The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Exploring the Intersection of AI and Cybersecurity Ethics
The Recap
In a recent episode of KBKast, Corien Vermaak, Head of cybersecurity from Cisco ANZ, joined host Karissa Breen to discuss the conversation of AI in and cybersecurity. The interview shed light on the opportunities and ethical considerations presented by AI in the cybersecurity domain, providing valuable insights for both professionals and ...

The Importance of Undertaking Cyber Risk Quantification
This article looks at the process of cyber risk quantification.
Australia’s FSIs Can Lead the Way in Secure AI-augmented Software Development
The early successes seen with pair programming will amount to nothing if the code output is of poor quality or is insecure.

Cyber Insurance Isn’t a Free Pass for Australian Businesses
As organisations increasingly look towards cyber insurance to strengthen their cyber security strategies, it’s imperative their houses are in order. The first line of defence is having a clear picture of all the data you hold and how you are handling and retaining it, to ensure you can get insurance, at the best price, and can get it actually paid out ...

Cybersecurity Startup Space: Investing in Early-Stage Companies
In a recent interview, Sergey Gribov, a Partner at Flint Capital, shared his opinion on investing in early-stage cybersecurity startups. More capital is being spent on investing and growing cybersecurity companies which naturally means more competition to grow a successful start-up.
The Competitive Advantage and Sustainability of Products
With ...

Navigating the Australian Cybersecurity Market
In a recent interview, Marcus Thompson provided insights into the Australian cybersecurity industry, market consolidation, and the future of cybersecurity companies in the region. Thompson discussed the collaborative nature of the industry, market consolidation trends, challenges faced by startups, and the potential for new technologies to reshape the ...

Exclusive: Oracle Global CIO Discusses Cloud Innovation and Security
I recently attended the Oracle CloudWorld Tour in Singapore and I sat down with Jae Evans, Chief Information Officer and Executive Vice President of Oracle and we discussed Oracle’s strategies for modernising its product and service suite. The discussion delved into Oracle’s journey towards providing a comprehensive and innovative cloud platform, as ...

Why Has Critical Infrastructure Become a Prime Target for Cyber Attacks?
From government and healthcare, energy and water networks, manufacturing and telecoms, transportation systems and financial networks, billions of people rely on critical infrastructure. Despite these industries differing in how they function, they are all increasingly relying on an internet connection to help them deliver their services.
Critical ...
No results found.
In the News
BeyondTrust Experts Reveal Top Cybersecurity Predictions for 2026 and Beyond
From AI fragmentation and identity debt to biological computing, BeyondTrust forecasts the technologies and threats that will shape the next decade. | Experts predict a surge in agentic AI adoption, identity exploitation, and global regulatory shifts redefining digital trust.
New Bitdefender and NETGEAR Report Reveals Rising Threats Across the Connected Home Landscape
Bitdefender today released new joint research with NETGEAR titled the 2025 IoT Security Landscape Report, providing a comprehensive analysis of the growing threats targeting connected devices in modern homes. The research highlights how the expanding Internet of Things (IoT) ecosystem, spanning everything from smart TVs and streaming boxes to routers ...
Akamai Inference Cloud Transforms AI From Core to Edge With NVIDIA
Akamai Technologies, Inc. (NASDAQ:AKAM) today launched Akamai Inference Cloud, a platform that redefines where and how AI is used by expanding inference from core data centres to the edge of the internet.
Akamai Inference Cloud enables intelligent, agentic AI inference at the edge, close to users and devices. Unlike traditional systems this platform ...
Palo Alto Networks Unveils Cortex AgentiX to Build, Deploy and Govern the Agentic Workforce of the Future
Enhanced platform combines the power of agentic AI with the safety of enterprise-grade guardrails
GitHub Evolves Platform Into Agent HQ as Developer Growth Hits Record Highs
Sydney, 29 October 2025 — At GitHub Universe 2025, GitHub announced Agent HQ—its vision for the next evolution of its platform. Agent HQ transforms GitHub into an open ecosystem that unites every agent on a single platform. Over the coming months, coding agents from Anthropic, OpenAI, Google, Cognition, xAI, and more, will become available directly ...
GitHub Reveals Australian Growth Data and Developer Insights
Over 2 million Aussies are now coding software, as AI lowers barriers to entry worldwide
Trend Micro Awards Over USD$1,000,000 to Ethical Hackers
Participants at Pwn2Own Ireland discovered scores of zero-day vulnerabilities
Organisations That Delay Responding to Email Breaches Are 79% More Likely to Suffer a Ransomware Hit
· New research shows 76% of Australian respondents experienced an email security breach in the previous 12 months · The average cost of recovering from a single email security breach in Australia exceeds $280,000 USD (approx. $430,000 AUD). · Smaller companies are hit hardest with recovery costs of nearly $2,000 USD per employee
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
