The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

What in the DeepSeek?

What in the DeepSeek?

DeepSeek, the tool designed to exploit vulnerabilities in AI systems, raises significant concerns amongst the security industry, particularly OpenAI. The DeepSeek competitor discussed the potential for DeepSeek to undermine the security of AI applications, which could have far-reaching consequences for technology as we know it. Satnam Narang, Senior ...
AI First, Human Second: The New Cybersecurity Command Structure

AI First, Human Second: The New Cybersecurity Command Structure

"Man is the measure of all things." ― Protagora - pre-Socratic Greek philosopher It’s an ancient idea, yet it feels more relevant than ever as machines start making decisions that were once left to human minds. In today’s high-stakes cybersecurity landscape, artificial intelligence is no longer a future wager; it’s a frontline asset. AI systems detect ...
Data Management – It’s A High-stakes Game

Data Management – It’s A High-stakes Game

This article explores the security risks associated with poorly managed data, and details how regulations from OAIC and APRA are raising the stakes for both professionals and organisations alike.
Account Takeover Attacks on Social Media: A Rising Threat for Content Creators and Influencers

Account Takeover Attacks on Social Media: A Rising Threat for Content Creators and Influencers

In 2024 and continuing into 2025, social media platforms were prime targets for cybercriminals, with content creators facing the brunt of the malicious attacks, including a surge in account takeovers, malicious live streams, and sophisticated phishing campaigns. Bitdefender Labs has been at the forefront in analysing these threats, and the numbers ...
The Growing Nexus of Cyber Security and Financial Warfare – An Australian’s Perspective

The Growing Nexus of Cyber Security and Financial Warfare – An Australian’s Perspective

Opening Remarks Sadly, it has become an undeniable reality that the traditional boundaries between conventional warfare and economic statecraft are rapidly dissolving. Cyber security and financial warfare have evolved into critical instruments of geopolitical influence and power projection, with significant implications for nations like Australia. The ...
Security Is An Arms Race, and The Bad Guys Are Two Steps Ahead

Security Is An Arms Race, and The Bad Guys Are Two Steps Ahead

Cloud environments are a notorious ransomware attack hot spot. It’s a calculated strategy on the part of the cybercriminals. As the old adage goes, ‘follow the money’, and that’s exactly what they’re doing. Predictions suggest cloud infrastructure spend will reach over US$135 billion in 2026, accounting for over 67 per cent of total compute and ...
The Challenges of Underfunding Data Teams: How Data Drives AI and Security

The Challenges of Underfunding Data Teams: How Data Drives AI and Security

This article delves into the critical role of data teams in supporting AI and security initiatives within organisations. It highlights the challenges that arise from underfunding these teams, emphasising the importance of data quality, governance, and management. The piece explores the imbalance in budget allocation, potential risks, and inefficiencies ...
Google’s Acquisition of Wiz Signals a Shift in Cloud Security

Google’s Acquisition of Wiz Signals a Shift in Cloud Security

The cloud security landscape is facing a seismic shift. With Google’s recent acquisition of Wiz, one of the industry’s most prominent cloud security providers, many in the industry are considering the implications of cloud providers also serving as vendors. Organisations operating in multi-cloud and hybrid environments must carefully evaluate how these ...
No results found.

In The News

Infoblox Unveils 2025 DNS Threat Landscape Report, Revealing Surge in AI-driven Threats and Malicious Adtech

Infoblox Unveils 2025 DNS Threat Landscape Report, Revealing Surge in AI-driven Threats and Malicious Adtech

Of the 100.8 million newly observed domains, 25.1 per cent were classified as malicious or suspicious. 82 per cent of environments contacted malicious adtech domains.
Palo Alto Networks Redefines Application Security with the Industry’s Most Comprehensive Prevention-First ASPM

Palo Alto Networks Redefines Application Security with the Industry’s Most Comprehensive Prevention-First ASPM

Cortex Cloud expands the platform with a prevention-first ASPM to automatically stop risks from reaching production. New open AppSec partner ecosystem unifies all data from industry-leading AppSec providers on a single platform for unprecedented cross-vendor visibility.
1 in 4 Australians fall for online scams, as confidence and convenience fuel cyber risks

1 in 4 Australians fall for online scams, as confidence and convenience fuel cyber risks

Trend Micro research reveals mobile usage and social platforms are driving growing scam culture in Australia
Claroty and Google Join Forces to Secure Mission-Critical Infrastructure

Claroty and Google Join Forces to Secure Mission-Critical Infrastructure

Integration of Claroty Platform with Google Security Operations Brings More Efficient, Intelligent Approach to Protecting Mission-Critical Infrastructure
Independent Research Firm Cites BeyondTrust as a Leader in Privileged Identity Management Report

Independent Research Firm Cites BeyondTrust as a Leader in Privileged Identity Management Report

Achieves top scores possible in 13 criteria, including innovation, vision, partner ecosystem, and identity threat detection and response. BeyondTrust recognised for “exceptional vision” that “centers on an identity-first security strategy.”
Ping Identity Named a Leader in Three 2025 KuppingerCole Reports

Ping Identity Named a Leader in Three 2025 KuppingerCole Reports

Ping Identity Leads Across Access Management, Identity Fabrics and Policy Based Access
CrowdStrike Extends AI Agent Security Across the SaaS Stack

CrowdStrike Extends AI Agent Security Across the SaaS Stack

Falcon Shield adds visibility and governance to OpenAI GPT-based agents – including those built with ChatGPT Enterprise and OpenAI Codex – expanding support for 175+ SaaS applications and the AI agent identities reshaping the modern attack surface
CrowdStrike Delivers a New Era of Operational Threat Intelligence, Personalized to Each Customer Environment

CrowdStrike Delivers a New Era of Operational Threat Intelligence, Personalized to Each Customer Environment

Latest Falcon Adversary Intelligence release embeds real-time, customized insights into analyst workflows, accelerating detection, investigation, and response 
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This