The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Building A Resilient Healthcare Environment Through Proactive Cybersecurity Practices

Building A Resilient Healthcare Environment Through Proactive Cybersecurity Practices

Anna Perez, business development manager, Wavelink and Connected Health  Healthcare providers must continue to prioritise patient data security as digital transformation reshapes the industry. Ensuring the security of sensitive information is about more than simply ticking boxes for compliance; it’s about upholding patient trust and safeguarding ...
The Five Key Processes For Staying Secure With SAP

The Five Key Processes For Staying Secure With SAP

Upon efficiently securing your SAP environment, the next step is to learn how to maintain that security and continuously improve your SAP Security posture. This article highlights some specific recommendations for SAP Security processes.
The Increasing Role Of LLMs And AI In Physical Security

The Increasing Role Of LLMs And AI In Physical Security

The rapid rise of large language models (LLMs) has ushered in a new era of technological possibilities. These AI-driven systems, capable of generating human-quality text, code, and even creative content, have captured the imagination of industries worldwide. The physical security sector is no exception, exploring how LLMs can enhance operations from ...
Oracle is More Than Just a Database Company That Everyone Remembers, says Regional Managing Director

Oracle is More Than Just a Database Company That Everyone Remembers, says Regional Managing Director

I headed over to my almost second home Las Vegas in the United States - where I was at the coalface at the Oracle CloudWorld Event hosted at the Venetian. I, like others, have traditionally known Oracle as the database company - despite OCI generating a foothold in the market. Stephen Bovis, Regional Managing Director of Oracle Australia, New Zealand, ...
Taking a Zero Trust Approach to Managing IoT in Manufacturing

Taking a Zero Trust Approach to Managing IoT in Manufacturing

As the manufacturing industry increasingly embraces the Internet of Things (IoT), the imperative for robust cybersecurity has never been more urgent.
Vital Signs: Why Monitoring High Tech Systems And Data Is Critical For Australian Healthcare Providers

Vital Signs: Why Monitoring High Tech Systems And Data Is Critical For Australian Healthcare Providers

World Patient Safety Day is a timely reminder of the threat hackers and cyber-criminals pose to the country’s most vulnerable.
What you missed at TechLeaders 2024

What you missed at TechLeaders 2024

I recently headed down to TechLeaders, which was hosted at Kirkton Park in the Hunter Valley. TechLeaders Australia is dedicated to the Australian technology industry. It serves as a platform for professionals, businesses, and organisations to connect, collaborate, and stay informed about the latest trends and developments in the tech sector. This ...
How AI is Helping to Strengthen Corporate Cybersecurity

How AI is Helping to Strengthen Corporate Cybersecurity

As AI continues to permeate an increasing portion of daily business life, the need for robust cybersecurity measures has become vital.
No results found.

In The News

Elastic Wins Two 2025 Google Cloud Partner Of The Year Awards

Elastic Wins Two 2025 Google Cloud Partner Of The Year Awards

Elastic, the Search AI Company, announced today that it has received two 2025 Google Cloud Partner of the Year Awards in the Artificial Intelligence category for Data Management & AI and Tooling.    Elastic is being recognised for its achievements in the Google Cloud ecosystem, helping joint customers simplify the process of developing and ...
Elastic Delivers Performance Gains For Users Running Elasticsearch On Google Axion Processors

Elastic Delivers Performance Gains For Users Running Elasticsearch On Google Axion Processors

Benchmarking shows Elasticsearch runs up to 40% faster on Google Axion Processor C4A
Elastic Announces General Availability Of LLM Observability For Google Cloud’s Vertex AI

Elastic Announces General Availability Of LLM Observability For Google Cloud’s Vertex AI

SREs can now monitor, analyse and optimise the performance of AI deployments using models from Vertex AI
CyberArk Unveils First-Of-Its-Kind Machine Identity Security Solution To Secure Workloads Across Every Environment

CyberArk Unveils First-Of-Its-Kind Machine Identity Security Solution To Secure Workloads Across Every Environment

Platform delivers the industry's most comprehensive protection for all non-human identities that matter Combines the application of unique and universal identities to all workloads with secrets management, reducing machine identity complexity and risk New discovery capabilities to provide contextual understanding of workload identity risk
Ping Identity Doubles Down on Partner Strategy with New Partner Program and Advisory Board

Ping Identity Doubles Down on Partner Strategy with New Partner Program and Advisory Board

Ping’s partner-first investments reinforce commitment to delivering exceptional experiences for partners and customers
CyberArk Announces Identity Security Solution to Secure AI Agents At Scale

CyberArk Announces Identity Security Solution to Secure AI Agents At Scale

Millions of autonomous, unpredictable AI agents represent new, rapidly expanding identity security attack surface New CyberArk end-to-end solution will help secure AI agents' privileged access across entire environment Delivered through the CyberArk Identity Security Platform, securing all identities - human, machine, and AI - in one place.
Fastly Application Security Solutions Delivered 235% ROI Over Three Years

Fastly Application Security Solutions Delivered 235% ROI Over Three Years

Study shows Fastly provides enhanced security, improved user experiences, and significant cost savings
New WatchGuard Threat Lab Report Discovers 94% Increase in Network Malware as Cybercriminals Exploit Advanced, Encrypted Connections

New WatchGuard Threat Lab Report Discovers 94% Increase in Network Malware as Cybercriminals Exploit Advanced, Encrypted Connections

Other key findings show an increase in crypto miner detections, a spike in zero-day malware, a drop in endpoint malware, a rise in Linux-based threats, and more.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This