The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Do You Use Free Wi-Fi in Public Places?

Do You Use Free Wi-Fi in Public Places?

In today's modern life, we find ourselves highly dependent on the connected world. Think about it, almost everything we do or need in some form requires being connected via a website, app or computer platform. We carry most of us smartphones which are smarter than the computer systems that enabled man to land on the moon.  Seriously, just think ...
AI Broke Cybersecurity and Corporate Leadership Still Hasn’t Noticed

AI Broke Cybersecurity and Corporate Leadership Still Hasn’t Noticed

​Code is now being written and shipped faster than most security programs were ever built to withstand. Developers are moving at speed. Product teams are pushing releases earlier. And companies are racing to stay competitive often without fully grasping the risks they’ve just signed up for.Sonali Chaudhuri, Founder of MySmartOps commented,“...Exposing ...
Blockchain Auditing in Practice: What Executives Need to Understand Now

Blockchain Auditing in Practice: What Executives Need to Understand Now

Blockchain doesn’t remove trust, it relocates it into code, consensus, and governance. Learn how to audit blockchain systems using ISO 27001, COBIT, and NIST without starting over, and where risk truly lives.
Cyber Powerhouse Ben Doyle Walks Away From Thales

Cyber Powerhouse Ben Doyle Walks Away From Thales

After 22 years as the longest tenured CISO in Australia at the same organisation, beloved Ben Doyle is officially stepping away from his role at Thales... and yep, the cyber industry is feeling it. “I have been extremely lucky having the tenure, support, and career opportunity at an organisation like Thales that allowed me to grow as the cyber ...
In the Age of Microsegmentation Enforcement in Hours, Are You Still Shutting Down Operations?

In the Age of Microsegmentation Enforcement in Hours, Are You Still Shutting Down Operations?

I was researching cyberattacks, and a common theme popped out. “We had an unprecedented cyberattack… and we shut down our operations to protect stakeholder interests.” I know, breaches can be strenuous. The initial hours following a breach are often marked by chaos and urgency as crisis leaders call vendors, disconnect systems, analyze logs, and ...
Economic Statecraft Is the New Force Multiplier

Economic Statecraft Is the New Force Multiplier

​Defence power is no longer defined by platforms alone. It’s shaped upstream, by capital allocation, ownership rules and the speed at which states can convert technology into deployable capability. That shift is already underway. Many governments recognise it. Some have redesigned their systems around it. Australia is still adapting, albeit slowly, to ...
How Strider Technologies Is Mapping Foreign Interference Across Western Innovation

How Strider Technologies Is Mapping Foreign Interference Across Western Innovation

Foreign states are extracting openly, legally and at scale from Western systems that were built on trust, transparency, and collaboration. Paul Maddison, Australia, and New Zealand Country Manager at Strider Technologies, talks about a threat that rarely announces itself. “Strider is a company that was founded six years ago in response to this sort ...
Encryption Isn’t Enough: The Hidden Threat of Messaging Metadata

Encryption Isn’t Enough: The Hidden Threat of Messaging Metadata

Today’s Digital Landscape Metadata is one of the most overlooked security risks in modern digital communications. Adversaries no longer need to break into encrypted chats to understand your intent; all they need is your metadata. For government officials who deal with national security, foreign relations, or coordination of high-stakes operations ...
No results found.

In the News

Geopolitical Tensions Drive Sustained Surge in Cyber Attacks

Geopolitical Tensions Drive Sustained Surge in Cyber Attacks

Bitdefender has today released new research revealing that cyber attacks linked to geopolitical conflict are escalating in both volume and sophistication, with a 130% increase in phishing and malware campaigns targeting Gulf countries following the recent escalation involving Iran, Israel and the United States. The research shows a clear inflection ...
LevelBlue and SentinelOne Announce Expanded Strategic Global Partnership to Deliver AI-powered Managed Security Operations and Incident Response

LevelBlue and SentinelOne Announce Expanded Strategic Global Partnership to Deliver AI-powered Managed Security Operations and Incident Response

Partnership combines AI-driven detection, advanced SIEM analytics, and global MDR and incident response to reduce dwell time and strengthen cyber resilience
 Getac Announces CommandCore: Remote Drone Control Solution for Defence, Public Safety and Utilities in Australia and New Zealand 

 Getac Announces CommandCore: Remote Drone Control Solution for Defence, Public Safety and Utilities in Australia and New Zealand 

CommandCore offers extensive customisation options for optimal operational efficiency in a wide range of use cases spanning land, sea and air. 
Good Drinks Australia Brews Stronger Network and Security With Macquarie Telecom

Good Drinks Australia Brews Stronger Network and Security With Macquarie Telecom

Independent Australian brewer improves reliability, efficiency and cyber security with AI powered SASE network solution
Akamai Guardicore Segmentation Transforms Zero Trust With New AI-Powered Capabilities

Akamai Guardicore Segmentation Transforms Zero Trust With New AI-Powered Capabilities

Latest enhancements enable simpler, faster, and safer segmentation
Introducing Tenable Hexa AI: The Agentic Engine That Supercharges Security Productivity and Accelerates Risk Reduction

Introducing Tenable Hexa AI: The Agentic Engine That Supercharges Security Productivity and Accelerates Risk Reduction

The Tenable One agentic AI engine orchestrates out-of-the-box and custom agents to automate security workflows and turn exposure intelligence into action 
CrowdStrike Introduces Falcon Data Security to Stop Data Theft Across the Agentic Enterprise

CrowdStrike Introduces Falcon Data Security to Stop Data Theft Across the Agentic Enterprise

CrowdStrike discovers, classifies, and secures sensitive data wherever it lives and moves, spanning endpoints, browsers, SaaS, cloud, and AI workflows
Databricks Enters Security Market With Launch of Lakewatch: New Open, Agentic SIEM

Databricks Enters Security Market With Launch of Lakewatch: New Open, Agentic SIEM

New product enables unlimited and unified data, petabyte-scale threat detection and investigations at up to 80% lower TCO
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This