The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
In The News

Stop banning, start training call for ChatGPT and AI tech
Next week’s ACS Emerging Technologies forum explores tech opportunities

Aiven Continues Open Source Streaming Ecosystem Innovation with General Availability for Aiven for Apache Flink®
Apache Flink® service enables enterprises and developers to process streaming data in real time and deploy their fully managed Flink applications in the cloud of their choice.

Open source software: A pillar of modern software development
Today’s modern software applications simply would not exist, or be as powerful, without the use of open source software (OSS). Developers design open source software with source code that is accessible for anyone to use, modify, and learn from, and they release the code with specific licensing rights.

CSO Group Hires one of Government’s Top CISOs
Government and financial services security veteran Matthew Fedele-Sirotich joins Australian-owned Cyber Security Company

ChatGPT May Already Be Used In Nation State Cyberattacks, Say IT Decision Makers in BlackBerry Global Research
51% of IT decision makers believe there will be a successful cyberattack credited to ChatGPT within the year and 95% believe governments have a responsibility to regulate advanced technologies, such as ChatGPT

Zscaler Introduces Industry’s First Cloud Resilience Capabilities for SSE to Ensure Nonstop Cloud Security Operations
Zscaler Resilience Extends the Flexibility of Zscaler’s Cloud Platform and Preserves Interconnections to Any App for Rapid Recovery from Unforeseen Events and Attacks

Afterpay reduces fraud risk with Cloudera while managing data at scale
Cloudera Data Platform provides speed and scalability to align with business growth; ability to ingest data increases by 8-fold with its 3.6 million customers in 12 months

Finding hard-coded secrets before you suffer a breach
Hard-coded secrets include any type of sensitive information, such as usernames, passwords, SSH keys, and access tokens.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..