The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Ransom Data Should Be Made Public

Ransom Data Should Be Made Public

The Government should consider making data on ransoms paid for cyber attacks public to educate industry about the scale of the problem.
Cybersecurity in the Age of AI

Cybersecurity in the Age of AI

Venky Raju, Field CTO, ColorTokens, writes on why AI-powered threats demand a shift in breach readiness strategies and how microsegmentation can help.
Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum

Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum

The sale and purchase of unauthorised access to compromised enterprise networks has become a linchpin for cybercriminal operations, particularly in facilitating ransomware attacks. Underground forums are sharing guidelines on breaching networks and selling the access they obtain, leaving the exploitation to other malicious actors. In this article, we ...
The Role Of Data Resilience In AI And Cybersecurity

The Role Of Data Resilience In AI And Cybersecurity

Good AI and Cybersecurity Relies On Resilient Data General awareness of the technology landscape is currently driven by ongoing coverage on two sectors: AI and cybersecurity. AI has captured the attention of industry leaders and media alike resulting in comprehensive research initiatives such as those of the Australian National University, and ...
Cyber-insecurity – The Contact Centre Challenge (and Solution)

Cyber-insecurity – The Contact Centre Challenge (and Solution)

Introduction Contact centres are prime targets for cyberattacks due to the vast amounts of sensitive customer information they handle. Ensuring the security of this data is more than a technical challenge, it’s a critical business imperative. Consequently, the intersection of cybersecurity, contact centres, and artificial intelligence (AI) is ...
Securing IoMT Devices: Key Steps to Implementing Microsegmentation in Healthcare

Securing IoMT Devices: Key Steps to Implementing Microsegmentation in Healthcare

Learn how to secure IoMT healthcare devices with zero trust microsegmentation. Discover key steps for visibility, segmentation, and continuous monitoring.
From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems

From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems

Malicious traffic distribution systems (TDSs) have flown under the radar of most cybersecurity organisations for years: they have been largely ignored and thought of as simply advertising networks or “adware”, a term associated with nuisances and not threats. Cybercriminals have used this to their advantage and have built massive networks of domains ...
Disrupting The Cost Trajectory: Five Ways To Maximise Your Digital Transformation ROI

Disrupting The Cost Trajectory: Five Ways To Maximise Your Digital Transformation ROI

Technology leaders are increasingly asked to achieve more with fewer resources. Coupled with skills shortages, limited budgets, and outdated digital assets, striking this balance has never been more critical. The question - how can technology leaders realign their resources into high-value projects that deliver more for less? Here's five ways to drive ...
No results found.

In The News

JFrog and Hugging Face Team to Improve Machine Learning Security and Transparency for Developers

JFrog and Hugging Face Team to Improve Machine Learning Security and Transparency for Developers

New integration significantly improves the quality and trustworthiness of open-source ML Models, resulting in safer, more responsible AI for everyone
JFrog Becomes an AI System of Record, Launches JFrog ML – Industry’s First End-to-End DevOps, DevSecOps & MLOps Platform for Trusted AI Delivery

JFrog Becomes an AI System of Record, Launches JFrog ML – Industry’s First End-to-End DevOps, DevSecOps & MLOps Platform for Trusted AI Delivery

JFrog ML Drives MLOps practices coupled with AI Security - Unifying Developer, Data Science & Operations Teams with Enterprise-wide Automation & Control of AI-powered Software Delivery 
JFrog Unveils Secure AI Model Delivery Accelerated by NVIDIA NIM Microservices

JFrog Unveils Secure AI Model Delivery Accelerated by NVIDIA NIM Microservices

Sydney, Australia – March 5, 2025  – JFrog Ltd (Nasdaq: FROG), the Liquid Software company and creators of the JFrog Software Supply Chain Platform, is announcing general availability of its integration with NVIDIA  NIM microservices, part of the NVIDIA AI Enterprise software platform. The JFrog Platform is the only unified, end-to-end, and secure ...
Wattwatchers Announces Mark Dunn as New CEO to Lead Next Phase of Growth

Wattwatchers Announces Mark Dunn as New CEO to Lead Next Phase of Growth

Wattwatchers, a leader in real-time energy management and data solutions, is pleased to announce the appointment of Mark Dunn as its new Chief Executive Officer (CEO). 
Fortinet Promotes Dale Nachman to Regional Director for Australia and New Zealand, Strengthening Cybersecurity Leadership Across the Region

Fortinet Promotes Dale Nachman to Regional Director for Australia and New Zealand, Strengthening Cybersecurity Leadership Across the Region

Dale Nachman’s promotion reinforces Fortinet’s commitment to expanding its presence, enhancing regional collaboration, and driving cybersecurity innovation to support businesses in an evolving threat landscape.  
Verizon Announces Strategic Partnership with Accenture to Help Organisations Tackle Emerging Security Threats

Verizon Announces Strategic Partnership with Accenture to Help Organisations Tackle Emerging Security Threats

What you need to know: • Verizon Business and Accenture will help clients across industries in mid-market and large enterprises become cyber resilient organisations. • New advanced services will help companies identify security vulnerabilities and detect, respond to and recover from cyberattacks and will be integrated with Verizon’s portfolio of ...
New Research: Almost Half of Australian IT Teams Waste Up to 3-days Per Month Fixing Human Errors, Exposing Organizations to Unnecessary Cyber Risk

New Research: Almost Half of Australian IT Teams Waste Up to 3-days Per Month Fixing Human Errors, Exposing Organizations to Unnecessary Cyber Risk

SYDNEY, Australia, March 4, 2025 – Tanium today released new research highlighting the need for automation to mitigate human error, improve security, and reduce burnout. ‘The Impact of IT Operations Automation on the Morale, Productivity, and Security Posture of IT Teams’ report reveals nearly half of Australian IT teams (43%) are wasting up to 20 ...
A10 Networks Expands its Cybersecurity Portfolio with Acquisition of ThreatX Protect

A10 Networks Expands its Cybersecurity Portfolio with Acquisition of ThreatX Protect

ThreatX Protect Addresses Critical Need to Protect Against Evolving Application and API Security Threats
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This