The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

When Digital Names Collide, Business Risk Follows
In an era where trust is increasingly mediated by systems rather than people, ensuring that every digital identity maps cleanly to a real one is no longer optional. It is a prerequisite for doing business safely.

Service to Our Nation Should Be the Focus According to Former NSA Deputy Director
America doesn’t have a technology problem. The biggest tech companies and CEO’s are birthed out of the United States. But, it may have a purpose problem.
With more than three decades spent inside the National Security Agency (NSA), as the former Deputy Director, George Barnes (currently Cyber Practice President and Partner at Red Cell Partners) ...

Do you use free Wi-Fi in public places?
In today's modern life, we find ourselves highly dependent on the connected world. Think about it, almost everything we do or need in some form requires being connected via a website, app or computer platform. We carry most of us smartphones which are smarter than the computer systems that enabled man to land on the moon.
Seriously, just think ...

AI Broke Cybersecurity and Corporate Leadership Still Hasn’t Noticed
Code is now being written and shipped faster than most security programs were ever built to withstand. Developers are moving at speed. Product teams are pushing releases earlier. And companies are racing to stay competitive often without fully grasping the risks they’ve just signed up for.Sonali Chaudhuri, Founder of MySmartOps commented,“...Exposing ...

Blockchain Auditing in Practice: What Executives Need to Understand Now
Blockchain doesn’t remove trust, it relocates it into code, consensus, and governance. Learn how to audit blockchain systems using ISO 27001, COBIT, and NIST without starting over, and where risk truly lives.

Cyber Powerhouse Ben Doyle Walks Away From Thales
After 22 years as the longest tenured CISO in Australia at the same organisation, beloved Ben Doyle is officially stepping away from his role at Thales... and yep, the cyber industry is feeling it.
“I have been extremely lucky having the tenure, support, and career opportunity at an organisation like Thales that allowed me to grow as the cyber ...
In the Age of Microsegmentation Enforcement in Hours, Are You Still Shutting Down Operations?
I was researching cyberattacks, and a common theme popped out. “We had an unprecedented cyberattack… and we shut down our operations to protect stakeholder interests.”
I know, breaches can be strenuous.
The initial hours following a breach are often marked by chaos and urgency as crisis leaders call vendors, disconnect systems, analyze logs, and ...

Economic Statecraft is the New Force Multiplier
Defence power is no longer defined by platforms alone. It’s shaped upstream, by capital allocation, ownership rules and the speed at which states can convert technology into deployable capability.
That shift is already underway. Many governments recognise it. Some have redesigned their systems around it. Australia is still adapting, albeit slowly, to ...
No results found.
In The News
Baidam Appoints Beau Hodge As CEO
BRISBANE, QLD – [12th March 2026] – Baidam, a leading First Nations information technology provider, has announced the appointment of Beau Hodge to the role of CEO. Hodge has held a succession of senior roles within Baidam since joining nearly five years ago.
For Jack Reis and Pip Jenkinson, co-founders and owners of Baidam, Hodge’s appointment will ...
“LeakyLooker” Discovery Reveals Nine Vulnerabilities in Google Looker Studio, Exposing Sensitive Cloud Data
Tenable Research has uncovered a series of security vulnerabilities in Google Looker Studio, dubbed "LeakyLooker," that allowed attackers to run arbitrary SQL queries on victims’ databases and exfiltrate sensitive data within organisations' Google Cloud environments.
Identity Attacks and AI Risks Emerging as Key Cloud Threats for Australian Organisations
Australian organisations accelerating their adoption of cloud and artificial intelligence technologies may be exposing themselves to new cybersecurity risks, according to new research from Google Cloud.
The company’s Cloud Threat Horizons Report H1 2026 highlights a shift in how cyber attackers target cloud environments, with identity systems, cloud ...
Saviynt Taps NEXTGEN, an Exclusive Networks Company, to Accelerate Digital Identity Security in Australia
Collaboration strengthens Saviynt’s partner-first strategy as AI-driven identity risk builds across the APJ region. | Saviynt will broaden access to AI-ready identity security for organisations navigating growing digital risks | NEXTGEN will help scale Saviynt’s partner ecosystem across APJ, enabling faster adoption of identity-centric security in the AI era
Fortinet Advances Its Security Operations Platform with Unified SOC, Agentic AI, and Expanded Endpoint Security
New innovations unify cloud SOC, agentic AI, managed detection and response, and endpoint protection within a single Security Fabric architecture
Fortinet Introduces FortiOS 8.0 to Expand Secure Networking With Secure AI Controls, Fabric-based AI Agents, Flexible SASE, and Simplified SD-WAN
Latest FortiOS capabilities help organisations secure AI adoption, simplify operations, and strengthen protection across hybrid and multi-cloud environments
Tenable Patch Tuesday Commentary – March 2026
Microsoft patched 83 CVEs in its March 2026 Patch Tuesday release, with eight rated critical and 75 rated as important. Our counts omitted one CVE (CVE-2026-26030) assigned by GitHub. Elevation of privilege (EoP) vulnerabilities accounted for 55.4% of the vulnerabilities patched this month, followed by remote code execution (RCE)vulnerabilities at ...
Google Threat Intelligence Group Warns Enterprise Systems Now Dominate Global Zero-day Attacks
Enterprise technologies have emerged as the primary target for zero-day exploitation, according to new research from the Google Threat Intelligence Group (GTIG), signalling a continued shift away from traditional browser-based attacks toward enterprise infrastructure and edge devices.
In its report, “Look What You Made Us Patch: 2025 Zero-Days in ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
