The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The ISO27001 Gold Standard

The ISO27001 Gold Standard

Introduction Building a strong information security posture is no longer optional. For tech executives tasked with protecting sensitive data, enabling growth, and maintaining stakeholder trust, ISO 27001 has emerged as the global gold standard. This internationally recognised framework for information security management not only helps prevent ...
Instagram Password Reset Emails Reveal Serious Gaps in Security

Instagram Password Reset Emails Reveal Serious Gaps in Security

The recent wave of Instagram account reset emails which impacted 17.5 million users didn’t rely on sophisticated exploits. Instead, it exposed something closer to home, which really is around the weaknesses in standard account recovery processes combined with predictable user behaviour. Like clicking the ‘reset password’ link when the email from ...
Cyber Security Trends Boards Can’t Afford to Ignore

Cyber Security Trends Boards Can’t Afford to Ignore

Cybersecurity has officially graduated from “something IT worries about” to a full-blown boardroom issue. These days, it sits somewhere between financial risk, operational resilience and reputational survival. If it still feels like a technical problem that can be delegated down the org chart, that’s usually the first warning sign. The reality is that ...
Battling Burnout in Cybersecurity

Battling Burnout in Cybersecurity

No organization is resilient without a healthy team. Cybersecurity maturity and resiliency must encompass workforce health. Leaders must treat burnout with the same seriousness as any other operational risk. ​​
Why Mobile Devices Are Now Cybercrime’s Primary Entry Point

Why Mobile Devices Are Now Cybercrime’s Primary Entry Point

​Most organisations believe their risk is under control. Endpoints are hardened. Networks are monitored. Identity systems are layered and audited. Yet breaches continue and, increasingly, they don’t start where defenders are looking. Jeff Lindholm, Chief Revenue Officer at Lookout, talks about a shift that has been quietly reshaping cyber risk. Mobile ...
Three Cybersecurity Predictions That Will Define the CISO Agenda in 2026

Three Cybersecurity Predictions That Will Define the CISO Agenda in 2026

In this byline, Sam Salehi, Managing Director ANZ at Qualys, shares his 2026 predictions for the cybersecurity industry, outlining the shifts that will define the CISO agenda as security teams grapple with an excess of signals, expanding AI-driven risk and rising board expectations. Sam argues that success in the year ahead will hinge on CISOs moving ...
Australia’s Cyber Laws Just Changed on Who Takes the Hit

Australia’s Cyber Laws Just Changed on Who Takes the Hit

There’s a new kind of tension creeping into Australian boardrooms. For years, when cyber incidents hit, accountability had a familiar landing zone to fob off and ‘talk to security’. Well, those days are over. With new federal cyber legislation now placing personal liability on company directors, responsibility has shifted upstream and everyone feels ...
How to Build Secure Communications Beyond “End-to-End” Network Encryption

How to Build Secure Communications Beyond “End-to-End” Network Encryption

For governments and critical infrastructure operators, secure communications are essential to national governance, operational continuity, and crisis response. Secure communication is the process of safeguarding communication channels and taking full control over critical information. It involves methods and technologies to ensure that all data ...
No results found.

In The News

LummaStealer Is Back At Scale as Fake CAPTCHA Campaigns Drive Global Resurgence

LummaStealer Is Back At Scale as Fake CAPTCHA Campaigns Drive Global Resurgence

Bitdefender researchers have identified a significant resurgence of one of the world’s most prolific information-stealing malware operations, less than a year after a major global law enforcement action disrupted more than 2,300 of its command-and-control domains. Despite the 2025 takedown effort, LummaStealer was not dismantled. Instead, the ...
Macquarie Tech Appoints Kate Vidgen as Independent Non-Executive Director

Macquarie Tech Appoints Kate Vidgen as Independent Non-Executive Director

Macquarie Technology Group (ASX: MAQ) has announced Kate Vidgen will join the Company’s board as an Independent Non-executive Director following the release of the Company’s FY26 half-year results. Kate will bring more than 30 years’ experience to the company as a senior finance executive and non-executive director with a demonstrated history of ...
Kyndryl Unveils Agentic AI Workflow Governance for Trusted Deployment of Mission‑Critical AI Agents

Kyndryl Unveils Agentic AI Workflow Governance for Trusted Deployment of Mission‑Critical AI Agents

Policy as code capability transforms compliance in regulated agentic AI workflows | Automated policy enforcement establishes guardrails, codifies compliance and boosts transparency across enterprise operations
Palo Alto Networks Completes Acquisition of CyberArk to Secure the AI Era

Palo Alto Networks Completes Acquisition of CyberArk to Secure the AI Era

Adds the leading platform that delivers unified security for human, machine and agentic identity.
Riverbed Study Finds 92% of Decision Makers in the Financial Services Industry Agree that Improving Data Quality is Critical to AI Success 

Riverbed Study Finds 92% of Decision Makers in the Financial Services Industry Agree that Improving Data Quality is Critical to AI Success 

Financial Services organisations lead with a strong ROI on AIOps initiatives but only 12% have AI projects fully deployed enterprise-wide, and a substantial 62% still remain in pilot or development stages 
CISOs Driving Growth Through Cyber Resilience, But AI and Supply Chain Visibility Cause Lingering Gaps

CISOs Driving Growth Through Cyber Resilience, But AI and Supply Chain Visibility Cause Lingering Gaps

February 12, 2026 – LevelBlue, the world’s largest pure-play provider of managed security services, has released its latest research report, Persona Spotlight: CISO (Chief Information Security Officer), part of the company’s ongoing research into how cybersecurity leaders are navigating an increasingly complex threat landscape ...
Genetec Advances Investigation Speed And Efficiency With Built For Enterprise Capabilities In Security Center SaaS

Genetec Advances Investigation Speed And Efficiency With Built For Enterprise Capabilities In Security Center SaaS

New investigation capabilities reduce investigation time from hours to minutes across complex, multi-site, and multi-vendor environments
Sophos Acquires Arco Cyber to Bring CISO-Level, Agentic AI-Powered Expertise to Every Organisation

Sophos Acquires Arco Cyber to Bring CISO-Level, Agentic AI-Powered Expertise to Every Organisation

Sophos has announced the acquisition of UK-based Arco Cyber, a cybersecurity assurance company dedicated to helping organisations improve their security posture while staying ahead of compliance requirements and emerging threats. The acquisition is an important step in Sophos’ strategy to help organisations strengthen cybersecurity strategy and ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This