The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

From Chaos to Command: Secure Communications at Scale for Public Safety

From Chaos to Command: Secure Communications at Scale for Public Safety

Introduction When it comes to public safety, every second counts. If communication breaks down, so does the response - leading to losses in time, coordination, effectiveness, and public trust. During large-scale incidents, a persistent “communications gap” emerges: the critical distance between information being available and that same information ...
Securing Australian Organisations in the Quantum Era

Securing Australian Organisations in the Quantum Era

Australian organisations are under-prepared for the cybersecurity threat of quantum and should take these steps to minimise disruption as the technology takes hold.
Deepfakes are Spiralling Out of Control, But How Far Will It Go?

Deepfakes are Spiralling Out of Control, But How Far Will It Go?

David Wiseman, Vice President of Secure Communications at BlackBerry spoke with me about the increase of deepfakes which are our own voices and countenance that can be fabricated to present like it's us. But its not us. “Anyone’s voice can be deep faked at this point,” warned Wiseman. “Anyone with some basic set of tooling can generate that deep ...
The Hidden Costs To Consider When Selecting A Cyber Security Vendor

The Hidden Costs To Consider When Selecting A Cyber Security Vendor

Evaluating cyber security vendors through the lens of their vulnerability management practices - including frequency, severity, and time-to-patch - is no longer optional. It’s an essential part of any strategic approach to risk mitigation and long-term operational resilience.
The CEO’s Cyber Equation – Can Your Business Outpace the Attacker?

The CEO’s Cyber Equation – Can Your Business Outpace the Attacker?

"It takes years to build trust, but only minutes for a breach to break it." Cybersecurity is no longer only a technical concern. It is a leadership imperative that has a direct impact on trust, reputation, and business survival. Even if your company has never experienced a breach, attackers are continually probing your systems, seeking weaknesses. ...
A CISO’s Love Letter to The Board – Cyber Risk Quantified

A CISO’s Love Letter to The Board – Cyber Risk Quantified

Cybersecurity has a communication problem: CISOs still speak in technical jargon while boards listen for financial impact. This byline reframes cyber risk as a business language of dollars and cents — the true “love language” of executives. Drawing on new research, it argues that risk quantification is the CISO’s secret weapon, shifting the focus from ...
The New Normal – Ransomware as a Service

The New Normal – Ransomware as a Service

Introduction Gone are the days that cyber threats and attacks are the work of elite hackers, or those who have deep coding skills, nation state support, and unique access to high-level tools. In 2025, and accelerating in coming years, it’s disturbingly easy to launch an attack. With ready-made malware or custom code sold on the dark web, anyone ...
Why Measuring The Right Threat Intelligence Metrics Is Key To SOC Success

Why Measuring The Right Threat Intelligence Metrics Is Key To SOC Success

Organisations must detect, investigate, and respond to threats faster than ever. Success depends on measuring the right threat intelligence metrics which are those that can separate meaningful insights from overwhelming noise. For businesses, failing to do so risks reputational damage and financial loss.
No results found.

In The News

CrowdStrike and Nord Security Announce Strategic Partnership to Redefine SMB Cybersecurity

CrowdStrike and Nord Security Announce Strategic Partnership to Redefine SMB Cybersecurity

The partnership combines Nord Security’s secure access and credential management solutions with the CrowdStrike Falcon platform, delivering enterprise-grade protection that’s simple, accessible, and built for every business
Motorola Solutions Expands AI-Powered Security Platform to Solve Complex Safety and Operational Challenges

Motorola Solutions Expands AI-Powered Security Platform to Solve Complex Safety and Operational Challenges

At Intersec Dubai, Motorola Solutions is showcasing how its latest advancements in AI are helping critical enterprises and security providers maintain safety and awareness across vast operations, moving from reactive incident detection to proactive response. Avigilon Visual Alerts uses intuitive conversational interfaces to significantly expand the ...
SecurityBridge Announces CEO Transition to Accelerate Global Expansion

SecurityBridge Announces CEO Transition to Accelerate Global Expansion

Ingolstadt, Germany, January 12, 2026 - SecurityBridge, a leading provider of cybersecurity solutions for SAP, today announced the appointment of Jesper Zerlang as Chief Executive Officer, effective January 1, 2026. Zerlang transitions from his role as Chairman of the Board, a position he has held for the past 12 months, as the company enters its next ...
Radware Reveals ZombieAgent Zero-Click Vulnerability Enabling Silent AI Agent Takeover and Data Exfiltration

Radware Reveals ZombieAgent Zero-Click Vulnerability Enabling Silent AI Agent Takeover and Data Exfiltration

Radware® (NASDAQ: RDWR), a global leader in application security and delivery solutions for multi-cloud environments, today announced the discovery of ZombieAgent, a new zero-click indirect prompt injection (IPI) vulnerability affecting OpenAI’s ChatGPT models. The vulnerability could enable attackers to silently hijack AI agents, persist within their ...
Ping Identity Marks Digital Trust Milestone with Zero-Knowledge Biometrics in the Age of AI

Ping Identity Marks Digital Trust Milestone with Zero-Knowledge Biometrics in the Age of AI

Completion of the Keyless acquisition adds privacy-preserving biometric authentication and re-verification to strengthen enterprise defences against AI-powered spoofing and fraud.
Ping Identity Appoints Adnan Chaudhry as Chief Revenue Officer to Scale Trusted Identity for the AI Era

Ping Identity Appoints Adnan Chaudhry as Chief Revenue Officer to Scale Trusted Identity for the AI Era

Enterprise go-to-market leader joins Ping Identity as organisations face accelerating demand for trusted identity in an AI-driven world
Exabeam Introduces First Connected System for AI Agent Behaviour Analytics and AI Security Posture Insight

Exabeam Introduces First Connected System for AI Agent Behaviour Analytics and AI Security Posture Insight

Industry leadership expanded with connected capabilities that not only uncover AI agent activity, but centralise investigation, and deliver measurable AI security posture insights
NinjaOne Surpasses US$500 Million in ARR in Record Fiscal Year

NinjaOne Surpasses US$500 Million in ARR in Record Fiscal Year

NinjaOne has today announced significant business momentum in fiscal year 2025 as global demand for the NinjaOne Unified IT Operations Platform significantly outpaces growth within the broader IT market.  NinjaOne’s recent business and financial achievements include: Completing the acquisition of Australian SaaS backup and data protection ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This