickoff (SKO) in Dallas, describing the opportunity ...
What Einstein Would Say About AI

What Einstein Would Say About AI

Einstein was talking about the concept of “technological unemployment,” the idea that technology will destroy jobs and lead to disaster. Will AI cause mass unemployment? Probably not, because when it comes to economics, Einstein was no Einstein. The vast majority of economists, including me, do not think that automation was an important cause of the ...
The AI Edge in Edge Security

The AI Edge in Edge Security

As Australian organisations expand into hybrid cloud and edge environments, their attack surface is rapidly growing beyond the traditional perimeter. This byline explores how AI-first, platform-led security enables real-time threat detection at the edge, strengthens Zero Trust enforcement and unifies protection across cloud, OT and endpoints. It argues ...
AI Versus AI: Why the Next Cyber Security Battle Will Be Fought by Machines

AI Versus AI: Why the Next Cyber Security Battle Will Be Fought by Machines

Artificial intelligence has evolved from being a technical novelty into a powerful business tool with remarkable speed. Companies are embedding generative AI into customer service, software development, and finance operations to unlock efficiency gains and accelerate innovation. However, as adoption deepens, cyber security leaders are confronting a new ...
Eliminating the Technical Debt Caused by AI-Assisted Software Development

Eliminating the Technical Debt Caused by AI-Assisted Software Development

The software development community is experiencing a near ubiquitous usage of AI coding tools as teams face pressure to generate more output in less time. While the huge efficiency gains from the tools help significantly, teams too often fail to incorporate adequate safety controls and practices into AI deployments. Industry leaders are pushing for ...
Why Identity Security Is Breaking Under the Weight of Silos

Why Identity Security Is Breaking Under the Weight of Silos

Identity has become the connective tissue of the modern enterprise, and the connective tissue of modern attacks. As digital environments grow more complex and AI-driven identities multiply, the cost of managing identity security in silos will only rise.
No results found.

In the News

Exabeam Extends Agent Behaviour Analytics to the Google Cloud Agent Ecosystem

Exabeam Extends Agent Behaviour Analytics to the Google Cloud Agent Ecosystem

Comprehensive visibility and anomaly detection now available for agents built with Google Cloud’s Agent Development Kit and multi-agent workflows via the upcoming Google Agent Gateway
DataDog Announces GPU Monitoring to Help Businesses Optimise Spend and Performance as They Aim to Scale AI Projects

DataDog Announces GPU Monitoring to Help Businesses Optimise Spend and Performance as They Aim to Scale AI Projects

The launch of Datadog’s GPU Monitoring helps teams plan capacity, troubleshoot issues quickly, prevent costly failures and avoid wasted spend
NinjaOne Unified Backup Surpasses Fifteen Thousand Customers

NinjaOne Unified Backup Surpasses Fifteen Thousand Customers

Today, NinjaOne announced strong momentum for its NinjaOne Backup product, with more than 15,000 customers now relying on the solution to protect their endpoints, servers, and SaaS applications. The growth reflects increasing demand from IT teams and managed service providers (MSPs) for backup and recovery to be embedded within a unified IT operations ...
Defender’s Guide to the Frontier AI Impact on Cybersecurity

Defender’s Guide to the Frontier AI Impact on Cybersecurity

The release of the newest frontier AI models marks a turning point for cybersecurity. Palo Alto Networks has conducted early testing of the latest frontier AI models, including Anthropic’s Mythos model as part of Project Glasswing and OpenAI’s latest models as part of Trusted Access for Cyber program. The conclusion is clear: They are extraordinarily ...
Arctic Wolf Introduces Decipio, a Community Tool to Catch Credential Theft With Defense‑First AI

Arctic Wolf Introduces Decipio, a Community Tool to Catch Credential Theft With Defense‑First AI

Community beta tool invites defenders to collaborate and help shape a new approach to exposing credential‑stealing attacks
Check Point Software Ranks #1 in Miercom’s 2026 Hybrid Mesh Network Security

Check Point Software Ranks #1 in Miercom’s 2026 Hybrid Mesh Network Security

Miercom’s 2026 Hybrid Mesh Network Security Assessment Shows Check Point achieving the highest overall security effectiveness score of 99.8%, highlighting its industry-leading threat prevention   
BeyondTrust’s 13th Annual Microsoft Vulnerabilities Report Reveals Drop in Total Volume, but Surge in Critical Risk

BeyondTrust’s 13th Annual Microsoft Vulnerabilities Report Reveals Drop in Total Volume, but Surge in Critical Risk

Critical vulnerabilities doubled year-over-year, signalling rising risk severity as AI-driven discovery and expanding attack surfaces reshape the Microsoft security landscape | Elevation of Privilege vulnerabilities accounted for 40% of all flaws, continuing to dominate threat actor pathways and reinforcing identity as the primary attack vector | Azure ...
Companies Rushing to Scale AI Are Running Into Operational Limits, DataDog Report Finds

Companies Rushing to Scale AI Are Running Into Operational Limits, DataDog Report Finds

Nearly 1 in 20 AI requests fail in production as capacity limits become the primary bottleneck to scaling AI reliably
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This