The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Rethinking Cyber Resilience in the Age of AI
AI is transforming both innovation and risk, driving advancements while enabling more sophisticated cyber threats. To achieve true cyber resilience, organizations must shift from passive data storage to intelligent, proactive defense, integrating AI-driven detection and recovery directly into the data layer to anticipate, withstand, and recover from ...

Cisco’s Bid to Anchor the Agentic Enterprise
The Shift to Agentic Enterprise AI
Artificial Intelligence (AI) now alters the commercial world with a speed that feels less evolutionary and more tectonic. Infrastructure strains, security models stretch, collaboration tools morph. In that context, Cisco has positioned itself not merely as a participant, but as a structural layer in what it sees as ...

How to Protect Your Professional Image in the AI Age
When Canadian Jake Moffat’s grandmother died in late 2022, he was at least comforted by an assurance from Air Canada’s helpful AI chatbot that he could get a compassionate rebate for his airfare after the event. That was a nice thing for an airline to do, made all the easier with the help of a friendly AI, and it eased the sting of an unexpected ...

Love-bombing and Pig-butchering: How Romance Scams Are Evolving
As Valentine’s Day approaches, millions of Australians will be encouraged to swipe, match and message online in the search for romance. Dating apps and social platforms typically see a surge in activity during this period, driven by the promise of companionship, intimacy and connection. But alongside genuine relationships, this heightened activity also ...

Future-Proofing Your Data Infrastructure With Post-Quantum cryptography
Quantum computing poses a significant threat to current encryption systems, making sensitive data vulnerable to future decryption by cybercriminals using "harvest now, decrypt later" tactics. To mitigate this risk, organizations must adopt post-quantum cryptography (PQC) standards, such as those developed by NIST, and integrate them into their data ...

Cyber Is No Longer Abstract or Passive According to Former National Security Advisor of Japan
Japan is no longer treating cyber threats as a background policy issue. As attacks soar across the region, Japan has taken the position toward active cyber defence, which in turn signals a more assertive national security posture.
Mr. Kitamura, former National Security Advisor of Japan, is aware that the threat environment left little room for delay ...

Rising Cybersecurity Vulnerabilities in Increasingly Interconnected IT/OT Environments
From Outage to Infiltration: Cybersecurity Risk and the Evolving Threat to Electrical Infrastructure
As electrical infrastructure modernizes, its vulnerabilities evolve in parallel. From substation automation to AI-powered grid management, today’s systems have developed from the isolated hardware of the past to converged digital ecosystems with data ...

Cyber Dashboards Are Making Boards Feel Safer…and That’s the Real Risk
Cyber dashboards could be driving complacency when it comes to cyber risk.
No results found.
In the News

Australia Post Taps Global AI Expertise to Supercharge Cyber Threat Detection
Australia Post is partnering with Alpha Level, a next generation AI security company, co-founded by international machine learning expert Dr. Josh Neil, to sharpen its cyber defences and speed up threat detection across its network.
Alpha Level will apply cutting-edge machine learning to help Australia Post efficiently collect, process and analyse ...
Macquarie Technology Group, Macquarie University Partner to Develop Research and Learning Pathways
Macquarie Technology Group (ASX: MAQ) and Macquarie University today announced a strategic partnership to support future collaboration across research, technology and innovation.
The agreement establishes a framework for the two organisations to collaborate in areas including cloud computing, cyber security, data centre engineering, and technology ...
xReality Group Limited Quarterly Activities Report
xReality Group Limited (ASX:XRG) (xReality) has announced its Quarterly Activities Report and Appendix 4C for the quarter ending 31st March 2026, together with an Operational Update.
Key Highlights
Cash Receipts of $5.6m (up 62% on PcP)
$17.0m YTD (up 31% on PcP)
Positive Net Operating Cashflow of $1.3m (up $1.64m on PcP)
$3.6m ...
Ping Identity Warns of Emerging Authorisation Risks as AI Agents Scale Across Enterprises
New KuppingerCole Analysts research, commissioned by Ping Identity, defines how enterprises can govern AI agents at runtime to close emerging authorisation gaps
Fortinet Report Reveals Cybersecurity Hiring Stalls as Nearly Half of IT Leaders Face Corporate Pushback
Cybersecurity skills gap challenges persist in a high-stakes landscape where cybercriminals weaponise AI and IT professionals lack proficiency to use AI defensively

Modulus Labs Improves Global Payment Infrastructure Uptime With Datadog’s Centralised Monitoring and Security
Modulus Labs, Asia’s most versatile payment infrastructure for high-volume merchants and PayFacs, strengthens compliance, security, and uptime with centralised observability across PCI DSS–compliant cloud infrastructure
Veeam Ranked the #1 Data Protection Software in Market Share Worldwide for 2h 2025
Veeam® Software, the Data and AI Trust Company, has been ranked #1 for worldwide data protection software market share by IDC in its latest IDC Semiannual Software Tracker, 2025H2. The tracker reports that Veeam captured 13.6% market share in 2025H2, increasing from 13.2% in 2025H1. IDC also reports that Veeam delivered 11.5% sequential growth in ...
Kaseya Unveils the First Agentic IT Management Platform – Turning Data Into Autonomous Action
Powered by Kaseya Intelligence, Kaseya’s platform combines the industry’s deepest real-world IT dataset with an execution layer that acts with accuracy
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
- 353
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
