The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Combating AI-Driven Attacks with Predictive Breach Technology
Zscaler's CSO and Head of Security Research, Deepen Desai, recently discussed the latest advancements in AI, cybersecurity, and zero trust strategies during his talk at Zenith Live.
One of the key focal points of Desai's presentation was the intersection of AI and cybersecurity. The Researcher explained the landscape of AI-driven attacks and how ...

Small Businesses Can Pull Their SOCs Up
Security Operations Centres, or SOCs, are no longer the exclusive domain of large enterprises. Cost-prohibitive legacy on-premises security solutions have given way to the cloud solutions offering greater scalability for enterprises.

Unlocking Cybersecurity Talent – There Are No mythical Unicorns, But You Can Create Strong Diverse Teams
The mythical cybersecurity unicorn – someone that can manage the minutiae of data coming in from logs, understand business risks in detail, communicate them to your board and run your security education and awareness program – does not exist.

Mobile Security Becomes Critical as Android Users Continue Using Handsets After Expiry
As people put off upgrading their still-functional Android phones, an ever-growing proportion are becoming outdated, and threat actors are cashing in.

Why Software Developers Play a Critical Role in Achieving Effective Cybersecurity
Raising the standard of code quality will take a significant change in how developers view and learn security best practices. With the challenge of protecting against an evolving threat landscape in perpetuity, the time to implement lasting change is now.

The Future of VPNs? No Where.
Zscaler's SVP and GM Product Management, Dhawal Sharma, sat down with me in an interview at Zenith Live in Las Vegas to discuss his opinion on ‘Zero Trust’.
Sharma shared insights about the evolution of zero trust architecture and the future of VPNs. There are many challenges, misconceptions, and practical applications of zero trust, along with the ...

Predicting The Future – With Kavitha Mariappan
What Developments In The Threat Landscape Do Australians Need To Be Aware Of?
In addition to the usual activity from Russia and Chinese state-sponsored groups, the activity that is most concerning is how state-sponsored attackers are targeting critical infrastructure. The FBI recently warned that China and Russia are ramping up attacks against ...

How to Protect Against the Rising Tide of Password Spray Attacks
Password spray attacks are a growing threat, and businesses must adopt a multi-layered approach to secure their data. Implementing robust security measures, enforcing strong password policies, and educating users about cybersecurity best practices are crucial steps in the right direction.
In The News
Pegasystems Passes IRAP Assessment, Expanding Secure Service Delivery for Australian Government Organisations
Pegasystems recently announced its completion of IRAP (Information Security Registered Assessors Program), achieving Protected status. This milestone enables Australian government organisations and regulated industries to utilise Pega's industry-leading enterprise AI decisioning and workflow automation solutions while meeting stringent security ...
JFrog And GitHub Elevate DevSecOps With Unified Platform Experience
New integration brings enhanced security and real-time monitoring to developers' workflows
JFrog, the Liquid Software company and creators of the JFrog Software Supply Chain Platform, and GitHub, the world’s leading AI-powered developer platform, have announced new advancements to help enterprises accelerate the release of trusted software at scale. ...
Trend Micro Safeguarding Cloud Data Of Healthcare AI Innovation Leader
Offering security solutions protecting all cloud platforms: AWS, Azure, and Google Cloud
Veeam Named a Leader in Data Resilience Solutions in Forrester Research report
Veeam® Software, the #1 leader by market share in Data Resilience, today announced that global research firm, Forrester Research has positioned the company as a Leader in The Forrester Wave™: Data Resilience Solutions, Q4 2024. Veeam received the top score in the strategy category and the Customer Feedback marker indicating above-average customer ...
Leading Brewer Lion Chooses Informatica to Support Data Management Transformation
Informatica (NYSE: INFA), a leader in enterprise AI-powered cloud data management, today announced that leading Australian and New Zealand brewer, Lion, has appointed Informatica to support its data management transformation.
Dynatrace Joins the Microsoft Intelligent Security Association
Dynatrace (NYSE: DT) has become a member of the Microsoft Intelligent Security Association (MISA) to provide customers with enhanced cloud security solutions through continuous innovation and collaboration with Microsoft and other MISA members. MISA is an ecosystem of independent software vendors (ISVs) and managed security service providers (MSSPs) ...
Quorum Cyber Achieves Microsoft Information Protection And Governance Specialization
Quorum Cyber now holds three Microsoft Security specializations of Threat Protection, Cloud Security, and Information Protection and Governance.
Fortinet Partners With The Department For Education In South Australia To Strengthen Cybersecurity Awareness
Fortinet reaffirms its dedication to empower educators with cybersecurity knowledge crucial for maintaining a safe digital learning environment
ADELAIDE, Australia, November 25, 2024
Dale Nachman, country manager, Australia, at Fortinet
“Fortinet’s partnership with the Department for Education in South Australia for security ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..