The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Shifting the Burden of ID Crime from Victims to Institutions

Shifting the Burden of ID Crime from Victims to Institutions

As Australia’s digital economy deepens its reliance on data, the stakes are rising for both consumers and organisations. Identity crime can no longer be treated as an unfortunate by-product of cyber incidents; it is a systemic risk demanding systemic solutions.
“Trust is Built in a Day,” Said No One Ever – Especially Danielle Sheer, Chief Trust Officer at Commvault

“Trust is Built in a Day,” Said No One Ever – Especially Danielle Sheer, Chief Trust Officer at Commvault

Nothing is more exciting than when companies throw around terms, and the operative term at the moment is trust. There’s a public perception that trust is fluffy, but it's more than that, says Chief Trust Officer at Commvault, Danielle Sheer. “Just because you say it doesn’t mean you have it,” Sheer fires off. Trust amongst other buzz words are the ...
Avoiding Security Operation Chokepoints

Avoiding Security Operation Chokepoints

Introduction Security operations often become inadvertent chokepoints. When every vendor relationship triggers an extensive security review, and teams rely on spreadsheets and email chains to gather responses, progress grinds to a halt. For resource‑constrained organisations, particularly in the fintech, SaaS and technology spaces, these bottlenecks ...
2026 Predictions: The Year Identity Becomes the Ultimate Control Point for an Autonomous World

2026 Predictions: The Year Identity Becomes the Ultimate Control Point for an Autonomous World

Jeffrey Kok, Vice President, Solution Engineers, Asia Pacific & Japan at CyberArk shares his 2026 predictions for the cybersecurity industry - outlining why identity and innovation in governance will be key to organisational survival as organisations face the risks of autonomous AI agents and shrinking certificate lifespans.
Hybrid Mesh Security in the Age of AI and Ransomware

Hybrid Mesh Security in the Age of AI and Ransomware

By adopting hybrid mesh security principles and embracing AI-enhanced controls, security leaders can effectively disrupt the sophisticated ransomware attack chain and establish resilient, future-proof defences against the evolving threats of the digital age.
Why 9 In 10 IT Teams Overestimate Their Operational Resilience

Why 9 In 10 IT Teams Overestimate Their Operational Resilience

Australian IT leaders report strong confidence in their organisation’s resilience — yet the SolarWinds 2025 IT Trends Report shows a more complicated reality. While most believe they can withstand today’s demands, that confidence drops when facing challenges like AI adoption, cyber threats, or evolving regulations such as CPS 230. Nearly half of IT ...
Cybersecurity in Manufacturing: Why It’s More Important Now Than Ever

Cybersecurity in Manufacturing: Why It’s More Important Now Than Ever

Manufacturing has always depended on stable operations. That used to mean keeping machines running, maintaining quality, and hitting delivery schedules. Today it also means defending the environment from attacks that can shut down production, corrupt data, or compromise customer trust. Plants are now connected in ways they weren’t ten years ago, and ...
AI to Supercharge Cyber Threats Across Australia

AI to Supercharge Cyber Threats Across Australia

AI is fundamentally changing the economics of cyberattacks in Australia. Adversaries are no longer scaling through the workforce, but rather through automation. Leaders can’t rely on human-paced defences in a machine-paced threat environment.  Here are the top security trends to watch out for in 2026 and beyond: Compressed Attack Timelines Due to ...
No results found.

In The News

DroneShield Selected for LAND 156 LoE 3 Panel

DroneShield Selected for LAND 156 LoE 3 Panel

DroneShield has been selected as a supplier for the Australian Department of Defence’s Project LAND 156’s Line of Effort 3, which supports the Defence’s strategy to address evolving threats posed by small drones in domestic security. The selection relates to Line of Effort 3, establishing a Counter-small Unmanned Aerial Systems (C-sUAS) Services ...
Microsoft and ACTU Sign Landmark Agreement to Put Workers’ Voices and Skilling at the Heart of Australia’s AI Transformation

Microsoft and ACTU Sign Landmark Agreement to Put Workers’ Voices and Skilling at the Heart of Australia’s AI Transformation

Microsoft Australia and the Australian Council of Trade Unions (ACTU) today announced a landmark Framework Agreement to prioritise skilling and elevate workers’ voices in the design, development and deployment of artificial intelligence (AI) across Australian workplaces. This Australian-first agreement outlines a set of commitments that recognise the ...
Threat Spotlight: The number of phishing kits doubled in 2025, bringing stealth, innovation and the same old themes 

Threat Spotlight: The number of phishing kits doubled in 2025, bringing stealth, innovation and the same old themes 

SYDNEY, Australia – 13 January 2026 – In 2025, the number of known phishing-as-a-service (PhaaS) kits doubled in number, increasing the pressure on security teams trying to defend against this ever-evolving threat, according to Barracuda’s phishing review of 2025. Aggressive newcomers such as Whisper 2FA and GhostFrame introduced inventive ...
Nozomi Networks Announces Major Investment in Singapore

Nozomi Networks Announces Major Investment in Singapore

Nozomi Networks, the leader in OT, IoT and CPS security, today announced it has established its new Asia Pacific & Japan headquarters in Singapore. The company chose Singapore as its regional headquarters as its location and skilled workforce will enable Nozomi to accelerate innovation and provide enhanced local support to a growing customer ...
Infoblox Expands Its Preemptive Security Offering to Combat Brand Abuse, Credential Exposure and External Threats with Planned Acquisition of Axur

Infoblox Expands Its Preemptive Security Offering to Combat Brand Abuse, Credential Exposure and External Threats with Planned Acquisition of Axur

Infoblox, a leader in hybrid, multi-cloud networking and preemptive security, today announced that it has entered into a definitive agreement to acquire Axur, a global provider of AI-powered security solutions that protect businesses from a wide range of threats beyond the perimeter. This planned acquisition is subject to regulatory approvals and ...
Rapid7 and ARMO Enable Organisations to Stop Cloud Attacks Earlier with Runtime Security

Rapid7 and ARMO Enable Organisations to Stop Cloud Attacks Earlier with Runtime Security

Rapid7 has announced a new partnership with ARMO to bring full cloud and application runtime security to the Command Platform,
NinjaOne Announced as Official Endpoint Management Partner for Audi Revolut F1 Team

NinjaOne Announced as Official Endpoint Management Partner for Audi Revolut F1 Team

NinjaOne has announced a new multi-year partnership with Audi Revolut F1 Team, who named NinjaOne as the team’s official endpoint management, mobile device management, and SaaS backup partner, as the team continues to build the foundations of its Formula 1 program ahead of its debut in the FIA Formula One World Championship in March. As ...
ColorTokens Achieves FedRAMP® Moderate Authorization, Accelerating Secure Zero Trust Adoption Across Federal Agencies

ColorTokens Achieves FedRAMP® Moderate Authorization, Accelerating Secure Zero Trust Adoption Across Federal Agencies

Xshield Now Listed on the FedRAMP Marketplace, Expanding Access to Zero Trust Microsegmentation for Federal Agencies
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This