The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Service to Our Nation Should Be the Focus According to Former NSA Deputy Director

Service to Our Nation Should Be the Focus According to Former NSA Deputy Director

America doesn’t have a technology problem. The biggest tech companies and CEO’s are birthed out of the United States. But, it may have a purpose problem. ​With more than three decades spent inside the National Security Agency (NSA), as the former Deputy Director, George Barnes (currently Cyber Practice President and Partner at Red Cell Partners) ...
Do You Use Free Wi-Fi in Public Places?

Do You Use Free Wi-Fi in Public Places?

In today's modern life, we find ourselves highly dependent on the connected world. Think about it, almost everything we do or need in some form requires being connected via a website, app or computer platform. We carry most of us smartphones which are smarter than the computer systems that enabled man to land on the moon.  Seriously, just think ...
AI Broke Cybersecurity and Corporate Leadership Still Hasn’t Noticed

AI Broke Cybersecurity and Corporate Leadership Still Hasn’t Noticed

​Code is now being written and shipped faster than most security programs were ever built to withstand. Developers are moving at speed. Product teams are pushing releases earlier. And companies are racing to stay competitive often without fully grasping the risks they’ve just signed up for.Sonali Chaudhuri, Founder of MySmartOps commented,“...Exposing ...
blockchain Auditing in Practice: What Executives Need to Understand Now

blockchain Auditing in Practice: What Executives Need to Understand Now

Blockchain doesn’t remove trust, it relocates it into code, consensus, and governance. Learn how to audit blockchain systems using ISO 27001, COBIT, and NIST without starting over, and where risk truly lives.
Cyber Powerhouse Ben Doyle Walks Away From Thales

Cyber Powerhouse Ben Doyle Walks Away From Thales

After 22 years as the longest tenured CISO in Australia at the same organisation, beloved Ben Doyle is officially stepping away from his role at Thales... and yep, the cyber industry is feeling it. “I have been extremely lucky having the tenure, support, and career opportunity at an organisation like Thales that allowed me to grow as the cyber ...
In the Age of Microsegmentation Enforcement in Hours, Are You Still Shutting Down Operations?

In the Age of Microsegmentation Enforcement in Hours, Are You Still Shutting Down Operations?

I was researching cyberattacks, and a common theme popped out. “We had an unprecedented cyberattack… and we shut down our operations to protect stakeholder interests.” I know, breaches can be strenuous. The initial hours following a breach are often marked by chaos and urgency as crisis leaders call vendors, disconnect systems, analyze logs, and ...
Economic Statecraft Is the New Force Multiplier

Economic Statecraft Is the New Force Multiplier

​Defence power is no longer defined by platforms alone. It’s shaped upstream, by capital allocation, ownership rules and the speed at which states can convert technology into deployable capability. That shift is already underway. Many governments recognise it. Some have redesigned their systems around it. Australia is still adapting, albeit slowly, to ...
How Strider Technologies Is Mapping Foreign Interference Across Western Innovation

How Strider Technologies Is Mapping Foreign Interference Across Western Innovation

Foreign states are extracting openly, legally and at scale from Western systems that were built on trust, transparency, and collaboration. Paul Maddison, Australia, and New Zealand Country Manager at Strider Technologies, talks about a threat that rarely announces itself. “Strider is a company that was founded six years ago in response to this sort ...
No results found.

In the News

Suspected North Korean Actor Linked to Major NPM Supply Chain Attack, Google Warns

Suspected North Korean Actor Linked to Major NPM Supply Chain Attack, Google Warns

A recent software supply chain attack involving the widely used axios npm package has been attributed to a suspected North Korean threat actor, underscoring growing concerns about the security of open-source ecosystems relied on by Australian organisations. According to the Google Threat Intelligence Group (GTIG), the attack is not connected to the ...
ESET Launches AI-Powered MDR Service in APAC With Industry-Leading 6-minute Response Time

ESET Launches AI-Powered MDR Service in APAC With Industry-Leading 6-minute Response Time

ESET MDR delivers industry-leading real-time detection and a mean-time-to-respond | (MTTR) of 6 minutes to keep businesses secure
Dataiku Appoints Andrew Boyd as Senior Vice President and General Manager for Asia Pacific and Japan

Dataiku Appoints Andrew Boyd as Senior Vice President and General Manager for Asia Pacific and Japan

Seasoned enterprise technology leader Andrew Boyd to drive Dataiku’s next phase of growth across Asia Pacific and Japan as organisations scale AI from experimentation to impact.
AI Acceleration in APAC Exposes Growing API Security Gap, Akamai Research Finds

AI Acceleration in APAC Exposes Growing API Security Gap, Akamai Research Finds

As organisations across Asia-Pacific adopt AI-first strategies, APIs emerge as the primary attack surface
CrowdStrike and HCLTech Expand Strategic Partnership With AI-Powered Continuous Threat Exposure Management Services

CrowdStrike and HCLTech Expand Strategic Partnership With AI-Powered Continuous Threat Exposure Management Services

March 31, 2026, CrowdStrike (NASDAQ: CRWD) and HCLTech today announced an expansion of their strategic partnership with the launch of Continuous Threat Exposure Management (CTEM) services. This joint offering enables continuous, intelligence-led identification, prioritisation, and remediation of exposure across endpoints, cloud, identity, applications, ...
Bitdefender Launches Complimentary Internal Attack Surface Assessment to Help Organisations Uncover Hidden Cyber Risk

Bitdefender Launches Complimentary Internal Attack Surface Assessment to Help Organisations Uncover Hidden Cyber Risk

Program Helps Organisations Discover and Reduce Risk Caused by Unnecessary Access to Applications, Tools, and System Utilities Commonly Exploited in Modern Attacks
Kaseya Unveils Next-generation Innovations in Cyber Resilience

Kaseya Unveils Next-generation Innovations in Cyber Resilience

AI-powered tools set new industry standards for backup and recovery.
ExpressVPN Launches ExpressAI, an AI Platform Built for True Privacy

ExpressVPN Launches ExpressAI, an AI Platform Built for True Privacy

Global privacy and security company ExpressVPN today announced ExpressAI, a new private-by-design AI platform designed for people who want the power of modern AI without being profiled or having their prompts and files fed back into training pipelines. As more people use AI to draft emails, summarise documents, and troubleshoot everyday problems, ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This