The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Reputational Risk, Ransomware and the ‘Operational Resilience’ Imperative
When organisations are hit by ransomware attacks and business operations go down, there’s often a rush to blame. Who’s responsible? Who should resign? Less often is the question: What can we learn from it? As cyber incidents become more a matter of inevitability, it’s increasingly critical that businesses also invest in their operational resilience – ...

AI-generated Code: The Fourth Component of Software
There is enormous attention on generative AI (GenAI) and its potential to change software development. While the full impact of GenAI is yet to be known, organisations are eagerly vetting the technology and separating the hype from the real, pragmatic benefits. In parallel, software security professionals are closely watching the practical impact of ...
Using Annual Loss Expectancy (ALE) for Cybersecurity Tech Investment Planning and Building a Business Case
Using Annual Loss Expectancy (ALE) to build a business case for purchasing cybersecurity solutions

Transforming Tomorrow: How Women in Science, Technology, Engineering, and Mathematics (STEM) are Shaping a Better Future
Across STEM women remain underrepresented despite the wide-ranging benefits we know they bring to the field, especially in areas like Cyber Security. So, how do we close this gap? In this article John Penn, Senior Security Propositions Manager and Lucy Mentoring Program Lead at BT, discusses how mentorship is a powerful tool to support more women in ...
Building Resilience in Australia’s Critical Infrastructure with AI-Enhanced Surveillance
In an increasingly interconnected world, the resilience of critical infrastructure is paramount. Disruption to these industries can have serious repercussions on the functioning of a society, so it is vital that those providing these services can maintain business continuity.
Australia, with its vast and diverse landscape, faces unique challenges in ...

Overcoming Australia’s Faceless Threat: Identity Crime
While identity theft is often considered a consumer issue, its impact is being felt more and more by businesses, especially in the wake of major data breaches. In response, businesses have increasingly adopted strict security strategies, and more recently, the government has introduced the Digital ID Bill to the Senate. But what does this mean for ...

A Changing of The Guard: Women In Security
“The increasing presence of women in tech and leadership roles is encouraging. The current skills shortage offers a great opportunity for women to step in and fill the gaps. For those eyeing careers in technology, whether it be coding, cybersecurity, data analysis, or design, I encourage you to embrace curiosity and chart your own course. Celebrating ...
How Decentralised ID Management can Boost Data Privacy
With the proportion of daily life conducted online continuing to grow, adopting a decentralised approach to identity management makes increasing sense.
No results found.
In The News
Oracle Launches First-Of-Its-Kind Defense Ecosystem To Redefine National Security Innovation
New industry coalition gives defense technology innovators unprecedented access to national security delivery channels
Fastly Appoints Nicola Gerber as Vice President for Asia Pacific & Japan to Accelerate Growth Across the Region
SINGAPORE/SYDNEY - June 19, 2025 - Fastly, Inc. (NYSE: FSLY), a leader in global edge cloud platforms, today announced the appointment of Nicola Gerber as Vice President, Asia Pacific & Japan (APJ). This new hire underscores Fastly’s commitment to expanding its presence in one of the world’s fastest-growing digital regions, aligning with its global ...
Securonix and Prophecy International Partner to Deliver Trusted Data Pipelines, Enhancing Security Analytics and Customer Confidence
Prophecy’s Snare Suite will enhance Securonix threat detection by delivering streamlined log management and high-fidelity telemetry
Fortinet Strengthens Code-to-Cloud Security With CNAPP Enhancements and Launches Expanded Solution Availability in AWS Marketplace
New Lacework FortiCNAPP innovations and expanded solution availability in AWS Marketplace accelerate full application life-cycle protection and threat detection and response
World Banking Leaders Warn of Increasing Sophistication of Criminal Money Laundering, BioCatch Reports
Nearly 80% of the 800 fraud-management, anti-money laundering (AML), and risk and compliance leaders surveyed in BioCatch’s first-ever Dark Economy Survey say criminal enterprises today are more sophisticated at laundering money than financial institutions (FIs) are at detecting that laundering. Equally concerning, 83% of respondents agree there exists ...
UiPath Showcases Next-Generation Enterprise-Grade Platform at Australian Agentic Automation Summit
Breaks down the barriers to enterprise AI adoption by enhancing security and compliance, improving accuracy and reliability, overcoming stalled pilot projects, and avoiding vendor lock-in
Tenable Report Warns Cloud Security Gaps Threaten Australian Businesses
9% of cloud storage resources contain sensitive data, while 54% of organisations have secrets embedded in workloads, exposing critical vulnerabilities
Bitdefender to Acquire Mesh Security, Expanding Its Email Security Capabilities
Bitdefender has announced it has agreed to acquire Mesh Security Limited (Mesh), a provider of advanced email security solutions. Through the acquisition, Mesh’s email security technology and capabilities will be integrated into Bitdefender’s extended detection and response (XDR) platform and managed detection and response (MDR) services.
The ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
