The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

ISACA Sydney Conference 2025 – Event Recap
Overview
Walking into the ISACA Sydney Chapter Conference as “the student voice”, I knew I was surrounded by some of the heaviest hitters in cyber, audit and technology leadership. My job for the day was simple but huge: ask the questions students and early-career professionals are scared to ask and bring those answers back to our community.
By the ...

Kaseya Connect APAC 2025 – Event Recap
Introduction
Kaseya Connect APAC 2025 delivered a message that went beyond product releases: MSP cybersecurity is entering an era where resilience, automation and identity-level defences matter more than point solutions. While most coverage will focus on the Datto SIRIS 6 appliance and Kaseya’s acquisition of INKY, what stood out inside the rooms at ...

Disruption Demands Coordination: Why Secure Communications Solutions are Key to Disrupting the Illegal Fentanyl Trade
Introduction
The Government of Canada is taking concrete and bold action to strengthen border security and disrupt the illegal fentanyl trade. It has announced an investment of $1.3 billion to enhance operations. The funding will support hiring additional personnel and purchasing advanced technology and equipment. This includes state-of-the-art ...

Failure isn’t an Option says CISO at Amazon
Security teams must move faster because attackers already are, according to Amazon’s CISO, CJ Moses.
His key tenet is to cut the friction, build the right systems, and make security so seamless that nobody has to think twice.
“If you make someone’s job easier AND more secure, they’ll do it,” Moses comments.
✔️ Stop begging engineers
✔️ Stop ...

Shifting the Burden of ID Crime from Victims to Institutions
As Australia’s digital economy deepens its reliance on data, the stakes are rising for both consumers and organisations. Identity crime can no longer be treated as an unfortunate by-product of cyber incidents; it is a systemic risk demanding systemic solutions.

“Trust is Built in a Day,” Said No One Ever – Especially Danielle Sheer, Chief Trust Officer at Commvault
Nothing is more exciting than when companies throw around terms, and the operative term at the moment is trust. There’s a public perception that trust is fluffy, but it's more than that, says Chief Trust Officer at Commvault, Danielle Sheer.
“Just because you say it doesn’t mean you have it,” Sheer fires off.
Trust amongst other buzz words are the ...
Avoiding Security Operation Chokepoints
Introduction
Security operations often become inadvertent chokepoints. When every vendor relationship triggers an extensive security review, and teams rely on spreadsheets and email chains to gather responses, progress grinds to a halt. For resource‑constrained organisations, particularly in the fintech, SaaS and technology spaces, these bottlenecks ...

2026 Predictions: The Year Identity Becomes the Ultimate Control Point for an Autonomous World
Jeffrey Kok, Vice President, Solution Engineers, Asia Pacific & Japan at CyberArk shares his 2026 predictions for the cybersecurity industry - outlining why identity and innovation in governance will be key to organisational survival as organisations face the risks of autonomous AI agents and shrinking certificate lifespans.
No results found.
In The News
Fortinet Expands FortiCNAPP Cloud Risk Management with Network, Data, and Unified Risk Context
New enhancements integrate network security posture, native data security posture management, and runtime validation to help security teams prioritise real-world cloud risk
Silvus Technologies Unveils StreamCaster MINI 5200 Tactical MANET Radio
Silvus Technologies, a Motorola Solutions company and a global leader in advanced tactical wireless communications, today announced the StreamCaster® MINI 5200 (SM5200). It is Silvus’ smallest, fully featured mobile ad hoc network (MANET) radio, designed to equip ground forces with next-generation mesh networking to securely share voice, video, and ...
DigiCert Named a Leader in IDC MarketScape for Worldwide Certificate Lifecycle Management 2026
Sydney, AUSTRALIA -- January 28, 2026 — DigiCert, a global leader in intelligent trust, today announced that the company has been named a Leader in the IDC MarketScape: Worldwide Certificate Lifecycle Management (CLM) Vendor Assessment (doc #US52990725, January 2026).
The recognition highlights DigiCert’s leadership in helping organisations ...
Achieving Remote Code Execution on n8n Via Sandbox Escape – CVE-2026-1470 & CVE-2026-0863
The JFrog Security Research team recently discovered and disclosed two vulnerabilities in n8n’s sandbox mechanism: CVE-2026-1470, rated 9.9 Critical, impacting the expression evaluation engine, and CVE-2026-0863, rated 8.5 High, affecting Python execution in the Code node (“Internal” mode).
n8n is a popular AI workflow automation platform that ...
Tenable Extends Exposure Management to AI Attack Surface
Tenable One unifies AI discovery, protection and governance within a single exposure management platform
Cythera Appoints Industry Leader Jason Whyte as Managing Director to Drive Australian Expansion and Group Integration
MELBOURNE, AUSTRALIA — January 27, 2026 — Cythera, a leading Australian cybersecurity provider and a Bastion Group company, today announced the appointment of Jason Whyte as Managing Director for Australia.
In this pivotal role, Whyte will oversee the group’s overall Australian operations, including the strategic integration of Seamless Intelligence ...
Tecala Strengthens Cyber Security Leadership with Microsoft Solutions Partner Designation for Security and Expanded ISO 27001:2022 Certification
Sydney, 27 January 2026 - Leading technology service provider, Tecala, today announced that the company has achieved two significant security milestones that reinforce its position as one of Australia’s most trusted technology partners.
The company has been awarded the Microsoft Solutions Partner Designation for Security and successfully completed ...
Genetec Outlines Data Privacy Best Practices For Physical Security Teams Ahead Of Data Protection Day
Recommendations help organisations safeguard sensitive data while maintaining effective security operations
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
