The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

The Five Key Processes For Staying Secure With SAP
Upon efficiently securing your SAP environment, the next step is to learn how to maintain that security and continuously improve your SAP Security posture. This article highlights some specific recommendations for SAP Security processes.

The Increasing Role Of LLMs And AI In Physical Security
The rapid rise of large language models (LLMs) has ushered in a new era of technological possibilities. These AI-driven systems, capable of generating human-quality text, code, and even creative content, have captured the imagination of industries worldwide. The physical security sector is no exception, exploring how LLMs can enhance operations from ...

Oracle is More Than Just a Database Company That Everyone Remembers, says Regional Managing Director
I headed over to my almost second home Las Vegas in the United States - where I was at the coalface at the Oracle CloudWorld Event hosted at the Venetian. I, like others, have traditionally known Oracle as the database company - despite OCI generating a foothold in the market. Stephen Bovis, Regional Managing Director of Oracle Australia, New Zealand, ...

Taking a Zero Trust Approach to Managing IoT in Manufacturing
As the manufacturing industry increasingly embraces the Internet of Things (IoT), the imperative for robust cybersecurity has never been more urgent.

Vital Signs: Why Monitoring High Tech Systems And Data Is Critical For Australian Healthcare Providers
World Patient Safety Day is a timely reminder of the threat hackers and cyber-criminals pose to the country’s most vulnerable.

What you missed at TechLeaders 2024
I recently headed down to TechLeaders, which was hosted at Kirkton Park in the Hunter Valley.
TechLeaders Australia is dedicated to the Australian technology industry. It serves as a platform for professionals, businesses, and organisations to connect, collaborate, and stay informed about the latest trends and developments in the tech sector. This ...

How AI is Helping to Strengthen Corporate Cybersecurity
As AI continues to permeate an increasing portion of daily business life, the need for robust cybersecurity measures has become vital.

Acting With Intent With AI
The need for intention
Jim Carrey said, “Not one single thing has ever been accomplished without intention”.
When we intentionally set out to do something we plan to fulfil a motive, purpose, or objective as a result. There is a meaning behind the action; a sense of achieving some sort of progress after it’s done.
Modern artificial intelligence ...
No results found.
In The News
Rapid GenAI Application Adoption Drives New Era of Application and Infrastructure Modernisation
Nutanix study reveals that GenAI is changing organisations priorities, with security and privacy being a primary concern
Pax8 Adds Foxit’s Innovative PDF and eSignature Solutions to its Cloud Marketplace
SYDNEY, AU (February 6, 2025) – Pax8, the leading cloud commerce marketplace, has added new offerings to the Pax8 Marketplace from Foxit, a leading provider of innovative PDF and eSignature products and services. With Foxit's advanced document management technology now available in the marketplace, Pax8’s global network of partners can now access ...
Report: North Korea Cybercriminals Target Linkedin Users With Fake Job Ads
Bitdefender Labs has issued a warning on an active campaign by the North Korea-linked Lazarus Group, targeting organisations by capturing credentials and delivering malware through fake LinkedIn job offers.
LinkedIn may be a vital tool for job seekers and professionals, but it has also become a playground for cybercriminals exploiting its ...
Tenable Comment on DeepSeek Ban In AU Government
Governments in the U.S, Italy, and now Australia have moved to ban access to DeepSeek, a Chinese-developed large language model (LLM), on government devices. These bans stem from concerns over data security and the potential exposure of sensitive information to the PRC.
However, blocking access to DeepSeek is not as simple as restricting its website ...
Kyndryl Introduces SASE Services Combined With Palo Alto Networks Prisma SASE to Provide a Unified Network Security Posture for Customers
Kyndryl’s end-to-end SASE services will help customers drive adoption of Palo Alto Networks’ cloud-first, zero-trust solution for network security
CyberArk and SentinelOne Team Up to Enable Step Change in Endpoint and Identity Security
Mutual customers will benefit from boosted endpoint threat detection and response capabilities
Dynatrace Expands Security Portfolio With Cloud Security Posture Management Solution
Unified security and observability enable continuous compliance and response automation for major cloud platforms
LAS VEGAS, NV, February 4, 2025 – Dynatrace (NYSE: DT), the leading AI-powered observability platform, today announced the expansion of its security portfolio with a new Cloud Security Posture Management (CSPM) solution. For enterprises ...
Do The CONTEC CMS8000 Patient Monitors Contain A Chinese Backdoor? The Reality Is More Complicated
On 30 January, The Cybersecurity Infrastructure & Security Agency (CISA) released an alert, complemented by a notification from the U.S. Food and Drug Administration (FDA) suggesting that the Contec CMS8000 patient monitor and OEM white-label variants contain a backdoor communicating to a Chinese IP address.
Team82 investigated the firmware and ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..