The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Data Privacy Day – Qualys Shares Insights For Effective Data Security

Data Privacy Day – Qualys Shares Insights For Effective Data Security

Sam Salehi, Managing Director ANZ at Qualys shares insights for effective data security.
Phishing-as-a-Service (PhaaS) Kits Growing In Sophistication to Evade Detection

Phishing-as-a-Service (PhaaS) Kits Growing In Sophistication to Evade Detection

Phishing-as-a-Service (PhaaS) provides attackers with advanced toolsets and templates that enable them to quickly deployย phishing campaigns. The rapid rise and evolution of PhaaS is driving a fundamental change in the phishing ecosystem, making the threat increasingly complex and sophisticated. The developers behind these phishing kits invest ...
Data Privacy Day – CyberArk’s Insights For Organisations To Protect Privacy

Data Privacy Day – CyberArk’s Insights For Organisations To Protect Privacy

Olly Stimpson, Senior Security Strategy Adviser ANZ at CyberArk provides his recommendations for organisations to protect privacy in the lead up to Data Privacy Day.
Cybersecurity In 2025: What Will And Needs To Transpire

Cybersecurity In 2025: What Will And Needs To Transpire

In 2025, there will be a shift in cybersecurity focus as companies examine how they address the operational demands involving the ever-present threats from bad actors. Many companies will renew their emphasis on organizational resilience and prioritize it over third-party software. They will strengthen their in-house security frameworks to withstand ...
Data Transfer Secrets Revealed

Data Transfer Secrets Revealed

From the battlefields of war to the boardrooms of civilian enterprises, Antony Reynolds, Vice President of Federal and National Security at Bridgeworks. Reynolds, or "Tony" as Iโ€™ve come to know him, delivers revelations on the technology transforming data transfer from a sluggish chore to a lightning-fast marvel.Reynoldsโ€™ belief and metaphor ...
Make CNAPP Decisions To Stay Ahead Of Cloud Threats

Make CNAPP Decisions To Stay Ahead Of Cloud Threats

Cloud-Native Application Protection Platforms (CNAPPs) are a game changer in cloud security. CNAPPs are rapidly becoming the central nervous system of cloud defence, offering businesses a comprehensive solution to manage risk in todayโ€™s fast-changing digital environment.
The Unseen Powerhouse: 2020Partners

The Unseen Powerhouse: 2020Partners

As far as cybersecurity networks go, 2020Partners stands outโ€”a private, non-commercial coalition of senior security professionals transcending conventional borders and limitations. Greg Sim is the Founding Partner of 2020Partners and the pioneer behind this exclusive network. "Itโ€™s not even a non-profit," Greg commented, referring to the networks ...
How Mobile Devices Became the Bad Guys’ Favourite Weapon

How Mobile Devices Became the Bad Guys’ Favourite Weapon

Everyone is glued to their mobile devices, sinister cyber threats lurk beneath those sleek screens, waiting to exploit our casual scrolling and innocent application installations. According to Jeff Lindholm, Chief Revenue Officer at Lookout Technologies, our beloved smartphones and tablets are digital best friends - but most are unware their risks that ...

In The News

New Research: 63 Percent of Privacy Professionals Find Their Jobs More Stressful Now Than Five Years Ago

New Research: 63 Percent of Privacy Professionals Find Their Jobs More Stressful Now Than Five Years Ago

SYDNEY, AUSTRALIA, 22 January 2025 -ย Privacy professionals are under growing pressure as they face budget cuts, resource challenges and changes in regulations. According to ISACA's State of Privacy 2025 survey report, almost half (48 percent) expect a budget decrease in the next year and 73 percent indicate expert-level privacy professionals are the ...
Blue Connections IT Achieves ISO/IEC 27001:2022 Certification, Reinforcing Its Commitment to Security-centric IT Practices

Blue Connections IT Achieves ISO/IEC 27001:2022 Certification, Reinforcing Its Commitment to Security-centric IT Practices

January 22, 2025 - Blue Connections IT, a gold and platinum partner for the worldโ€™s largest technology vendors, has announced that it has achieved ISO/IEC 27001:2022 certification, the globally recognised standard for information security management systems (ISMS). This certification highlights the companyโ€™s dedication to implementing robust security ...
F5 Equips Network and Security Teams With AI Assistant For F5 Distributed Cloud Services

F5 Equips Network and Security Teams With AI Assistant For F5 Distributed Cloud Services

โ€˜Intelligent partnerโ€™ for SecOps and NetOps will allow teams to query network activity, drill down into security events and rapidly implement mitigations. New support for teams who must manage more deployment models than ever, with 88% of organisations now employing a hybrid approach
espresso Displays Selects Oracle NetSuite To Streamline Global Processes

espresso Displays Selects Oracle NetSuite To Streamline Global Processes

espresso Displays Gains a Sharper Picture of its Business with Oracle NetSuite Australian tech company chooses NetSuite to help streamline global processes and increase productivity as it grows SYDNEY, January 22, 2024 - espresso Displays, an Australian tech company that developed the worldโ€™s thinnest interactive portable displays, has selected ...
CloudSEK Warns of Scammers Exploiting Zendesk to Impersonate Brands

CloudSEK Warns of Scammers Exploiting Zendesk to Impersonate Brands

BENGALURU:ย CloudSEK, a leader in AI-powered cybersecurity solutions, hasย uncoveredย how cybercriminals can exploit a seemingly simple feature of Zendeskโ€™s SaaS platform. CloudSEKโ€™sย latest researchย highlights how Zendesk subdomain registrations could be misused to impersonate legitimate brands and facilitate phishing and investment scams, putting ...
Exabeam Continues to Deliver Real AI-Driven Cybersecurity with Launch of LogRhythm Intelligence Copilot

Exabeam Continues to Deliver Real AI-Driven Cybersecurity with Launch of LogRhythm Intelligence Copilot

BROOMFIELD, Colo. & FOSTER CITY, Calif. โ€“ January 20, 2025 -- Exabeam, a global cybersecurity leader that delivers AI-driven security operations, today announced the launch of LogRhythm Intelligence Copilot, a generative AI-powered feature delivering actionable insights to empower security teams and accelerate workflows. This release solidifies ...
Hack The Emulated Planet: Vulnerability Hunting Planet WGS-804HPT Industrial Switch

Hack The Emulated Planet: Vulnerability Hunting Planet WGS-804HPT Industrial Switch

Emulators such as the open-source, cross-platform QEMU framework are invaluable tools for researchers conducting vulnerability research. QEMU and other emulators act as great testing environments where software and firmware can be analyzed for exploitable vulnerabilities. They can also be taken a step further for testing exploits within a safe ...
Cognizant Leads Enterprises into Next Generation of AI Adoption with Neuroยฎ AI Multi-Agent Accelerator and Multi-Agent Services Suite

Cognizant Leads Enterprises into Next Generation of AI Adoption with Neuroยฎ AI Multi-Agent Accelerator and Multi-Agent Services Suite

Cognizant has announced its Neuroยฎ AI Multi-Agent Accelerator and Multi-Agent Service Suite. These new offerings accelerate the development and adoption of AI agents, helping empower businesses to transform their business processes using AI agents for adaptive operations, real-time decision-making, and personalised customer experiencesย -ย to support all ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This