The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Technology Company Names Have More Meaning than We Expected…
Creating a strong brand identity is an integral aspect of any technology business, and a large part of any brand identity lies in its name. While many brands are simply named after their Founders, or geological locations others have more interesting origins. These names are often carefully chosen to reflect the company's mission, values, or ...

Exploring Opportunities, Fears, and the Future with AI
Claudionor Coelho, Chief AI Officer from Zscaler, and a member of the World Economic Forum AI Group at Zenith Live chatted with me about large language models (LLMs) and the potential ethical challenges surrounding their use.Recently it was announced about the launch of Copilot at Zscaler and how the technologies presented were utilised in the creation ...

Why Robust Disaster Recovery Is a USP for MSPs
As Australia’s technological landscape continues to evolve rapidly, businesses are turning to cloud solutions to enhance their operations. But for many starting their cloud journey, concerns about security and disaster recovery can be overlooked when trying to manage and optimise new cloud resources effectively. So who can businesses turn to for proper ...

Why CISOs Need a Voice In the Boardroom
Many organisations feel they are adequately prepared for cyber security these days, due to the simple fact of having a CISO (Chief Information Security Officer) in-situ. Having a senior level executive to oversee security and develop security policies feels like the job is done.
However, this is just part (the start) of the journey to cyber maturity. ...

Remediation Over Ratings – Achieving Third-Party Cyber Risk Reduction
Modern businesses focussed on third-party cyber risk reduction require both a more comprehensive solution to third-party cyber risk; one that fully manages risk by rapidly identifying and resolving critical cyber security issues in the third-party ecosystem.

Three Force Multipliers To Boost Cybersecurity Protections For Governments
Government departments, agencies and councils are looking to invest in capabilities and tooling that can act as ‘force multipliers’ for improving their protective coverage against cybersecurity threats.

Combating AI-Driven Attacks with Predictive Breach Technology
Zscaler's CSO and Head of Security Research, Deepen Desai, recently discussed the latest advancements in AI, cybersecurity, and zero trust strategies during his talk at Zenith Live.
One of the key focal points of Desai's presentation was the intersection of AI and cybersecurity. The Researcher explained the landscape of AI-driven attacks and how ...

Small Businesses Can Pull Their SOCs Up
Security Operations Centres, or SOCs, are no longer the exclusive domain of large enterprises. Cost-prohibitive legacy on-premises security solutions have given way to the cloud solutions offering greater scalability for enterprises.
No results found.
In The News

CloudSEK Warns of Scammers Exploiting Zendesk to Impersonate Brands
BENGALURU: CloudSEK, a leader in AI-powered cybersecurity solutions, has uncovered how cybercriminals can exploit a seemingly simple feature of Zendesk’s SaaS platform.
CloudSEK’s latest research highlights how Zendesk subdomain registrations could be misused to impersonate legitimate brands and facilitate phishing and investment scams, putting ...
Exabeam Continues to Deliver Real AI-Driven Cybersecurity with Launch of LogRhythm Intelligence Copilot
BROOMFIELD, Colo. & FOSTER CITY, Calif. – January 20, 2025 -- Exabeam, a global cybersecurity leader that delivers AI-driven security operations, today announced the launch of LogRhythm Intelligence Copilot, a generative AI-powered feature delivering actionable insights to empower security teams and accelerate workflows. This release solidifies ...
Hack The Emulated Planet: Vulnerability Hunting Planet WGS-804HPT Industrial Switch
Emulators such as the open-source, cross-platform QEMU framework are invaluable tools for researchers conducting vulnerability research. QEMU and other emulators act as great testing environments where software and firmware can be analyzed for exploitable vulnerabilities. They can also be taken a step further for testing exploits within a safe ...
Cognizant Leads Enterprises into Next Generation of AI Adoption with Neuro® AI Multi-Agent Accelerator and Multi-Agent Services Suite
Cognizant has announced its Neuro® AI Multi-Agent Accelerator and Multi-Agent Service Suite. These new offerings accelerate the development and adoption of AI agents, helping empower businesses to transform their business processes using AI agents for adaptive operations, real-time decision-making, and personalised customer experiences - to support all ...
Trend Micro is Recognised as a 2024 Gartner® Peer Insights™ Customers’ Choice for Cloud-Native Application Protection Platforms
The Gartner® Peer Insights™ Customers' Choice Distinction is based on feedback and ratings from end-user professionals who have experience with the product or service
SentinelOne Brings the Power of Purple AI to Zscaler, Okta, Palo Alto Networks, Proofpoint, Fortinet and Microsoft Data
Popular generative AI security analyst can now be used to speed cybersecurity investigations and simplify threat hunting across a growing list of native and third-party sources
CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats
CyberArk (NASDAQ: CYBR) today announced a new integration between CyberArk Privileged Access Manager (PAM) and Microsoft Defender for Identity, giving organisations a unified, comprehensive view of their entire identity security landscape to allow quicker, more effective threat response and containment.
Defender for Identity is a cloud-based ...
Dragos and Yokogawa Forge Global Partnership to Strengthen Cybersecurity for Industrial Systems Worldwide
Dragos and Yokogawa Electric have partnered to enhance industrial cybersecurity. By integrating Dragos’s OT cybersecurity platform with Yokogawa’s CENTUM VP system, the collaboration will provide visibility, threat detection, and response capabilities for industrial systems, advancing cybersecurity resilience amid digital transformation in industrial ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..