The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Oracle’s Comeback to the Cloud Arena

Oracle’s Comeback to the Cloud Arena

Oracle, historically perceived as a late entrant in the cloud services market, and more commonly known for its database capability, is now pedalling a bold new trajectory that could reshape the competitive cloud landscape. Since April 2024, Oracle has introduced several major updates such as the DR-25 initiative, which effectively shrinks its ...
Cyber Risk is Business Risk: Qualys Calls For Strategic Shift During Global Cybersecurity Week

Cyber Risk is Business Risk: Qualys Calls For Strategic Shift During Global Cybersecurity Week

Sam Salehi, Managing Director ANZ at Qualys discusses why cyber risk can no longer be treated as a siloed IT issue, but must be addressed as a core business priority. As threat actors move faster and leverage AI to amplify attacks, Salehi highlights the urgent need for organisations to adopt a unified, strategic approach—bringing together security, IT, ...
World Password Day – Insight by CyberArk: Passwords Alone Can’t Defend Against Today’s Identity Threats

World Password Day – Insight by CyberArk: Passwords Alone Can’t Defend Against Today’s Identity Threats

As the boundaries between our personal and professional lives continue to blur, World Password Day is a timely reminder that this convergence extends to how we manage passwords. The human element remains a well-known challenge for security and identity professionals. With password reuse common across personal and corporate accounts, a single ...
Active Subscription Scam Campaigns Flooding the Internet

Active Subscription Scam Campaigns Flooding the Internet

Bitdefender researchers have uncovered a surge in subscription scams, both in scale and sophistication, spurred by a massive campaign involving hundreds of fraudulent websites. What sets this campaign apart is the significant investment cybercriminals have undertaken to make these fake sites look convincingly legitimate. Gone are the days when a ...
The Corporate Game Nobody Talks About

The Corporate Game Nobody Talks About

Are leaders born, made or just good corporate game players? Corporate leadership isn’t a clean-cut meritocracy...it can somewhat feel like a gladiatorial arena where only the fittest survive. Industry heavyweight David Gee, Advisor at JS Careers, Bain & Company and Emertel pulls up on what it *really* takes to scale the corporate ladder, ...
From Facebook Ads to Fake News: Inside the World of Investment Scam Actors in A/NZ

From Facebook Ads to Fake News: Inside the World of Investment Scam Actors in A/NZ

A $ 945 million – that is how much money Australian consumers reported losing to investment scams in 2024. Often victims are only trying to create financial security and build a failsafe for the future. Instead, they are manipulated, defrauded, and left more vulnerable than before by the criminals. New research from Infoblox Threat Intel spotlights ...
Your Secrets Aren’t Safe – Frightening Flaws in Modern Messaging Apps

Your Secrets Aren’t Safe – Frightening Flaws in Modern Messaging Apps

Imagine pouring your country’s most sensitive secrets into a messaging app you downloaded for free. Now imagine those messages in the hands of your adversary. Sounds far-fetched? Not according to David Wiseman, VP of Secure Communications at BlackBerry, who warns that governments, businesses, and everyday people alike are hurtling towards a ...
From Gallipoli to the Digital Frontier: The ANZAC Spirit in Cybersecurity

From Gallipoli to the Digital Frontier: The ANZAC Spirit in Cybersecurity

Context As dawn breaks on ANZAC Day, Australians and New Zealanders pause to remember the sacrifices of the soldiers who stormed the beaches of Gallipoli in 1915. However, in a hyperconnected 21st-century world, the fight for national sovereignty has shifted from trenches and shores to servers and silicon. Today, a new generation of defenders stands ...
No results found.

In The News

Check Point Software Achieves the Highest Security Effectiveness at 99.59% in NSS Labs Enterprise Firewall Test

Check Point Software Achieves the Highest Security Effectiveness at 99.59% in NSS Labs Enterprise Firewall Test

As AI transforms cyber threats, NSS Labs recognition affirms Check Point’s leadership in prevention-first security, outperforming the competition
ASUG Tech Connect 2025 Taps SecurityBridge To Discuss SAP Cybersecurity Strategies

ASUG Tech Connect 2025 Taps SecurityBridge To Discuss SAP Cybersecurity Strategies

The SecurityBridge presentation aligns with the technical education focus by detailing the use of context- and risk-based multi-factor authentication (MFA) and step-up authentication via TrustBroker, along with security monitoring, vulnerability management, and incident response practices. In addition, the speakers will also discuss integrating ...
CrowdStrike Expands the Agentic Security Workforce, Trained on the Knowledge of Elite Analysts

CrowdStrike Expands the Agentic Security Workforce, Trained on the Knowledge of Elite Analysts

New mission-ready agents work in concert with custom-built and third-party agents to automate high-impact workflows across the full security lifecycle
SecurityBridge Announces “Secure Together New York 2025” A Complimentary SAP Security Event at Accenture’s Manhattan Office

SecurityBridge Announces “Secure Together New York 2025” A Complimentary SAP Security Event at Accenture’s Manhattan Office

The company will join forces with partners Accenture, Bowbridge, Fortinet, NextLabs, and Saviynt to deliver a full day of expert sessions exploring the future of SAP security. These sessions will cover AI-powered segregation of duties (SoD) controls, quantum-resistant strategies, and defense mechanisms against modern ransomware and file-based exploits.
CrowdStrike Unveils Charlotte Agentic SOAR to Orchestrate the Agentic Security Workforce

CrowdStrike Unveils Charlotte Agentic SOAR to Orchestrate the Agentic Security Workforce

The orchestration layer of the Agentic Security Platform unites intelligent agents to coordinate real-time agent-to-agent and analyst-to-agent collaboration 
CrowdStrike Delivers Zero-Touch Discovery and Unified Visibility for XIoT Security

CrowdStrike Delivers Zero-Touch Discovery and Unified Visibility for XIoT Security

New Falcon for XIoT innovations bring deeper industrial and OT telemetry into the Falcon platform, eliminating blind spots and complexity across environments
Cisco Launches Cisco IQ, the Unified AI-Powered Experience That Connects the Entire Customer Journey

Cisco Launches Cisco IQ, the Unified AI-Powered Experience That Connects the Entire Customer Journey

• Cisco IQ brings real-time insights, on-demand assessments, troubleshooting and personalized learning, automation and agents from across professional services and support together in a single AI-powered interface, helping customers plan, deploy, manage, secure and optimize technology investments with greater speed and simplicity. • With Cisco IQ's ...
CyberArk Introduces First Identity Security Solution Purpose-Built to Protect AI Agents with Privilege Controls

CyberArk Introduces First Identity Security Solution Purpose-Built to Protect AI Agents with Privilege Controls

Delivers privilege controls, visibility and compliance for the new class of AI agent identities. | Extends CyberArk’s identity security capabilities to secure AI-driven automation at enterprise scale.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This