The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

AI Broke Cybersecurity and Corporate Leadership Still Hasn’t Noticed

AI Broke Cybersecurity and Corporate Leadership Still Hasn’t Noticed

​Code is now being written and shipped faster than most security programs were ever built to withstand. Developers are moving at speed. Product teams are pushing releases earlier. And companies are racing to stay competitive often without fully grasping the risks they’ve just signed up for.Sonali Chaudhuri, Founder of MySmartOps commented,“...Exposing ...
Blockchain Auditing in Practice: What Executives Need to Understand Now

Blockchain Auditing in Practice: What Executives Need to Understand Now

Blockchain doesn’t remove trust, it relocates it into code, consensus, and governance. Learn how to audit blockchain systems using ISO 27001, COBIT, and NIST without starting over, and where risk truly lives.
Cyber Powerhouse Ben Doyle Walks Away From Thales

Cyber Powerhouse Ben Doyle Walks Away From Thales

After 22 years as the longest tenured CISO in Australia at the same organisation, beloved Ben Doyle is officially stepping away from his role at Thales... and yep, the cyber industry is feeling it. “I have been extremely lucky having the tenure, support, and career opportunity at an organisation like Thales that allowed me to grow as the cyber ...
In the Age of Microsegmentation Enforcement in Hours, Are You Still Shutting Down Operations?

In the Age of Microsegmentation Enforcement in Hours, Are You Still Shutting Down Operations?

I was researching cyberattacks, and a common theme popped out. “We had an unprecedented cyberattack… and we shut down our operations to protect stakeholder interests.” I know, breaches can be strenuous. The initial hours following a breach are often marked by chaos and urgency as crisis leaders call vendors, disconnect systems, analyze logs, and ...
Economic Statecraft is the New Force Multiplier

Economic Statecraft is the New Force Multiplier

​Defence power is no longer defined by platforms alone. It’s shaped upstream, by capital allocation, ownership rules and the speed at which states can convert technology into deployable capability. That shift is already underway. Many governments recognise it. Some have redesigned their systems around it. Australia is still adapting, albeit slowly, to ...
How Strider Technologies is Mapping Foreign Interference Across Western Innovation

How Strider Technologies is Mapping Foreign Interference Across Western Innovation

Foreign states are extracting openly, legally and at scale from Western systems that were built on trust, transparency, and collaboration. Paul Maddison, Australia, and New Zealand Country Manager at Strider Technologies, talks about a threat that rarely announces itself. “Strider is a company that was founded six years ago in response to this sort ...
Encryption Isn’t Enough: The Hidden Threat of Messaging Metadata

Encryption Isn’t Enough: The Hidden Threat of Messaging Metadata

Today’s Digital Landscape Metadata is one of the most overlooked security risks in modern digital communications. Adversaries no longer need to break into encrypted chats to understand your intent; all they need is your metadata. For government officials who deal with national security, foreign relations, or coordination of high-stakes operations ...
Why Connectivity Failure is Now a National Security Risk

Why Connectivity Failure is Now a National Security Risk

​When emergency services go dark, coordination breaks down. Governments lose visibility at the exact moment they need it most. Recent outages in Australia, where people could not reach emergency services, were not edge cases. They were signals. Neha Idnani, Regional Vice President for APAC at Eutelsat, talked about what those failures reveal. Modern ...
No results found.

In The News

HID’s 2026 State of Security and Identity Report: Identity Convergence Drives New Focus on Trust, Protection and User Choice

HID’s 2026 State of Security and Identity Report: Identity Convergence Drives New Focus on Trust, Protection and User Choice

New research highlights seven trends shaping identity, access and trust, alongside rising ethical and privacy concerns
CrowdStrike FalconID Extends Risk-Aware Identity Security to Multi-Factor Authentication

CrowdStrike FalconID Extends Risk-Aware Identity Security to Multi-Factor Authentication

CrowdStrike today announced the general availability of FalconID, extending the Falcon® platform with zero-friction, phishing-resistant MFA. Identity is the front line of modern attacks, and this release advances CrowdStrike’s Next-Gen Identity Security leadership with real-time, risk-aware protection against AI-accelerated phishing attacks and ...
F5 Labs Sets New Standard for AI Security Benchmarking With Model Risk Leaderboards and Threat Intelligence

F5 Labs Sets New Standard for AI Security Benchmarking With Model Risk Leaderboards and Threat Intelligence

Comprehensive AI Security Index and Agentic Resistance Score metrics help organisations stress-test security performance of AI systems, from pilot to production
VAST Data and CrowdStrike Partner to Establish a Unified Security Model for the AI Lifecycle

VAST Data and CrowdStrike Partner to Establish a Unified Security Model for the AI Lifecycle

At VAST Forward 2026, VAST Data, the AI Operating System company, and CrowdStrike (NASDAQ: CRWD) announced a strategic partnership that combines VAST’s native data-layer governance and platform-level controls with CrowdStrike’s enterprise-grade threat detection and automated response. By integrating these capabilities within the VAST AI Operating ...
BeyondTrust Recognised as a Leader and Outperformer in the 2026 GigaOm Radar for Cloud Infrastructure Entitlement Management (CIEM)

BeyondTrust Recognised as a Leader and Outperformer in the 2026 GigaOm Radar for Cloud Infrastructure Entitlement Management (CIEM)

BeyondTrust’s Pathfinder platform earns Leader distinction in Innovation / Platform Play quadrant GigaOm highlights BeyondTrust’s AI-driven analytics, just-in-time access, lifecycle governance, and multicloud compliance capabilities  Atlanta, GA – February 26, 2026 — BeyondTrust, the global leader in privilege-centric identity security protecting ...
Genetec Sets A New Standard For Enterprise Physical Security with Cloudlink 2210

Genetec Sets A New Standard For Enterprise Physical Security with Cloudlink 2210

New high-density appliance enables enterprises to scale cloud-managed physical security without forcing cloud-only storage or infrastructure replacement Sydney, 2 March 2026 — Genetec Inc. (“Genetec”), the global leader in enterprise physical security software, today announced Genetec Cloudlink™ 2210. Designed for complex, enterprise-scale ...
Macquarie Technology Delivers Twenty-two Consecutive Halves of EBITDA Growth

Macquarie Technology Delivers Twenty-two Consecutive Halves of EBITDA Growth

Macquarie Technology Group Ltd (ASX: MAQ) (the Company) today announced its results for the half-year ended 31 December 2025, which were in line with guidance. Chairman Peter James said, “Macquarie Technology Group is pleased to announce its 22nd consecutive half of EBITDA growth. The Company continues to grow and evolve and sees ongoing opportunities ...
VAST Data Introduces Polaris to Orchestrate Globally Distributed AI Data Infrastructure Across Hybrid Multicloud Environments

VAST Data Introduces Polaris to Orchestrate Globally Distributed AI Data Infrastructure Across Hybrid Multicloud Environments

At VAST Forward 2026, AI operating system VAST Data announced Polaris, a global control plane designed to provision, operate and orchestrate distributed AI infrastructure across public cloud, neocloud and on-premises datacentre environments. Polaris transforms VAST deployments into a unified, fleet-scale platform, enabling enterprises to manage AI data ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This