The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Janice Le – GM, Microsoft Security, Compliance, Identity & Privacy

Janice Le – GM, Microsoft Security, Compliance, Identity & Privacy

Watch The Interview  Biography Janice is GM, Microsoft Security Compliance, Identity & Privacy at Microsoft where she oversees strategy, operations, and portfolio marketing for Microsoft Security. She has served the tech industry in Silicon Valley over the last 20+ years at enterprises and startups in product, marketing, and GM roles for ...
The End of Pentest Reporting Chaos: OWASP Standardises the Industry

The End of Pentest Reporting Chaos: OWASP Standardises the Industry

For years, penetration testing reports have been inconsistent, manual, and difficult to integrate into modern security workflows. Every provider has its own format, slowing down remediation and making automation nearly impossible. The OWASP Penetration Test Reporting Standard (OPTRS) is designed to fix this. It provides a structured, machine-readable ...
2024 Lessons Shaping 2025 Cybersecurity Trends

2024 Lessons Shaping 2025 Cybersecurity Trends

Discover key lessons from 2024 cyberattacks and how they’ll shape 2025 cybersecurity trends. Learn to build resilience with breach ready defenses.
Navigating And Combatting Scams In Banking

Navigating And Combatting Scams In Banking

By adopting a comprehensive cybersecurity strategy that integrates multiple data sources and streams and enhances the digital experience, banks can significantly bolster their defences and protect their customers.
The Two Forces Reshaping Our Cyber Defences For The Better

The Two Forces Reshaping Our Cyber Defences For The Better

Introduction It’s very hard to catch a ball in flight without being able to make real-time calculations based on a continuous and uninterrupted stream of information from your eyes to your brain. The same can be said for cyber security. It’s tough to catch threats in play without truly real-time data. The need for real-time data and data processing ...
Understanding The Risks Associated With ‘Shadow AI’ In Software Development

Understanding The Risks Associated With ‘Shadow AI’ In Software Development

There are ways for CISOs to bring AI-assisted coding out of the shadows, allowing staff to get the most out of productivity benefits while avoiding vulnerabilities. This can be done by embracing it – as opposed to blanket suppression – and pursuing a three-point plan to establish reasonable guardrails and raise security awareness capabilities among ...
Six Trends Shaping The Future Of The Security Industry In 2025

Six Trends Shaping The Future Of The Security Industry In 2025

In 2025, security will be transformed by hybrid architectures, advanced AI, and high-resolution imaging, enabling smarter, more flexible systems. Security technologies will deliver business intelligence, while software-driven solutions and core technology ownership ensure resilience, efficiency, and innovation.
Malicious AdTech And Compromised Websites: A Dangerous Combination

Malicious AdTech And Compromised Websites: A Dangerous Combination

In the security industry, we rarely tell a story from the victim’s perspective. Instead, we focus on a malicious actor’s perspective: their tactics, techniques, and procedures (TTPs). So, I decided to take a turn as a victim and see what happened after visiting a compromised website with malicious adtech.
No results found.

In The News

Elastic Brings Enterprise Data to NVIDIA AI Factories

Elastic Brings Enterprise Data to NVIDIA AI Factories

Elasticsearch integrates with NVIDIA Enterprise AI Factory validated design to fuel AI agents and generative AI applications with real-time intelligence
SecurityBridge to Showcase AI-Powered CVA and Microsoft Sentinel Integration at SAP Sapphire 2025

SecurityBridge to Showcase AI-Powered CVA and Microsoft Sentinel Integration at SAP Sapphire 2025

SecurityBridge will be exhibiting at booth #414, demonstrating the latest innovations in SAP cybersecurity, including its newly released AI-powered Code Vulnerability Analyzer (CVA) and enhanced integration with Microsoft Sentinel.
Elastic Announces General Availability of Elastic Cloud Serverless on Google Cloud Marketplace

Elastic Announces General Availability of Elastic Cloud Serverless on Google Cloud Marketplace

Developers building observability, security, and search applications benefit from uncompromised speed and scale
NVIDIA Enterprise AI Factory Integrates CrowdStrike’s Falcon Platform Into Validated Design Architecture

NVIDIA Enterprise AI Factory Integrates CrowdStrike’s Falcon Platform Into Validated Design Architecture

CrowdStrike delivers end-to-end protection for enterprise AI factories built with NVIDIA Enterprise AI Factory validated design architecture
Tenable Powers AI-Driven Exposure Management with Third-Party Data Connectors and Unified Dashboards

Tenable Powers AI-Driven Exposure Management with Third-Party Data Connectors and Unified Dashboards

Tenable One bridges siloed security tools for faster, smarter, business-aligned security decisions
Cisco Study Reveals Alarming Deficiencies In Security Readiness

Cisco Study Reveals Alarming Deficiencies In Security Readiness

Cybersecurity readiness remains alarmingly low as only 3 percent of organisations in Australia have achieved a mature level of readiness. Organisations continue to struggle with the complexities introduced by AI, with 82% having experienced AI-related security incidents in the last year. The ongoing shortage of skilled cybersecurity professionals ...
Barracuda Appoints Michelle Hodges as Senior Vice President of Global Channels and Alliances

Barracuda Appoints Michelle Hodges as Senior Vice President of Global Channels and Alliances

Veteran Leader to Spearhead Barracuda’s Channel Strategy, Accelerating Growth and Engagement Across Partner Ecosystem
Exabeam Research Uncovers AI Disconnect Between APJ Security Leaders and Practitioners

Exabeam Research Uncovers AI Disconnect Between APJ Security Leaders and Practitioners

71% of APJ executives report AI-driven productivity gains; only 5% of analysts agree
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This