The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why Deepfakes Are A Growing Threat To Financial Services

Why Deepfakes Are A Growing Threat To Financial Services

To defend against deepfakes, financial institutions must treat identity and access management (IAM) as strategic infrastructure, not just a compliance function
Preventing AI-Driven Cyberattacks In Healthcare Practices

Preventing AI-Driven Cyberattacks In Healthcare Practices

Artificial intelligence (AI) is revolutionizing healthcare by streamlining patient management and optimizing operations, making processes faster and more efficient. However, as practices adopt these advancements, cybercriminals are leveraging AI to exploit vulnerabilities at unprecedented speed, leading to an alarming rise in the frequency and scale of ...
The Rise of Digital Minions and How Algorithms are Complicating Everyday Life

The Rise of Digital Minions and How Algorithms are Complicating Everyday Life

Robots that escape from police, algorithms that unwittingly conspire to create $23 million price tags, and chatbots whose creative output rivals that of their human creators; these are no longer far-off hypotheticals. AI expert Marek Kowalkiewicz, at the recent AUSCERT conference, shared his research and learning in this space. Kowalkiewicz, who coined ...
Cybersecurity Leader Louise Hanna Urges Organisations to Rethink Incident Response

Cybersecurity Leader Louise Hanna Urges Organisations to Rethink Incident Response

Louise Hanna has witnessed and sailed many seas towards the evolution of cybersecurity from the inside out. Now General Manager at Excite Cyber, Hanna recently shared insights at AUSCERT’s conference on the Gold Coast with industry peers, reflecting on pivotal moments and offering fresh guidance for organisations. Hanna’s journey began on the ...
Shadow Data Is The New Insider Threat: What CISOs Overlook In SaaS Sprawl

Shadow Data Is The New Insider Threat: What CISOs Overlook In SaaS Sprawl

Companies maintain internal databases for sensitive information. However, sometimes employees want to take work home or believe it is easier to save files on their systems. These seemingly minor and understandable oversights introduce a new and growing threat to all industries: Shadow Data. Typical security protocols do not address these scenarios, ...
Smartsheet Achieves 260%+ Customer Growth in Australia As Business Booms Across Asia-Pacific and Japan

Smartsheet Achieves 260%+ Customer Growth in Australia As Business Booms Across Asia-Pacific and Japan

Smartsheet has recorded over 260% customer growth in Australia, driven by surging demand across Asia-Pacific and Japan. The company’s expansion reflects strong regional adoption of its enterprise work management platform, with organisations increasingly turning to Smartsheet to drive productivity, visibility, and collaboration at scale.
The New Priorities Driving Organisations To Uplift Web Application Security

The New Priorities Driving Organisations To Uplift Web Application Security

While compliance ensures steady improvements to application security, the cadence of upgrades is not enough to meet best practice or evolving customer expectations.
Can Cyber Security Be a Platform for Innovation and Growth?

Can Cyber Security Be a Platform for Innovation and Growth?

Six Preparedness and Performance Indicators to Unlock Cyber Agility
No results found.

In The News

CrowdStrike Expands the Agentic Security Workforce, Trained on the Knowledge of Elite Analysts

CrowdStrike Expands the Agentic Security Workforce, Trained on the Knowledge of Elite Analysts

New mission-ready agents work in concert with custom-built and third-party agents to automate high-impact workflows across the full security lifecycle
SecurityBridge Announces “Secure Together New York 2025” A Complimentary SAP Security Event at Accenture’s Manhattan Office

SecurityBridge Announces “Secure Together New York 2025” A Complimentary SAP Security Event at Accenture’s Manhattan Office

The company will join forces with partners Accenture, Bowbridge, Fortinet, NextLabs, and Saviynt to deliver a full day of expert sessions exploring the future of SAP security. These sessions will cover AI-powered segregation of duties (SoD) controls, quantum-resistant strategies, and defense mechanisms against modern ransomware and file-based exploits.
CrowdStrike Unveils Charlotte Agentic SOAR to Orchestrate the Agentic Security Workforce

CrowdStrike Unveils Charlotte Agentic SOAR to Orchestrate the Agentic Security Workforce

The orchestration layer of the Agentic Security Platform unites intelligent agents to coordinate real-time agent-to-agent and analyst-to-agent collaboration 
CrowdStrike Delivers Zero-Touch Discovery and Unified Visibility for XIoT Security

CrowdStrike Delivers Zero-Touch Discovery and Unified Visibility for XIoT Security

New Falcon for XIoT innovations bring deeper industrial and OT telemetry into the Falcon platform, eliminating blind spots and complexity across environments
Cisco Launches Cisco IQ, the Unified AI-Powered Experience That Connects the Entire Customer Journey

Cisco Launches Cisco IQ, the Unified AI-Powered Experience That Connects the Entire Customer Journey

• Cisco IQ brings real-time insights, on-demand assessments, troubleshooting and personalized learning, automation and agents from across professional services and support together in a single AI-powered interface, helping customers plan, deploy, manage, secure and optimize technology investments with greater speed and simplicity. • With Cisco IQ's ...
CyberArk Introduces First Identity Security Solution Purpose-Built to Protect AI Agents with Privilege Controls

CyberArk Introduces First Identity Security Solution Purpose-Built to Protect AI Agents with Privilege Controls

Delivers privilege controls, visibility and compliance for the new class of AI agent identities. | Extends CyberArk’s identity security capabilities to secure AI-driven automation at enterprise scale.
KnowBe4 Research Reveals Personalised Phishing Emails Using the Company Name Dominate

KnowBe4 Research Reveals Personalised Phishing Emails Using the Company Name Dominate

The Q3 2025 Phishing Simulation Roundup reveals people interacted most with emails that impersonated colleagues or referenced internal systems or topics 
Critical RCE Vulnerability Discovered in React Native Community CLI NPM Package with 2M Weekly Downloads

Critical RCE Vulnerability Discovered in React Native Community CLI NPM Package with 2M Weekly Downloads

JFrog Security Research team demonstrates CVE-2025-11953 allows unauthenticated attackers to remotely execute code on developers’ machines, putting organisations at risk
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This