The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How SecOps Can Leverage AI and Automation for Faster, Smarter Incident Management

How SecOps Can Leverage AI and Automation for Faster, Smarter Incident Management

Managing modern cyber threats is becoming tougher for security operations (SecOps) teams. Attack surfaces are expanding, and threats are becoming more sophisticated. Fortunately, artificial intelligence (AI) and automation provide the speed, precision, and efficiency that manual methods can no longer match.  Cornelius Mare, chief information security ...
Why Microsegmentation Is the Key to Containing Breaches in Today’s Cybersecurity Landscape

Why Microsegmentation Is the Key to Containing Breaches in Today’s Cybersecurity Landscape

Discover why microsegmentation is vital for breach readiness. Learn how it prevents lateral movement, protects sensitive data, and ensures business continuity amidst evolving cyber threats.
Navigating Cybersecurity Decision-making in the Age of AI: Insights Into Operational, Tactical, and Strategic Influences

Navigating Cybersecurity Decision-making in the Age of AI: Insights Into Operational, Tactical, and Strategic Influences

The factors that impact all decisions in cybersecurity mainly stem from four sources: industry, organisation, team, and individual. 
Why Breaking Down Identity Silos Has Become an Imperative for Business

Why Breaking Down Identity Silos Has Become an Imperative for Business

In an increasingly complex IT environment, a unified IAM solution is essential for reducing security vulnerabilities and optimising resource allocation. A comprehensive IAM platform centralises identity management across on-premises, cloud, and hybrid environments, creating a secure and agile organisation.
The Revitalised Cisco – With AI Prowess

The Revitalised Cisco – With AI Prowess

Technology giant, Cisco seems to be defying the trend by not only adapting AI but leading the charge in several strategic areas. Tom Gillis, Senior Vice President and General Manager, Security Business Group at Cisco, recently presented on main stage at Cisco Live in Melbourne about the transformative journey and the new vision driving the company ...
Post-Quantum cryptography and Compliance: Where Are We Now?

Post-Quantum cryptography and Compliance: Where Are We Now?

As quantum computing technology advances, traditional cryptographic protocols are at risk, prompting regulatory bodies to urge the adoption of quantum-safe measures. This article explores how Post-Quantum Cryptography (PQC) plays a vital role in securing sensitive data and ensuring compliance across industries. Highlighting standards from organisations ...
Cybersecurity Shortfalls Threaten Australia’s Push to Boost Tech Exports

Cybersecurity Shortfalls Threaten Australia’s Push to Boost Tech Exports

Australia aims to boost economic growth by expanding its technology exports, but inadequate cybersecurity infrastructure is hindering these ambitions. To compete globally, Australian tech companies need stronger support to address cybersecurity and productivity challenges similar to those tackled by the United States and Europe.
Chief Executive, Erik Prusch Shares Vision to Steer ISACA Into the Future

Chief Executive, Erik Prusch Shares Vision to Steer ISACA Into the Future

Recently, I headed down to Melbourne to attend the ISACA, Beyond Tomorrow event. Erik Prusch, CEO of ISACA flew from the United States to maintain his philosophy of being on the ground amongst members. Having joined ISACA just over a year ago, Prusch brings a fresh perspective to an organisation that commands a global footprint with 180,000 members ...
No results found.

In the News

Trend Micro Honours Global Leaders in Cybersecurity With 2025 Global Customer Awards

Trend Micro Honours Global Leaders in Cybersecurity With 2025 Global Customer Awards

Vantage Markets was awarded Customer Innovator for going beyond standard cybersecurity implementations SYDNEY, December 11, 2025 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced the recipients of its 2025 Trend Global Customer Awards, celebrating organisations worldwide for their corporate leadership, ...
New Research Reveals Australians and New Zealanders Are Ready for AI-Powered Emergency Response

New Research Reveals Australians and New Zealanders Are Ready for AI-Powered Emergency Response

86% willing to share real-time location data; strong support for AI to detect threats and accelerate response
Fake Leonardo DiCaprio Movie Torrent Spreads Agent Tesla Trojan Through Layered PowerShell Chain

Fake Leonardo DiCaprio Movie Torrent Spreads Agent Tesla Trojan Through Layered PowerShell Chain

After noticing a spike in detections involving what looked like a movie torrent for One Battle After Another, Bitdefender researchers started an investigation and discovered that it was a complex infection chain. The film, Leonardo DiCaprio's latest, has quickly gained notoriety, making it an attractive lure for cybercriminals seeking to infect as ...
Tenable Patch Tuesday Commentary – December 2025

Tenable Patch Tuesday Commentary – December 2025

In the last Patch Tuesday for 2025, Microsoft addresses 56 CVEs, including two publicly disclosed vulnerabilities and one zero-day that was exploited in the wild. Elevation of privilege (EoP) vulnerabilities accounted for 50% of the vulnerabilities patched this month, followed by remote code execution (RCE) vulnerabilities at 33.9%. Please find below a ...
CrowdStrike Research: Security Flaws in DeepSeek-Generated Code Linked to Political Triggers

CrowdStrike Research: Security Flaws in DeepSeek-Generated Code Linked to Political Triggers

CrowdStrike Counter Adversary Operations identifies innocuous trigger words that lead DeepSeek to produce more vulnerable code.
BeyondTrust and Ping Identity Partner to Deliver Unified Identity Security Fabric

BeyondTrust and Ping Identity Partner to Deliver Unified Identity Security Fabric

Combined solution automates identity decisions across human and non-human identities, strengthening Zero Trust security | Joint offering eliminates identity silos by integrating PAM, IAM, and IGA into a cohesive, AI-driven framework for enhanced visibility, control and governance
Honeywell Selected by Fitzroy River Water to Advance Digital Transformation and Automation of Rockhampton’s Water Infrastructure

Honeywell Selected by Fitzroy River Water to Advance Digital Transformation and Automation of Rockhampton’s Water Infrastructure

Honeywell (NASDAQ: HON) has been selected by Fitzroy River Water, part of Rockhampton Regional Council, to modernise and automate key water treatment facilities, as part of the Council’s long-term infrastructure improvement program. Rockhampton, located in Central Queensland, relies on Fitzroy River Water to deliver essential water and sewerage ...
Genetec Releases 2026 Global State of Physical Security Report

Genetec Releases 2026 Global State of Physical Security Report

Survey of more than 7,300 professionals reveals: Physical security has evolved into a strategic business function, strengthening IT collaboration and decision-making | Interest in adopting AI more than doubled among end users since last year | Organisations want flexibility to deploy workloads on premises, in the cloud, or in a hybrid model
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This