The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

How Consumer Data Rights Are Changing the Way Australian Businesses Operate
Introduction
Consumer data rights reforms in Australia are reshaping how enterprises handle personal information by introducing operational, legal, and technical responsibilities that apply across every part of the business. That includes how data is collected, how it is stored, and how it moves between internal teams and external systems.
John ...

The Rising Role of Citizen Automators In Business Innovation
Australia is facing a deepening shortage of technology skills in the coming years, putting pressure on businesses that need developers and other ICT professionals to innovate successfully. But new tools are enabling the rise of citizen developers to fill these tech gaps, here’s how.

Identity: The New Currency in Cybersecurity
Digital identity is now cybercriminals' top target. With data breaches up 78% globally, businesses must invest in Identity & Access Management to protect employees and customers—it's both a security imperative and ethical obligation.

Qantas Breached and Customers are Fuming
Earlier today it was announced across mainstream media channels that Qantas suffered a data breach, affecting approximately six million customers. The breach was linked to a cyber attack targeting a third-party platform used by the prominent airline’s contact centre.
Exposed information includes names, email addresses, phone numbers, and frequent ...

What Happens When the World’s Biggest Vulnerability Database Goes Dark?
MITRE, the cornerstone of global vulnerability tracking, announcing it could go dark. For years, the field had relied on this single repository, the bedrock for tracking software vulnerabilities. What happens when that rug is pulled from beneath an entire industry? Tal Zarfati, Architect Lead at JFrog Security, still recalls the tremor this news sent ...
Minimising Third-party Risk
Minimise third-party risk with smart vendor management. Learn how to protect data, ensure compliance, and streamline reviews with automation.

The Blind Spot In Your Cyber Strategy
Recently on the DevSecOops podcast, Hosts Tom Walker, James Vincent, and Scott Fletcher unpacked the modern threats in the cybersecurity space. With years of experience in IT and cybersecurity, the hosts shared real world experiences, from everyday technical mishaps to nation sponsored cyberattacks, offering practical advice for staying secure amid ...

How Wiz Is Rewriting the Cloud Security Story
In Episode 7 of the DevSecOops podcast, hosts Tom Walker, Scott Fletcher, and James Vincent sat down with Matt Preswick, Principal Solutions Engineer at Wiz APJ, to unpack how Wiz has become an emerging favourite of both engineering teams and the executive suite. Beyond that, they also discussed the broader issue of the everyday realities of cloud ...
No results found.
In The News
Ping Identity Shapes the Future of Enterprise Security With AI-Driven Trust Framework
Safeguards Autonomous Agents While Keeping Humans in Control
DroneShield Surpasses 4,000 Systems Sold, $7.9m orders
ASX-listed DroneShield has announced it has surpassed 4,000 systems sold worldwide with the receipt of a package of two standalone contracts totalling A$7.9 million for handheld systems for delivery to the U.S. Department of Defense. DroneShield expects to deliver all equipment in Q4 2025, with cash payment expected in Q4 2025. No additional material ...
New Research Uncovers Large-Scale Malicious Ad Network, Illuminating Connection Between AdTech Platforms and Malicious Actors
Sydney, Australia; September 17, 2025 - Infoblox Threat Intel has released groundbreaking reporting on “Vane Viper,” a threat actor masquerading as a legitimate adtech enterprise. This group is responsible for facilitating a variety of scams and malware distribution through their affiliate advertising programs but also are directly involved in malware ...
Oracle AI Agents Help HR Leaders Boost Workforce Productivity and Enhance Performance Management
New AI agents embedded in Oracle Fusion Cloud Applications to help HR leaders automate workflows, deliver personalised career guidance, and improve talent management
ColorTokens Announces Integration with the CrowdStrike Falcon Platform
SAN JOSE, Calif., September 11, 2025 — ColorTokens Inc., today announced the integration of its Xshield Enterprise Microsegmentation Platform™ with the CrowdStrike Falcon® platform. Now available on the CrowdStrike Marketplace, the integration enables customers to accelerate Zero Trust adoption by leveraging CrowdStrike Falcon Firewall Management to ...
ColorTokens Appoints Louis (Lou) Eichenbaum as Federal Chief Technology Officer
Former U.S. Department of the Interior Chief Information Security Officer and Nationally Recognized Zero Trust Advocate to Advance Company’s Federal Cybersecurity Strategy.
Autonomous AI Agents Expand Attack Surface: Key Insights from Radware’s “Internet of Agents” Report
Radware’s latest threat intelligence report, The Internet of Agents: The Next Threat Surface, delivers a stark warning for cybersecurity leaders. The rise of agentic AI—autonomous agents capable of reasoning, invoking tools, and interacting via emerging inter-agent protocols—marks a fundamental shift in how digital systems operate. But as organisations ...
Age Checks Set to Transform How Kids Play and Interact Online
Sydney, Australia, 17 September 2025 – With kids in Australia spending an average of over two hours each day on gaming platforms, and nearly one in three young gamers reporting bullying or abuse, regulatory pressure is mounting on online platforms to provide age-appropriate environments for kids.
As well as the upcoming under-16s social media ban, ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..