The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How Unified Native Solutions and AI Change the Security Cloud Battleground

How Unified Native Solutions and AI Change the Security Cloud Battleground

An Overview The rapid adoption of cloud computing has created a paradigm shift in cybersecurity. While the cloud offers numerous benefits, it also introduces new challenges and risks that require fundamentally rethinking our cybersecurity strategies. The cloud's appeal lies in its ability to democratise access to powerful computing resources, ...
Five Steps For New Zealand Businesses To Effectively Manage Incident Response

Five Steps For New Zealand Businesses To Effectively Manage Incident Response

With over 2000 incidents reported to CERT NZ each quarter, New Zealand is facing an increasing number of cybersecurity attacks. Every organisation, from the smallest business to the largest government department or organisation must now have a plan for how it will respond to a cybersecurity incident. In the last year, data breaches and other attacks ...
Growing Sustainability Through Colocation Services

Growing Sustainability Through Colocation Services

How colocation hybrid cloud solutions are supporting the transition to more sustainable and environmentally conscious technology solutions for business.

5 Steps for Securing Your Software Supply Chain

. Our dependency on open-source component is going to increase over time and implementing these five steps will help secure your organisation's software supply chain.
Why Developers Need Security Skills To Effectively Navigate AI Development Tools

Why Developers Need Security Skills To Effectively Navigate AI Development Tools

The future is a human-AI partnership for secure code development.
Fish In a Barrel – Australia’s At-risk Cleared Personnel

Fish In a Barrel – Australia’s At-risk Cleared Personnel

“I appreciate people want to sell themselves to prospective employers, and may need to mention they have a security clearance, but doing it on a professional networking site is reckless.” Mike Burgess, Director-General of Security of Australia.
Why Identity Management is Critical for Effective IT Security

Why Identity Management is Critical for Effective IT Security

Organisations should follow several key steps to ensure that identity credentials are secure and user authorisations are appropriate.
CyRC Vulnerability Advisory: CVE-2023-7060 Missing Security Control in Zephyr OS IP Packet Handling

CyRC Vulnerability Advisory: CVE-2023-7060 Missing Security Control in Zephyr OS IP Packet Handling

IP address spoofing involves creating Internet Protocol (IP) packets with a fake source IP address. This is typically done with the intention of deceiving the recipient into believing that the packet is coming from a legitimate source. When the recipient sends a response back to the source IP address, it is sent to the fake source IP address ...
No results found.

In The News

Genetec Brings Audio Communications To Security Center SaaS

Genetec Brings Audio Communications To Security Center SaaS

New feature integrates intercom support and SIP-based audio into unified platform to accelerate incident response and enhance situational awareness.  
Tenable Analysis – Cisco Zero-day Vulnerabilities

Tenable Analysis – Cisco Zero-day Vulnerabilities

Cisco published advisories and a supplemental post about three zero-day vulnerabilities, two of which were exploited in the wild by an advanced threat actor associated with the ArcaneDoor campaign. The two flaws, CVE-2025-20333 and CVE-2025-20362, when combined or “chained” together, would give an attacker full control over the vulnerable ...
Camelot Secure and DigiFlight Named Finalists in Three Categories within Maryland’s Cybersecurity Association 2025 Cybersecurity Awards

Camelot Secure and DigiFlight Named Finalists in Three Categories within Maryland’s Cybersecurity Association 2025 Cybersecurity Awards

The recognition reflects Camelot Secure’s groundbreaking work advancing its Secure360 platform, which unifies cyber and physical security to meet the growing convergence challenge. Secure360 integrates AI, machine learning, and advanced threat intelligence to provide a proactive, holistic defense—helping enterprises and government clients protect ...
Darktrace Unveils Automated Forensics Capabilities in its ActiveAI Security Platform™ to Advance Hybrid and Multi-Cloud Security 

Darktrace Unveils Automated Forensics Capabilities in its ActiveAI Security Platform™ to Advance Hybrid and Multi-Cloud Security 

Launch of Darktrace / Forensic Acquisition & Investigation™, the industry’s first truly automated cloud forensics solution, can cut investigation times from days to minutes   The launch comes amid a widening cloud security gap, with nearly 90% of surveyed organisations across the US and UK reporting that they suffered damage before they could contain ...
Proofpoint Secures Collaboration and Data in the Agentic Workspace with Industry-First Innovations

Proofpoint Secures Collaboration and Data in the Agentic Workspace with Industry-First Innovations

New solutions, including AI tools and intelligent agents, enable organizations to embrace the promise of AI while mitigating unprecedented risks
Cisco Announces Splunk and Australian Signals Directorate Joining Forces to Strengthen Australia’s Cyber Threat Intelligence Sharing

Cisco Announces Splunk and Australian Signals Directorate Joining Forces to Strengthen Australia’s Cyber Threat Intelligence Sharing

SYDNEY – September 25, 2025 – Today Cisco, the worldwide leader in networking and security, announced that Splunk has partnered with the Australian Signals Directorate (ASD) to deliver a new plug-in that integrates Splunk Enterprise Security with ASD’s Cyber Threat Intelligence Sharing (CTIS) platform. This integration allows Splunk customers who are ...
ShadowLeak and the Internet of Agents: The Next Frontier in AI Exploits 

ShadowLeak and the Internet of Agents: The Next Frontier in AI Exploits 

The September 2025 disclosure of ShadowLeak by Radware marks a turning point in the way the security community must think about artificial intelligence. This was not just another prompt injection. It was the first service-side, zero-click indirect prompt injection (IPI) against a widely deployed AI system—OpenAI’s ChatGPT. More importantly, it ...
Lenovo Launches New IT Infrastructure Solutions to Help Australian SMBs Scale

Lenovo Launches New IT Infrastructure Solutions to Help Australian SMBs Scale

Lenovo announced new IT infrastructure solutions tailored to help small and medium businesses (SMBs) easily deploy, scale and leverage modern IT in the era of AI. The solutions are designed to accelerate growth and innovation from day one with pre-tested and validated bundles of servers, software and consumption-based pricing options that help growing ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This