The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why Cyber Risk Doesn’t Pause, Even When Organisations Do

Why Cyber Risk Doesn’t Pause, Even When Organisations Do

​Late November in the US marks a slowdown for most organisations. Early November if you’re in Australia post the famous Melbourne Cup horse race. Teams thin out from then onwards. Decision making compresses. Attention shifts elsewhere. For attackers, it’s a window. The Semperis 2025 Holiday Ransom Report reinforces a reality security leaders already ...
The ISO27001 Gold Standard

The ISO27001 Gold Standard

Introduction Building a strong information security posture is no longer optional. For tech executives tasked with protecting sensitive data, enabling growth, and maintaining stakeholder trust, ISO 27001 has emerged as the global gold standard. This internationally recognised framework for information security management not only helps prevent ...
Instagram Password Reset Emails Reveal Serious Gaps in Security

Instagram Password Reset Emails Reveal Serious Gaps in Security

The recent wave of Instagram account reset emails which impacted 17.5 million users didn’t rely on sophisticated exploits. Instead, it exposed something closer to home, which really is around the weaknesses in standard account recovery processes combined with predictable user behaviour. Like clicking the ‘reset password’ link when the email from ...
Cyber Security Trends Boards Can’t Afford to Ignore

Cyber Security Trends Boards Can’t Afford to Ignore

Cybersecurity has officially graduated from “something IT worries about” to a full-blown boardroom issue. These days, it sits somewhere between financial risk, operational resilience and reputational survival. If it still feels like a technical problem that can be delegated down the org chart, that’s usually the first warning sign. The reality is that ...
Battling Burnout in Cybersecurity

Battling Burnout in Cybersecurity

No organization is resilient without a healthy team. Cybersecurity maturity and resiliency must encompass workforce health. Leaders must treat burnout with the same seriousness as any other operational risk. ​​
Why Mobile Devices Are Now Cybercrime’s Primary Entry Point

Why Mobile Devices Are Now Cybercrime’s Primary Entry Point

​Most organisations believe their risk is under control. Endpoints are hardened. Networks are monitored. Identity systems are layered and audited. Yet breaches continue and, increasingly, they don’t start where defenders are looking. Jeff Lindholm, Chief Revenue Officer at Lookout, talks about a shift that has been quietly reshaping cyber risk. Mobile ...
Three Cybersecurity Predictions That Will Define the CISO Agenda in 2026

Three Cybersecurity Predictions That Will Define the CISO Agenda in 2026

In this byline, Sam Salehi, Managing Director ANZ at Qualys, shares his 2026 predictions for the cybersecurity industry, outlining the shifts that will define the CISO agenda as security teams grapple with an excess of signals, expanding AI-driven risk and rising board expectations. Sam argues that success in the year ahead will hinge on CISOs moving ...
Australia’s Cyber Laws Just Changed on Who Takes the Hit

Australia’s Cyber Laws Just Changed on Who Takes the Hit

There’s a new kind of tension creeping into Australian boardrooms. For years, when cyber incidents hit, accountability had a familiar landing zone to fob off and ‘talk to security’. Well, those days are over. With new federal cyber legislation now placing personal liability on company directors, responsibility has shifted upstream and everyone feels ...
No results found.

In The News

Rapid7 2026 Global Threat Landscape Report Shows Exploited High and Critical-Severity Vulnerabilities Surged 105% as Attack Timelines Collapsed

Rapid7 2026 Global Threat Landscape Report Shows Exploited High and Critical-Severity Vulnerabilities Surged 105% as Attack Timelines Collapsed

Released today, the Rapid7 2026 Global Threat Landscape Report: Decoding the Accelerated Cyber Attack Cycle, finds that the window between vulnerability disclosure and confirmed exploitation continues to collapse, leaving organisations with dramatically less time to assess risk, prioritise remediation, and contain threats before impact.
NetApp Sets the Game Plan for AI-Ready Data Operations Across Australia and New Zealand

NetApp Sets the Game Plan for AI-Ready Data Operations Across Australia and New Zealand

NetApp’s vision to help organisations like the National Football League (NFL) bring intelligence to their data and reduce IT complexities  
Claroty Announces Cybercriminals Are Increasingly Targeting Global Critical Infrastructure Via CPS

Claroty Announces Cybercriminals Are Increasingly Targeting Global Critical Infrastructure Via CPS

New research finds cybercriminals are increasingly targeting global critical infrastructure via direct access to cyber-physical systems | Claroty’s Team82 Investigated Hundreds of Politically, Socially Motivated Attacks on Exposed Internet-Facing Devices Including HMI and SCADA Assets
JFrog Unveils Universal MCP Registry, Delivering a Secure System of Record for the AI-Driven Software Supply Chain

JFrog Unveils Universal MCP Registry, Delivering a Secure System of Record for the AI-Driven Software Supply Chain

SYDNEY, Australia. – March 19, 2026 –  JFrog Ltd (Nasdaq: FROG), the Liquid Software company and creators of the JFrog Software Supply Chain Platform, the system of record for software artifacts, binaries, and AI assets, today introduced its JFrog MCP Registry. Expanding on current capabilities in JFrog AI Catalog, the new registry acts as a single ...
UiPath Collaborates with Microsoft to Accelerate Security and Confidence for Automated Workflows

UiPath Collaborates with Microsoft to Accelerate Security and Confidence for Automated Workflows

Integration demonstrates the power of agentic automation and security platforms working together to protect modern enterprises
Malicious IDE Extension Uses Solana Blockchain to Steal Developer Credentials

Malicious IDE Extension Uses Solana Blockchain to Steal Developer Credentials

Bitdefender researchers have uncovered a malicious extension targeting the Windsurf integrated development environment (IDE) that uses the Solana blockchain to deliver malware designed to steal sensitive data from developers. The campaign disguises the extension as a tool for R language development inside Visual Studio Code–compatible environments. ...
Exabeam Expands Award-Winning Exabeam APEX Partner Program with New MSSP Commercial Framework

Exabeam Expands Award-Winning Exabeam APEX Partner Program with New MSSP Commercial Framework

Flexible, pooled licensing model purpose-built to help managed security providers scale faster and grow predictably
Secure Code Warrior Launches Trust Agent: AI to Enable Safe, Scalable AI-Driven Development

Secure Code Warrior Launches Trust Agent: AI to Enable Safe, Scalable AI-Driven Development

New AI Software Governance solution makes AI-generated code visible at commit, enforces policy before production, and connects real development behaviour to measurable risk reduction
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This