The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Exploring the Intersection of AI and Cybersecurity Ethics

Exploring the Intersection of AI and Cybersecurity Ethics

The Recap In a recent episode of KBKast, Corien Vermaak, Head of cybersecurity from Cisco ANZ, joined host Karissa Breen to discuss the conversation of AI in and cybersecurity. The interview shed light on the opportunities and ethical considerations presented by AI in the cybersecurity domain, providing valuable insights for both professionals and ...
The Importance of Undertaking Cyber Risk Quantification

The Importance of Undertaking Cyber Risk Quantification

This article looks at the process of cyber risk quantification.

Australia’s FSIs Can Lead the Way in Secure AI-augmented Software Development

The early successes seen with pair programming will amount to nothing if the code output is of poor quality or is insecure.
Cyber Insurance Isn’t a Free Pass for Australian Businesses

Cyber Insurance Isn’t a Free Pass for Australian Businesses

As organisations increasingly look towards cyber insurance to strengthen their cyber security strategies, it’s imperative their houses are in order. The first line of defence is having a clear picture of all the data you hold and how you are handling and retaining it, to ensure you can get insurance, at the best price, and can get it actually paid out ...
Cybersecurity Startup Space: Investing in Early-Stage Companies

Cybersecurity Startup Space: Investing in Early-Stage Companies

In a recent interview, Sergey Gribov, a Partner at Flint Capital, shared his opinion on investing in early-stage cybersecurity startups. More capital is being spent on investing and growing cybersecurity companies which naturally means more competition to grow a successful start-up. The Competitive Advantage and Sustainability of Products With ...
Navigating the Australian Cybersecurity Market

Navigating the Australian Cybersecurity Market

In a recent interview, Marcus Thompson provided insights into the Australian cybersecurity industry, market consolidation, and the future of cybersecurity companies in the region. Thompson discussed the collaborative nature of the industry, market consolidation trends, challenges faced by startups, and the potential for new technologies to reshape the ...
Exclusive: Oracle Global CIO Discusses Cloud Innovation and Security

Exclusive: Oracle Global CIO Discusses Cloud Innovation and Security

I recently attended the Oracle CloudWorld Tour in Singapore and I sat down with Jae Evans, Chief Information Officer and Executive Vice President of Oracle and we discussed Oracle’s strategies for modernising its product and service suite. The discussion delved into Oracle’s journey towards providing a comprehensive and innovative cloud platform, as ...
Why Has Critical Infrastructure Become a Prime Target for Cyber Attacks?

Why Has Critical Infrastructure Become a Prime Target for Cyber Attacks?

From government and healthcare, energy and water networks, manufacturing and telecoms, transportation systems and financial networks, billions of people rely on critical infrastructure. Despite these industries differing in how they function, they are all increasingly relying on an internet connection to help them deliver their services. Critical ...
No results found.

In the News

CrowdStrike Expands the Agentic Security Workforce, Trained on the Knowledge of Elite Analysts

CrowdStrike Expands the Agentic Security Workforce, Trained on the Knowledge of Elite Analysts

New mission-ready agents work in concert with custom-built and third-party agents to automate high-impact workflows across the full security lifecycle
SecurityBridge Announces “Secure Together New York 2025” a Complimentary SAP Security Event at Accenture’s Manhattan Office

SecurityBridge Announces “Secure Together New York 2025” a Complimentary SAP Security Event at Accenture’s Manhattan Office

The company will join forces with partners Accenture, Bowbridge, Fortinet, NextLabs, and Saviynt to deliver a full day of expert sessions exploring the future of SAP security. These sessions will cover AI-powered segregation of duties (SoD) controls, quantum-resistant strategies, and defense mechanisms against modern ransomware and file-based exploits.
CrowdStrike Unveils Charlotte Agentic SOAR to Orchestrate the Agentic Security Workforce

CrowdStrike Unveils Charlotte Agentic SOAR to Orchestrate the Agentic Security Workforce

The orchestration layer of the Agentic Security Platform unites intelligent agents to coordinate real-time agent-to-agent and analyst-to-agent collaboration 
CrowdStrike Delivers Zero-Touch Discovery and Unified Visibility for XIoT Security

CrowdStrike Delivers Zero-Touch Discovery and Unified Visibility for XIoT Security

New Falcon for XIoT innovations bring deeper industrial and OT telemetry into the Falcon platform, eliminating blind spots and complexity across environments
Cisco Launches Cisco IQ, the Unified AI-Powered Experience That Connects the Entire Customer Journey

Cisco Launches Cisco IQ, the Unified AI-Powered Experience That Connects the Entire Customer Journey

• Cisco IQ brings real-time insights, on-demand assessments, troubleshooting and personalized learning, automation and agents from across professional services and support together in a single AI-powered interface, helping customers plan, deploy, manage, secure and optimize technology investments with greater speed and simplicity. • With Cisco IQ's ...
CyberArk Introduces First Identity Security Solution Purpose-Built to Protect AI Agents With Privilege Controls

CyberArk Introduces First Identity Security Solution Purpose-Built to Protect AI Agents With Privilege Controls

Delivers privilege controls, visibility and compliance for the new class of AI agent identities. | Extends CyberArk’s identity security capabilities to secure AI-driven automation at enterprise scale.
KnowBe4 Research Reveals Personalised Phishing Emails Using the Company Name Dominate

KnowBe4 Research Reveals Personalised Phishing Emails Using the Company Name Dominate

The Q3 2025 Phishing Simulation Roundup reveals people interacted most with emails that impersonated colleagues or referenced internal systems or topics 
Critical RCE Vulnerability Discovered in React Native Community CLI NPM Package With 2m Weekly Downloads

Critical RCE Vulnerability Discovered in React Native Community CLI NPM Package With 2m Weekly Downloads

JFrog Security Research team demonstrates CVE-2025-11953 allows unauthenticated attackers to remotely execute code on developers’ machines, putting organisations at risk
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This