The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

EOFY 2025: Australian Businesses Need To Mount Defences Against Rising Threat Of Cyberwarfare
Modern cyberwarfare is a rising threat for Australian organisations and requires proactive exposure management for businesses to harden their defence against AI-enabled attacks.

Overcoming The Complexity And Security Issues Posed By AI Coding Tools
The advantages AI tools deliver in speed and efficiency are impossible for time-crunched developers to resist. But the complexity and risk created by AI-generated code can’t be ignored either. Organisations need to thoroughly upskill their developers so that they can work with security professionals to nip software security problems in the bud. Only by ...

Insider Threats: The Silent Cybersecurity Crisis Facing Australian Businesses
In a climate where data is currency and trust is critical, defending against insider threats is not just a technical necessity - it’s a business imperative.

Uncomfortable Truths Behind Cybersecurity Failures
In Episode 4 of the DevSecOops podcast, hosts Tom Walker and Scott Fletcher discussed what’s really dragging security down in modern organisations. And spoiler, it’s not the hackers.
If you’re someone in tech, security, or just trying to make sense of how to run a safer, smarter organisation, this one is for you.
No Longer A Departmental ...

Why ‘Boring’ Data Backups Could Save Millions
Imran Husain, Global Chief Internet Information Security Officer at MillerKnoll, spoke about the often underestimated arena of manufacturing. Data backups may be boring, Husain warns, but ignoring them comes at a potential large cost.Manufacturing has long been viewed as slow to adopt new technologies. As Husain describes, for years the sector’s ...

The Risky Race to AI: How DeepSeek Is Reshaping the AI Landscape
The launch of DeepSeek-R1, a cost-effective, open-source large language model (LLM) by Chinese startup DeepSeek, is shaking up the AI landscape by offering high-quality tools at a fraction of the cost of Western competitors. While this democratizes access to advanced AI and could spark a wave of open-source innovation, it has also triggered significant ...

When Priorities Collide, How Do You Make the Right Call?
In Episode 2 of the DevSecOops podcast, hosts Tom Walker, James Vincent, and Scott Fletcher explored one of the biggest yet most overlooked challenges in organisations today: how to make the right decisions, especially when business, technology, and security priorities clash or collide.
So, how can organisations balance these three?
Equal ...

Why Hack In When You Can Log In
The identity security game has changed, and we’ve made it easier for attackers to win. Not because they’re smarter or more sophisticated (though many are), but because we’ve handed them the keys. Through unchecked identity sprawl, we’ve given cybercriminals a golden ticket to infiltrate what is arguably an organisation’s most valuable asset: its ...
No results found.
In The News
Armis Rapidly Surpasses US$300M ARR as Demand For Cyber Exposure Management and Cyber-Physical Systems Security Soars
Global organisations drive demand for Armis Centrix™, continuing to adopt more products to enable them to see, protect and manage the entire attack surface.
BeyondTrust Accelerates Identity Security Innovation and Research Momentum with Launch of Phantom Labs
Las Vegas, NV – August 4, 2025 – BeyondTrust, the global leader in identity security protecting Paths to Privilege™, today announced the formal launch of its dedicated cybersecurity research team, BeyondTrust Phantom Labs™. The launch of Phantom Labs represents a strategic milestone in BeyondTrust’s ongoing mission to advance identity security ...
Qualys Unveils Industry’s First Agentic AI-Powered Risk Operations Centre Delivering Autonomous Risk Management
New approach introduces a marketplace of Cyber Risk AI Agents that autonomously drive every step of Cyber Risk Operations—dramatically improving risk posture and reducing operational costs
BeyondTrust Research Exposes Hidden Privilege Threats: Secrets Are the New Identity Crisis Awaiting Agent
New data from Identity Security Risk Assessments reveals critical blind spots in non-human identity posture
BeyondTrust’s latest solution brings secrets into full view, just as Agentic AI spins up at scale
2025 CrowdStrike Threat Hunting Report: Adversaries Weaponize and Target AI at Scale
DPRK-nexus adversaries infiltrate 320+ companies using GenAI accelerated attacks; threat actors exploit AI agents, exposing autonomous systems as the next enterprise attack surface
Ransomware in the Crosshairs: Sophos and Halcyon Announce New Intelligence-Sharing and Mutual Anti-Tamper Protection Initiative
Joint Collaboration Enables Real-Time Intelligence Sharing and Mutual Anti-Tamper Protections to Accelerate Ransomware Detection and Response
ASX Listed Excite Cyber Urges Australian Organisations to Adopt ISO 42001 Now to Prepare For Coming AI Regulation
ASX listed cybersecurity firm, Excite Cyber is today urging Australian organisations to adopt ISO 42001 to ensure they are prepared for coming AI regulation.
Barracuda Researchers Reveal New Emerging Email Threats Targeting Organisations Worldwide
Email Threat Radar – July 2025 - During July, Barracuda threat analysts identified several notable email-based threats targeting organisations around the world. Many of them leveraged popular phishing-as-a-service (PhaaS) kits. The threats include:
Tycoon PhaaS impersonating the Autodesk Construction Cloud for a credential phishing attack
A ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..