The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

In the Age of Microsegmentation Enforcement in Hours, Are You Still Shutting Down Operations?

In the Age of Microsegmentation Enforcement in Hours, Are You Still Shutting Down Operations?

I was researching cyberattacks, and a common theme popped out. “We had an unprecedented cyberattack… and we shut down our operations to protect stakeholder interests.” I know, breaches can be strenuous. The initial hours following a breach are often marked by chaos and urgency as crisis leaders call vendors, disconnect systems, analyze logs, and ...
Economic Statecraft is the New Force Multiplier

Economic Statecraft is the New Force Multiplier

​Defence power is no longer defined by platforms alone. It’s shaped upstream, by capital allocation, ownership rules and the speed at which states can convert technology into deployable capability. That shift is already underway. Many governments recognise it. Some have redesigned their systems around it. Australia is still adapting, albeit slowly, to ...
How Strider Technologies is Mapping Foreign Interference Across Western Innovation

How Strider Technologies is Mapping Foreign Interference Across Western Innovation

Foreign states are extracting openly, legally and at scale from Western systems that were built on trust, transparency, and collaboration. Paul Maddison, Australia, and New Zealand Country Manager at Strider Technologies, talks about a threat that rarely announces itself. “Strider is a company that was founded six years ago in response to this sort ...
Encryption Isn’t Enough: The Hidden Threat of Messaging Metadata

Encryption Isn’t Enough: The Hidden Threat of Messaging Metadata

Today’s Digital Landscape Metadata is one of the most overlooked security risks in modern digital communications. Adversaries no longer need to break into encrypted chats to understand your intent; all they need is your metadata. For government officials who deal with national security, foreign relations, or coordination of high-stakes operations ...
Why Connectivity Failure is Now a National Security Risk

Why Connectivity Failure is Now a National Security Risk

​When emergency services go dark, coordination breaks down. Governments lose visibility at the exact moment they need it most. Recent outages in Australia, where people could not reach emergency services, were not edge cases. They were signals. Neha Idnani, Regional Vice President for APAC at Eutelsat, talked about what those failures reveal. Modern ...
Why Cyber Risk Doesn’t Pause, Even When Organisations Do

Why Cyber Risk Doesn’t Pause, Even When Organisations Do

​Late November in the US marks a slowdown for most organisations. Early November if you’re in Australia post the famous Melbourne Cup horse race. Teams thin out from then onwards. Decision making compresses. Attention shifts elsewhere. For attackers, it’s a window. The Semperis 2025 Holiday Ransom Report reinforces a reality security leaders already ...
The ISO27001 Gold Standard

The ISO27001 Gold Standard

Introduction Building a strong information security posture is no longer optional. For tech executives tasked with protecting sensitive data, enabling growth, and maintaining stakeholder trust, ISO 27001 has emerged as the global gold standard. This internationally recognised framework for information security management not only helps prevent ...
Instagram Password Reset Emails Reveal Serious Gaps in Security

Instagram Password Reset Emails Reveal Serious Gaps in Security

The recent wave of Instagram account reset emails which impacted 17.5 million users didn’t rely on sophisticated exploits. Instead, it exposed something closer to home, which really is around the weaknesses in standard account recovery processes combined with predictable user behaviour. Like clicking the ‘reset password’ link when the email from ...
No results found.

In The News

Sophos Active Adversary Report Finds Identity Attacks Dominate as Threat Groups Proliferate

Sophos Active Adversary Report Finds Identity Attacks Dominate as Threat Groups Proliferate

Sophos has released the 2026 Sophos Active Adversary Report, which reveals that 67% of all incidents investigated by Sophos Incident Response (IR) and Managed Detection and Response (MDR) teams last year were rooted in identity-related attacks. The findings highlight how attackers continue to exploit compromised credentials, weak or missing multifactor ...
Armis Launches Developer Portal to Help Global Organisations Operationalise Asset Intelligence

Armis Launches Developer Portal to Help Global Organisations Operationalise Asset Intelligence

“The Armis Developer Portal provides more than just documentation; we are giving the developer and security community direct access to the world’s most robust asset intelligence. This empowers them to move beyond simple monitoring to an intelligent, proactive security posture.”
Veeam Introduces Agent Commander to Confront Agentic AI Risk at Enterprise Scale

Veeam Introduces Agent Commander to Confront Agentic AI Risk at Enterprise Scale

Veeam® Software, the Data and AI Trust Company, today announced Agent Commander, the first unified solution to help organisations safely detect AI risk, protect AI systems, and undo AI mistakes, empowering them to proactively address AI-driven risks and securely scale AI agents everywhere. The first integration from Veeam’s successful acquisition of ...
Sharon AI & Cisco Launch Australia’s First Cisco Secure AI Factory with NVIDIA

Sharon AI & Cisco Launch Australia’s First Cisco Secure AI Factory with NVIDIA

Cisco and Sharon AI launch Australia’s first Cisco Secure AI Factory with NVIDIA, providing secure, high-performance AI infrastructure with all data processing remaining in the country | Powered by 1024 NVIDIA Blackwell Ultra GPUs, Cisco’s UCS servers and Nexus Hyperfabric technology, it supports Australia’s National AI Plan and accelerates enterprise ...
Akamai Secures Critical Infrastructure with Agentless Zero Trust Segmentation Powered by NVIDIA

Akamai Secures Critical Infrastructure with Agentless Zero Trust Segmentation Powered by NVIDIA

Akamai Guardicore Segmentation and NVIDIA BlueField integration ends the long-standing trade-off between advanced security and system performance for energy, manufacturing, and transportation sectors
Tenable Research Reveals Growing AI Exposure Gap Fuelled by Supply Chain Risks and Lack of Identity Controls

Tenable Research Reveals Growing AI Exposure Gap Fuelled by Supply Chain Risks and Lack of Identity Controls

Tenable report finds 86% of organisations have installed third-party code packages with critical-severity vulnerabilities; 65% expose high-value assets through forgotten cloud credentials
KBI.Media Engaged to Deliver Executive Interview Coverage at Atmos SPHERE 2026

KBI.Media Engaged to Deliver Executive Interview Coverage at Atmos SPHERE 2026

Sydney, Australia Feb 23rd - KBI.Media has been engaged to provide on-site podcast interview coverage for Atmos SPHERE 2026. SPHERE 2026, hosted by Atmos, Australia and New Zealand’s leading legal and advisory firm, is the flagship cyber security forum being held on Thursday the 5th of March 2026, in Sydney, Australia. The event brings together senior ...
Nozomi Networks Labs Report Finds Healthcare Services the Most Targeted Industry in Australia

Nozomi Networks Labs Report Finds Healthcare Services the Most Targeted Industry in Australia

The latest Nozomi Networks Labs OT & IoT Security Report released today finds healthcare services was the most targeted industry in Australia, followed by manufacturing. During the second half of last year, threat actors increased their usage of generative AI in their activity, attacks against companies in English-speaking countries are increasing ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This