The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why Cyber Risk Doesn’t Pause, Even When Organisations Do

Why Cyber Risk Doesn’t Pause, Even When Organisations Do

​Late November in the US marks a slowdown for most organisations. Early November if you’re in Australia post the famous Melbourne Cup horse race. Teams thin out from then onwards. Decision making compresses. Attention shifts elsewhere. For attackers, it’s a window. The Semperis 2025 Holiday Ransom Report reinforces a reality security leaders already ...
The ISO27001 Gold Standard

The ISO27001 Gold Standard

Introduction Building a strong information security posture is no longer optional. For tech executives tasked with protecting sensitive data, enabling growth, and maintaining stakeholder trust, ISO 27001 has emerged as the global gold standard. This internationally recognised framework for information security management not only helps prevent ...
Instagram Password Reset Emails Reveal Serious Gaps in Security

Instagram Password Reset Emails Reveal Serious Gaps in Security

The recent wave of Instagram account reset emails which impacted 17.5 million users didn’t rely on sophisticated exploits. Instead, it exposed something closer to home, which really is around the weaknesses in standard account recovery processes combined with predictable user behaviour. Like clicking the ‘reset password’ link when the email from ...
Cyber Security Trends Boards Can’t Afford to Ignore

Cyber Security Trends Boards Can’t Afford to Ignore

Cybersecurity has officially graduated from “something IT worries about” to a full-blown boardroom issue. These days, it sits somewhere between financial risk, operational resilience and reputational survival. If it still feels like a technical problem that can be delegated down the org chart, that’s usually the first warning sign. The reality is that ...
Battling Burnout in Cybersecurity

Battling Burnout in Cybersecurity

No organization is resilient without a healthy team. Cybersecurity maturity and resiliency must encompass workforce health. Leaders must treat burnout with the same seriousness as any other operational risk. ​​
Why Mobile Devices Are Now Cybercrime’s Primary Entry Point

Why Mobile Devices Are Now Cybercrime’s Primary Entry Point

​Most organisations believe their risk is under control. Endpoints are hardened. Networks are monitored. Identity systems are layered and audited. Yet breaches continue and, increasingly, they don’t start where defenders are looking. Jeff Lindholm, Chief Revenue Officer at Lookout, talks about a shift that has been quietly reshaping cyber risk. Mobile ...
Three Cybersecurity Predictions That Will Define the CISO Agenda in 2026

Three Cybersecurity Predictions That Will Define the CISO Agenda in 2026

In this byline, Sam Salehi, Managing Director ANZ at Qualys, shares his 2026 predictions for the cybersecurity industry, outlining the shifts that will define the CISO agenda as security teams grapple with an excess of signals, expanding AI-driven risk and rising board expectations. Sam argues that success in the year ahead will hinge on CISOs moving ...
Australia’s Cyber Laws Just Changed on Who Takes the Hit

Australia’s Cyber Laws Just Changed on Who Takes the Hit

There’s a new kind of tension creeping into Australian boardrooms. For years, when cyber incidents hit, accountability had a familiar landing zone to fob off and ‘talk to security’. Well, those days are over. With new federal cyber legislation now placing personal liability on company directors, responsibility has shifted upstream and everyone feels ...
No results found.

In The News

Dragos OT Cybersecurity Report: Adversaries Increase Real-World Impact, Map Control Loops Across Industrial Infrastructure

Dragos OT Cybersecurity Report: Adversaries Increase Real-World Impact, Map Control Loops Across Industrial Infrastructure

The latest Dragos 2026 OT/ICS Cybersecurity Report finds cyber adversaries are progressing from reconnaissance to real-world operational disruption, including across Asia-Pacific.
Palo Alto Networks Unit 42 Releases Global Incident Response Report 2026

Palo Alto Networks Unit 42 Releases Global Incident Response Report 2026

AI-Driven Attacks, Identity Abuse and Supply Chain Exploitation Reshape the Cyber Threat Landscape
Arctic Wolf Threat Report Highlights 11x Growth in Data Extortion Incidents and Continued Dominance of Ransomware

Arctic Wolf Threat Report Highlights 11x Growth in Data Extortion Incidents and Continued Dominance of Ransomware

New insights reveal the pivot to data-only extortion, attacker abuse of remote access tools, and how early detection is reshaping ransomware outcomes
New Report Finds APAC Enterprises Facing Agentic AI Technical Challeneges

New Report Finds APAC Enterprises Facing Agentic AI Technical Challeneges

Sydney, 18 February 2026 - Dynatrace, the leading AI-powered observability platform, has today released the regional findings of The Pulse of Agentic AI 2026. The inaugural survey of 919 senior global leaders responsible for agentic AI implementation reveals that enterprises are not stalling because they doubt AI, but because they cannot yet ...
Check Point Software Earns Leader & Fast Mover Position in GigaOm Radar for Cloud Network Security

Check Point Software Earns Leader & Fast Mover Position in GigaOm Radar for Cloud Network Security

Analyst firm highlights Check Point’s prevention‑first architecture, strong ecosystem integrations, unified cloud security platform, and continued pace of innovation REDWOOD CITY, CA. February 17, 2026 -- Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced that it has been ...
LummaStealer Is Back At Scale as Fake CAPTCHA Campaigns Drive Global Resurgence

LummaStealer Is Back At Scale as Fake CAPTCHA Campaigns Drive Global Resurgence

Bitdefender researchers have identified a significant resurgence of one of the world’s most prolific information-stealing malware operations, less than a year after a major global law enforcement action disrupted more than 2,300 of its command-and-control domains. Despite the 2025 takedown effort, LummaStealer was not dismantled. Instead, the ...
Macquarie Tech Appoints Kate Vidgen as Independent Non-Executive Director

Macquarie Tech Appoints Kate Vidgen as Independent Non-Executive Director

Macquarie Technology Group (ASX: MAQ) has announced Kate Vidgen will join the Company’s board as an Independent Non-executive Director following the release of the Company’s FY26 half-year results. Kate will bring more than 30 years’ experience to the company as a senior finance executive and non-executive director with a demonstrated history of ...
Kyndryl Unveils Agentic AI Workflow Governance for Trusted Deployment of Mission‑Critical AI Agents

Kyndryl Unveils Agentic AI Workflow Governance for Trusted Deployment of Mission‑Critical AI Agents

Policy as code capability transforms compliance in regulated agentic AI workflows | Automated policy enforcement establishes guardrails, codifies compliance and boosts transparency across enterprise operations
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This