The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How To Quickly Kick Start Holistic SAP Security

How To Quickly Kick Start Holistic SAP Security

SAP security teams can kick-start a comprehensive security program, gaining significant improvements within a day, with a holistic platform and a guided approach to SAP Security.
Exclusive: Zero Trust Security – The way Forward for IT and Security

Exclusive: Zero Trust Security – The way Forward for IT and Security

In sunny and warm Las Vegas (47 degrees or 116 fahrenheit) was an interview between myself and Kavitha Mariappan, Executive Vice President, Customer Experience and Transformation from Zscaler. Kavitha spoke to me exclusively at Zenith Live about her thoughts on today’s cyber market and predictions in regards to the future of cybersecurity. The crucial ...
How Australian Manufacturers Are Adapting To New Cyber Insurance Realities

How Australian Manufacturers Are Adapting To New Cyber Insurance Realities

As insurers impose stricter limitations, manufacturers must revise their risk management strategies and implement proactive measures to uphold operational security.
Deepfakes and the US Election | A Slippery Slope

Deepfakes and the US Election | A Slippery Slope

The proliferation of misinformation, deceptive content, and deepfake technology has raised significant concerns about the impact on society, elections, and trust in online information. Bob Huber, Chief Security Officer and Head of Research at Tenable, discussed the complexities of discerning authentic content from manipulated information. There is ...
JFrog Prevents Supply Chain Attack Through Binary Secret Scanning

JFrog Prevents Supply Chain Attack Through Binary Secret Scanning

The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Python’s, PyPI’s and Python Software Foundation’s GitHub repositories, which was leaked in a public Docker container hosted on Docker Hub. As a community service, the JFrog Security Research team continuously scans public ...
Dark Web Shows Cybercriminals Ready For Olympics. Are you?

Dark Web Shows Cybercriminals Ready For Olympics. Are you?

Major sporting events like the World Cup, Super Bowl, and Wimbledon attract millions, even billions, of viewers. Argentina’s shootout win over France in the final game of the Qatar 2022 World Cup reached a global audience of 1.5 billion viewers. And the Olympics, starting later this month in Paris, is the biggest of them all—with the 2020 Tokyo ...
How Privacy-By-Design Is Influencing Australia’s Physical Security Environments

How Privacy-By-Design Is Influencing Australia’s Physical Security Environments

When designing a comprehensive data protection and privacy strategy, it’s best practice to aim higher than the current legislative requirements. One way to do this is by adopting a privacy-by-design approach - centering on the principle that respect for individual privacy is the foundation of responsible and innovative design. By proactively embedding ...
Technology Company Names Have More Meaning than We Expected…

Technology Company Names Have More Meaning than We Expected…

Creating a strong brand identity is an integral aspect of any technology business, and a large part of any brand identity lies in its name. While many brands are simply named after their Founders, or geological locations others have more interesting origins. These names are often carefully chosen to reflect the company's mission, values, or ...
No results found.

In The News

Kaseya Continues Strong Momentum in Q1 with New Product Innovations and Major Award Wins

Kaseya Continues Strong Momentum in Q1 with New Product Innovations and Major Award Wins

Sydney – March 17, 2025 – Kaseya, the leading global provider of AI-powered cybersecurity and IT management software, has released several major technology innovations in Q1 that continue to fuel the company’s strong growth. After delivering its best-ever financial results in 2024, Kaseya’s momentum continued with the launch of new AI-driven product ...
New CyberArk Research: Rapid Growth of Machine Identities, AI Adoption and Cloud Native Innovations Leave Organisations More Vulnerable to Attacks

New CyberArk Research: Rapid Growth of Machine Identities, AI Adoption and Cloud Native Innovations Leave Organisations More Vulnerable to Attacks

77% of security leaders view securing machine identities as vital to protecting the future of AI 
Bitdefender Threat Debrief | March 2025

Bitdefender Threat Debrief | March 2025

Bitdefender has combined information from openly available sources (OSINT) – including news reports and research – with data we gather by analysing Data Leak Portals (DLPs), websites where ransomware groups post details about their victims to develop our March 2025 Threat Debrief. It’s important to remember that we can't independently verify all of ...
Palantir and Databricks Announce Strategic Product Partnership to Deliver Secure and Efficient AI to Customers

Palantir and Databricks Announce Strategic Product Partnership to Deliver Secure and Efficient AI to Customers

Partnership combines Palantir’s Artificial Intelligence Platform (AIP) and Databricks’ Data Intelligence Platform to accelerate the production of AI applications and reduce TCO
Ghost in the Router: China-Linked Espionage Group UNC3886 Targets Juniper Networks

Ghost in the Router: China-Linked Espionage Group UNC3886 Targets Juniper Networks

Cybersecurity firm Mandiant, Google Cloud's threat intelligence division, has uncovered a sophisticated cyber espionage campaign by the China-linked hacking group UNC3886, which has been targeting end-of-life Juniper Networks routers with custom malware.
Intel Expands Tiber Trust Services Portfolio to Combat Evolving Threats

Intel Expands Tiber Trust Services Portfolio to Combat Evolving Threats

Intel Expands Tiber Trust Services Portfolio to Combat Evolving Threats 
Unlocking AI’s Full Potential: EXL’s “AI in action” Event Will Showcase Real-World Strategies to Scale AI for Business Leaders in ANZ

Unlocking AI’s Full Potential: EXL’s “AI in action” Event Will Showcase Real-World Strategies to Scale AI for Business Leaders in ANZ

Building on the success of previous AI in Action events, this year’s edition will bring together visionary leaders, AI experts, and industry professionals from banking, insurance, utilities, retail, technology, transportation, and more.
Extreme Networks Announces Appointment of Anisha Vaswani as Chief Information and Customer Officer

Extreme Networks Announces Appointment of Anisha Vaswani as Chief Information and Customer Officer

Company creates new executive role to drive the interlock between innovation and customer experience
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This