The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How Emerging Technologies In Critical Infrastructure Are Expanding Cyber Risks

How Emerging Technologies In Critical Infrastructure Are Expanding Cyber Risks

Introduction Emerging technologies like industrial Internet of Things, unified platform architectures, and cloud-integrated operational technology are transforming the critical infrastructure landscape. This transformation, driven by the need for greater agility and pursuit of competitive advantage, is unlocking unprecedented levels of automation, ...
Privacy by Design: Future-proofing Data Security From the Ground Up

Privacy by Design: Future-proofing Data Security From the Ground Up

Introduction As AI reshapes how many of today’s enterprises operate, concerns over data privacy are accelerating. The pace of innovation is outstripping the capabilities of many legacy systems, and Australian businesses are grappling with issues related to transparency, access control and data security as a result. The core issue isn’t just the ...
The Price of Going Mobile App Viral

The Price of Going Mobile App Viral

The Tea app, a platform for women to rate and review dating experiences, recently went viral on the US App Store but suffered a severe data breach. Due to insecure Firebase storage and poor application security hygiene, over 72,000 private images including ID cards and selfies were exposed, with no access control or rate limiting in place. Metadata ...
Database 23ai: Innovation or Mere Iteration?

Database 23ai: Innovation or Mere Iteration?

Discover how Oracle's Database 23ai is transforming business data by integrating AI, bridging the gap traditional databases couldn’t. Unlock personalized, context-aware insights effortlessly with cutting-edge technology.
Repatriating the Cloud – Why Cybersecurity Must Now Take Center Stage

Repatriating the Cloud – Why Cybersecurity Must Now Take Center Stage

“The cloud is just someone else’s computer,” goes the old tech joke, and like many good jokes, it conceals a sobering truth. For years, organizations eagerly adopted public cloud platforms for the sake of agility, cost savings, and unlimited scalability. But today, that enthusiasm is being tempered by a harsh reality: those “someone else’s” computers ...
Rethinking Security: Why Ethical Curiosity Belongs at the Core of Cyber Defence

Rethinking Security: Why Ethical Curiosity Belongs at the Core of Cyber Defence

Introduction  In 2023, the Latitude Financial cyberattack exposed over 14 million customer records, including driver  licences, passport numbers, and financial details. While remediation focused on containment and  response, one quiet question lingered for many defenders:  "Why didn’t we ask, 'what if?' sooner?"  That single moment underscores ...
How Wargaming is Shaping Business Resilience and Cyber Security Strategies

How Wargaming is Shaping Business Resilience and Cyber Security Strategies

Once the preserve of military strategy rooms and war colleges, wargaming is now being used across government, critical infrastructure, and enterprise to build clarity in the face of uncertainty. Nowhere is this more urgent than in cyber security and business resilience, where the cost of guessing wrong can be catastrophic.
Five Essential Factors to Future-Proof Physical Access Control Systems

Five Essential Factors to Future-Proof Physical Access Control Systems

As digital and physical workplaces continue to converge, Australian organisations face challenges with maintaining the safety of both work environments. For example, while an abundance of cloud-based services and AI agents makes updating security systems faster and easier than ever, many physical access control solutions (PACS) may struggle to ...
No results found.

In The News

Intel Unveils Panther Lake Architecture: First AI PC Platform Built on 18A

Intel Unveils Panther Lake Architecture: First AI PC Platform Built on 18A

Panther Lake will enter high-volume production at Intel’s newest fab in Arizona later this year as company invests in strengthening U.S. technology and manufacturing leadership.
CyberArk Expands Machine Identity Security Portfolio with Advanced Discovery and Context Capabilities, Enabling Enhanced Visibility and Control

CyberArk Expands Machine Identity Security Portfolio with Advanced Discovery and Context Capabilities, Enabling Enhanced Visibility and Control

Machine identities outnumber human identities by 82 to 1. Automated discovery and context-driven approaches are needed to meet complex machine identity security challenges. CyberArk’s platform enhancements help security teams easily find, manage and secure machine identities across the enterprise.
ColorTokens Completes IRAP Assessment to PROTECTED Level, Delivering Government-grade Breach Readiness in Australia

ColorTokens Completes IRAP Assessment to PROTECTED Level, Delivering Government-grade Breach Readiness in Australia

ColorTokens today reaffirmed its commitment to the Australian market including federal, state, and local government agencies, regulated industries, critical infrastructure operators, and enterprises.
Fortinet Annual Report Indicates Artificial Intelligence Skillsets Critical to Cybersecurity Skills Gap Solution

Fortinet Annual Report Indicates Artificial Intelligence Skillsets Critical to Cybersecurity Skills Gap Solution

87 per cent of cybersecurity professionals expect artificial intelligence to enhance their roles, offering efficiency and relief amid cyber skill shortages, but they require upskilling to unlock full potential
Semperis Accelerates Cyber Response With Unified Identity Cyberattack Recovery and Crisis Management offering

Semperis Accelerates Cyber Response With Unified Identity Cyberattack Recovery and Crisis Management offering

Semperis' first-of-its-kind Ready1 for Identity Crisis Management combines market-leading hybrid identity recovery and crisis management to streamline out-of-band communications, reporting, and identity recovery
Barracuda Introduces ‘Barracuda Research’ – A Unified Resource for Global Threat Intelligence and Insights

Barracuda Introduces ‘Barracuda Research’ – A Unified Resource for Global Threat Intelligence and Insights

Sydney, Australia – 9 October, 2025 — Barracuda Networks, Inc., a leading cybersecurity company providing complete protection against complex threats for all size business, has introduced Barracuda Research, a new centralised resource for threat intelligence, real-world incident analysis, email threat detection data from Barracuda AI, and more. ...
Sophos Receives Recognition As It Reaches Key Milestones With Secureworks Acquisition

Sophos Receives Recognition As It Reaches Key Milestones With Secureworks Acquisition

Sophos today announced it has been named a Leader in the IDC MarketScape™: Worldwide Extended Detection and Response (XDR) Software 2025 Vendor Assessment (doc #US52997325, September 2025) report. The IDC MarketScape for Extended Detection and Response cites Sophos’ protection capabilities as a strength, noting, “Sophos is viewed favourably in terms ...
WhatsApp-Enabled ‘Vote for My Child’ Scams Are Rapidly Spreading Across Europe, Bitdefender Lab Warns

WhatsApp-Enabled ‘Vote for My Child’ Scams Are Rapidly Spreading Across Europe, Bitdefender Lab Warns

If you’ve ever wondered how someone could lose access to their WhatsApp account in a matter of seconds, the answer lies in cleverly crafted scams. Cybercriminals don’t need advanced malware or sophisticated hacking tools – instead they exploit trust, urgency, and empathy. Bitdefender Labs has been monitoring a rapidly expanding campaign that ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This