The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Oracle Cloud – The Late Bloomer

Oracle Cloud – The Late Bloomer

For years, the tech behemoth Oracle stood in the shadows of cloud giants like Amazon and Microsoft. But now, with their second-gen Oracle Cloud Infrastructure (OCI), Oracle is rewriting the cloud playbook. Oracle is far more than just the database company as most people would have memories of.Mahesh Thiagarajan, Executive Vice President of OCI, whose ...
The Invisible Siege on Our Supply Chain

The Invisible Siege on Our Supply Chain

Daniel Churches, Sales Director at ColorTokens, a captain in breach readiness and containment, lifts the veil on the precarious state of cybersecurity today. "When I say breach readiness, I speak from a place of inevitability," Churches states. The reality is that breaches aren’t just possible; they’re practically guaranteed. "A breach is likely ...
Identity Platforms are no Longer Just a Backend Issue

Identity Platforms are no Longer Just a Backend Issue

Businesses are perpetually cornered, navigating cybersecurity threats and trying to keep their head above water with their never ending laundry list of security to-do’s. Simon Hodgkinson, Advisor from Semperis and former Chief Information Security Officer (CISO) at one of the world's largest oil companies, opened up about his experience towards ...
The Art of Mastering Cyber Risk: From Spreadsheets to Strategic Resilience in Critical Infrastructure

The Art of Mastering Cyber Risk: From Spreadsheets to Strategic Resilience in Critical Infrastructure

Critical Infrastructure leaders must move beyond compliance to integrated cyber risk management to protect services and build resilience.
Cybersecurity’s Evolution And The Shift Toward Secure-By-Design Principles

Cybersecurity’s Evolution And The Shift Toward Secure-By-Design Principles

To achieve a high level of cybersecurity maturity, organisations must move beyond reliance on security tools and AppSec experts, embracing a culture of security at all levels. Effective Secure-by-Design adoption depends on building a security-conscious workforce through structured, ongoing education and incentives that encourage developers to take ...
Navigating The Identity Security Maze: Critical Challenges For Australian Financial Services In 2025

Navigating The Identity Security Maze: Critical Challenges For Australian Financial Services In 2025

Australia's digital payments sector is booming, but many financial institutions, particularly smaller ones, face significant challenges due to outdated identity security systems. These challenges are compounded by increasing cyberattacks, stringent regulatory pressures, inefficient manual processes, and the growing complexity of machine identities. In ...
Cyber Resilience In Focus: Five Areas Every Board Must Prioritise

Cyber Resilience In Focus: Five Areas Every Board Must Prioritise

Boards need a robust risk management program and have to foster a cyber-aware culture throughout the organisation starting from the very top to help drive cyber maturity.
The Persistent Challenge: Cybersecurity in the Era of Hybrid Work

The Persistent Challenge: Cybersecurity in the Era of Hybrid Work

As businesses balance between office returns and remote work, cybersecurity challenges remain a critical concern for IT managers. Strategies to secure remote workforces against evolving threats like phishing, credential theft, and ransomware remain difficult, but essential.
No results found.

In The News

Semperis 2025 Purple Knight Report Reveals Persistent Security Gaps in Hybrid Active Directory and Entra ID Environments

Semperis 2025 Purple Knight Report Reveals Persistent Security Gaps in Hybrid Active Directory and Entra ID Environments

2025 Purple Knight Report Reveals Persistent Security Gaps in Hybrid Active Directory and Entra ID Environments The new report uncovers identity security risks, low initial assessment scores, and urgent need for remediation across Active Directory, Entra ID, and Okta—but substantial score improvements for users applying Purple Knight’s expert ...
Crypto Wallets Continue to be Drained in Elaborate Social Media Scam

Crypto Wallets Continue to be Drained in Elaborate Social Media Scam

Overview Continued research by Darktrace has revealed that cryptocurrency users are being targeted by threat actors in an elaborate social engineering scheme that continues to evolve. In December 2024, Cado Security Labs detailed a campaign targeting Web 3 employees in the Meeten campaign. The campaign included threat actors setting up meeting ...
Latest DigiCert Survey Finds Manual Processes Expose Organisations to Outages, Compliance Failures, and Six-Figure Losses as Certificate Volumes Climb

Latest DigiCert Survey Finds Manual Processes Expose Organisations to Outages, Compliance Failures, and Six-Figure Losses as Certificate Volumes Climb

Research highlights certificate mismanagement is draining enterprise resources and eroding digital trust
Operational Technology Cybersecurity Risk Elevates Within Executive Leadership Ranks

Operational Technology Cybersecurity Risk Elevates Within Executive Leadership Ranks

More than half (52 per cent) of organisations report that the chief information security officer/chief security officer is responsible for operational technology, up from 16 per cent in 2022, while 95 per cent of organisations report that the C-suite is responsible for operational technology, up from 41 per cent in 2022 
Bitdefender Forges Partnership With Creators Guild of America

Bitdefender Forges Partnership With Creators Guild of America

Bitdefender has announced a strategic partnership with the Creators Guild of America to provide digital security solutions tailored for online content creators. The partnership aims to raise awareness of the critical need for creators to protect their digital identities, content, and personal information from increasingly sophisticated and costly cyber ...
Tenable Research Warns of Critical AI Tool Vulnerability That Requires Immediate Attention [CVE-2025-49596]

Tenable Research Warns of Critical AI Tool Vulnerability That Requires Immediate Attention [CVE-2025-49596]

Tenable Research has identified a critical remote code execution vulnerability (CVE-2025-49596) in Anthropic's widely adopted MCP Inspector, an open-source tool crucial for AI development. With a CVSS score of 9.4, this flaw leverages default, insecure configurations, leaving organisations exposed by design. MCP Inspector is a popular tool with over ...
S&P 500 fetches Datadog

S&P 500 fetches Datadog

NASDAQ-listed monitoring and security platform for cloud applications, Datadog, has announced its inclusion on the S&P 500 Index, effective prior to the opening of trading today. The S&P 500 is widely regarded as the best single gauge of large-cap U.S. equities, tracking the stock performance of 500 leading US companies. Datadog’s addition ...

AI-Generated Media Drives Real-World Fraud, Identity Theft, and Business Compromise

Trend Micro uncovers the criminal playbook for deepfake-enabled cybercrime
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This