The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Data Resilience in a Post-Quantum World
As cyber threats evolve and quantum computing looms, organizations are shifting from breach prevention to resilience-focused strategies that prioritize continuity, recovery, and adaptability. By adopting quantum-safe cryptography, tamper-proof backups, automated detection, and crypto-agile infrastructures, forward-thinking enterprises are building ...

Securing the New Gaming Frontier: Data Infrastructure at Play
The gaming industry is undergoing a transformative era, driven by immersive technologies, AI, and global online communities, but this evolution brings critical challenges in balancing innovation with security and scalability. To thrive, studios must adopt intelligent, resilient data infrastructures that ensure seamless gameplay, safeguard against cyber ...

How Fake Operatives are Landing Remote Tech Jobs
Remote workforce has changed how companies hire. It has also changed who can get in to these sought-out businesses.
Across global hiring pipelines, recruiters are encountering candidates who look legit on paper, interview well remotely and arrive with precisely the right skills organisations need. The problem isn’t poor vetting or rudimentary HR. It’s ...

Cyber Attacks Could Ground Flights, is America’s Aviation System Ready?
Over the past year, cyber incidents have quietly become one of aviation’s most disruptive operational risks. When systems go down, airlines revert to manual processes, queues stretch for hours, flights are delayed or cancelled, and the costs stack up fast financially, reputationally, and operationally. Plus, customers take to social media to air their ...

Deepfake Diplomacy – AI Impersonation’s Attack on Sovereign Security
The rise of AI-powered impersonation—ranging from synthetic voice deepfakes to algorithmically generated messages—poses a critical threat to government, defense, and national infrastructure. A recent incident involving an AI-generated impersonation of a U.S. Secretary of State underscores the urgency of this threat.
State-sponsored actors are ...

Is the Next National Security Crisis Hiding in your Supermarket?
Australians are being told the cost of living crisis is easing. But at the checkout, families know better. Grocery prices remain absorbingly high, with no plan to lower prices and increase food availability. Is Australia quietly sleepwalking into a food security crisis?
According to agricultural transparency advocate and Founder at Real Food Price ...

Building Resilience Through AI-Driven Security
The cybersecurity landscape is evolving, emphasizing the dual role of AI as both a tool for attackers and defenders. There is an urgent need for businesses to adopt resilient, security-first strategies, including AI-driven anomaly detection, data classification, and toolchain consolidation. As hybrid environments grow more complex, organizations must ...

Cybersecurity Chief’s AI Slip Sparks Federal Security Review
The acting director of Cybersecurity and Infrastructure Security Agency (CISA), Madhu Gottumukkala, is facing industry scrutiny after accidentally uploading sensitive government documents into a public version of ChatGPT, according to reports online.
The documents were luckily not classified, but they were marked ‘For Official Use Only’, which is for ...
No results found.
In The News
Ping Identity Defines the Runtime Identity Standard for Autonomous AI
General Availability of Identity for AI establishes continuous, contextual enforcement and real-time control over AI agents
Interactive Secures IT Managed Services Agreement With Major Superannuation Fund
The leading Australian IT service provider will support the delivery of Hostplus’ technology strategy to enhance service delivery and operational resilience.
15,500 Malicious Domains: How Threat Actors Abuse a Popular Ad Tracker for Cloaked AI Investment Scams
New research from Infoblox Threat Intel and Confiant reveals that cybercriminals are abusing Keitaro, a widely used advertising performance tracker, to hide (“cloak”) scams and malware behind ordinary web traffic; with many posing specifically as AI investment opportunities.
Cloaking has become a foundational block of modern cybercrime, allowing ...
Elastic Eliminates Per-Endpoint Pricing for XDR
The Australian cyber landscape has reached a critical tipping point. As the latest ASD Cyber Threat Report reveals, average crime costs for large Aussie firms have spiked 219% to over $200k per incident. While much of the industry is focused on the AI arms race, there is a deeper shift occurring: the move from reactive dashboards to the agentic SOC. To ...
Elastic Eliminates the SOAR Automation Tax with Native Workflows
The Australian cyber landscape has reached a critical tipping point. As the latest ASD Cyber Threat Report reveals, average crime costs for large Aussie firms have spiked 219% to over $200k per incident. While much of the industry is focused on the AI arms race, there is a deeper shift occurring: the move from reactive dashboards to the agentic SOC. To ...
Milestone Systems Introduces Trusted Generative AI Tools for Security Operations
Milestone Systems has unveiled a new suite of generative AI-powered solutions designed specifically for security operations, addressing long-standing challenges around manual workflows, regulatory compliance, and trust in automated systems. While generative AI adoption continues to accelerate across industries, many security teams still rely on manual ...
Commvault Expands Microsoft Security Integration to Accelerate Threat Detection and Recovery
Commvault has announced an expanded integration with Microsoft Security, connecting threat detection, investigation, and trusted recovery to strengthen enterprise cyber resilience operations.
The integration brings together Microsoft Sentinel, Microsoft Security Copilot, and the Commvault Cloud platform to streamline resilience operations (ResOps), ...
Dell Technologies Expands Cybersecurity and Resilience for the AI Era and Emerging Quantum Risks
New enhancements help organisations strengthen device trust, improve cyber resilience and detect threats in AI data platforms
Security by design approach hardens Dell commercial PCs[i] with quantum-ready protections
AI-powered cyber resilience helps organisations spot ransomware signals earlier and simplify recovery at scale
Managed ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
