The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

‘The Emotional Hit was Real’, reveals former CISO at Medibank during the breach

‘The Emotional Hit was Real’, reveals former CISO at Medibank during the breach

Cyber incidents rarely begin with chaos. No sirens. No flashing lights. Just a quiet alert that something isn’t right. That’s how it started for Alex Loizou, former Chief Information Security Officer at Medibank, on an October evening in 2022. A routine detection. An anomaly that, at first glance, looked like background noise. It wasn’t. Within ...
Data Resilience in a Post-Quantum World

Data Resilience in a Post-Quantum World

As cyber threats evolve and quantum computing looms, organizations are shifting from breach prevention to resilience-focused strategies that prioritize continuity, recovery, and adaptability. By adopting quantum-safe cryptography, tamper-proof backups, automated detection, and crypto-agile infrastructures, forward-thinking enterprises are building ...
Securing the New Gaming Frontier: Data Infrastructure at Play

Securing the New Gaming Frontier: Data Infrastructure at Play

The gaming industry is undergoing a transformative era, driven by immersive technologies, AI, and global online communities, but this evolution brings critical challenges in balancing innovation with security and scalability. To thrive, studios must adopt intelligent, resilient data infrastructures that ensure seamless gameplay, safeguard against cyber ...
How Fake Operatives are Landing Remote Tech Jobs

How Fake Operatives are Landing Remote Tech Jobs

Remote workforce has changed how companies hire. It has also changed who can get in to these sought-out businesses. Across global hiring pipelines, recruiters are encountering candidates who look legit on paper, interview well remotely and arrive with precisely the right skills organisations need. The problem isn’t poor vetting or rudimentary HR. It’s ...
Cyber Attacks Could Ground Flights, is America’s Aviation System Ready?

Cyber Attacks Could Ground Flights, is America’s Aviation System Ready?

​Over the past year, cyber incidents have quietly become one of aviation’s most disruptive operational risks. When systems go down, airlines revert to manual processes, queues stretch for hours, flights are delayed or cancelled, and the costs stack up fast financially, reputationally, and operationally. Plus, customers take to social media to air their ...
Deepfake Diplomacy – AI Impersonation’s Attack on Sovereign Security

Deepfake Diplomacy – AI Impersonation’s Attack on Sovereign Security

The rise of AI-powered impersonation—ranging from synthetic voice deepfakes to algorithmically generated messages—poses a critical threat to government, defense, and national infrastructure. A recent incident involving an AI-generated impersonation of a U.S. Secretary of State underscores the urgency of this threat. State-sponsored actors are ...
Is the Next National Security Crisis Hiding in your Supermarket?

Is the Next National Security Crisis Hiding in your Supermarket?

​Australians are being told the cost of living crisis is easing. But at the checkout, families know better. Grocery prices remain absorbingly high, with no plan to lower prices and increase food availability. Is Australia quietly sleepwalking into a food security crisis? According to agricultural transparency advocate and Founder at Real Food Price ...
Building Resilience Through AI-Driven Security

Building Resilience Through AI-Driven Security

The cybersecurity landscape is evolving, emphasizing the dual role of AI as both a tool for attackers and defenders. There is an urgent need for businesses to adopt resilient, security-first strategies, including AI-driven anomaly detection, data classification, and toolchain consolidation. As hybrid environments grow more complex, organizations must ...
No results found.

In The News

The State of Cloud-native Security 2026: Maturity Gaps and the Automation Mandate

The State of Cloud-native Security 2026: Maturity Gaps and the Automation Mandate

Red Hat, the world's leading provider of open source solutions, today releases data from its 2026 State of Cloud-Native Security Report, revealing that 97% of organisations reported at least one cloud-native security incident in the past year. These are not just sophisticated, one-off attacks, but rather often the result of "everyday lapses.” Hybrid ...
CrowdStrike Delivers Industry’s First Adversary-Informed Cloud Risk Prioritisation to Stop AI-Powered Adversaries

CrowdStrike Delivers Industry’s First Adversary-Informed Cloud Risk Prioritisation to Stop AI-Powered Adversaries

New Falcon Cloud Security innovations unify application behaviour and adversary tradecraft to eliminate the exposures AI-fortified attackers exploit
HPE Introduces Sweeping Security Advancements to Secure AI Adoption and Strengthen Enterprise Resiliency

HPE Introduces Sweeping Security Advancements to Secure AI Adoption and Strengthen Enterprise Resiliency

New HPE Juniper Networking SRX400 Series Firewalls extend consistent protection from core to edge as AI expands across distributed sites Expanded hybrid mesh firewall puts enterprise guardrails around AI to reduce exposure without slowing productivity Built-in security enhancements support resilience as a core business requirement across the ...
KnowBe4 Accelerates the Future of Human Risk Management with Expanding Suite of AI Agents

KnowBe4 Accelerates the Future of Human Risk Management with Expanding Suite of AI Agents

AI Defence Agents reduce administrative burden and transform security operations from a cost centre to a competitive advantage 
Saviynt Unveils Industry’s First Identity Control Plane for AI Agents

Saviynt Unveils Industry’s First Identity Control Plane for AI Agents

Saviynt delivers the first enterprise-grade platform with the full capabilities to govern AI agents from discovery through runtime
Phantom Labs Analysis of BeyondTrust’s Identity Security Insights Data Finds Enterprise AI Agents Growing 466.7% Year Over Year

Phantom Labs Analysis of BeyondTrust’s Identity Security Insights Data Finds Enterprise AI Agents Growing 466.7% Year Over Year

BeyondTrust researchers warn of a rapidly expanding “shadow AI workforce” creating new identity security risks, based on data uncovered through Identity Security Insights® | Some organisations operate well over 1,000 AI agents, many of which security teams were not aware existed within their environments
Ping Identity Defines the Runtime Identity Standard for Autonomous AI

Ping Identity Defines the Runtime Identity Standard for Autonomous AI

General Availability of Identity for AI establishes continuous, contextual enforcement and real-time control over AI agents 
Interactive Secures IT Managed Services Agreement With Major Superannuation Fund

Interactive Secures IT Managed Services Agreement With Major Superannuation Fund

The leading Australian IT service provider will support the delivery of Hostplus’ technology strategy to enhance service delivery and operational resilience.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This