The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Protecting Data from Ransomware: The Power of Advanced Encryption

Protecting Data from Ransomware: The Power of Advanced Encryption

Ransomware attacks have become a pressing threat to businesses worldwide, with their potential to encrypt sensitive data and hold organisations hostage. While many focus on preventing such attacks, the ability to mitigate their consequences is equally crucial. This article explores how advanced encryption techniques, including quantum-powered ...
Tackling Takedowns – How To Mitigate Risks of Fake Domains

Tackling Takedowns – How To Mitigate Risks of Fake Domains

As cyber threat actors continue to leverage more and more sophistication in phishing attacks and other cases of fraud targeting customers and consumers, organisations need to take proactive steps to stay ahead and be ready to respond when those threats are identified.
Oracle Cloud – The Late Bloomer

Oracle Cloud – The Late Bloomer

For years, the tech behemoth Oracle stood in the shadows of cloud giants like Amazon and Microsoft. But now, with their second-gen Oracle Cloud Infrastructure (OCI), Oracle is rewriting the cloud playbook. Oracle is far more than just the database company as most people would have memories of.Mahesh Thiagarajan, Executive Vice President of OCI, whose ...
The Invisible Siege on Our Supply Chain

The Invisible Siege on Our Supply Chain

Daniel Churches, Sales Director at ColorTokens, a captain in breach readiness and containment, lifts the veil on the precarious state of cybersecurity today. "When I say breach readiness, I speak from a place of inevitability," Churches states. The reality is that breaches arenโ€™t just possible; theyโ€™re practically guaranteed. "A breach is likely ...
Identity Platforms are no Longer Just a Backend Issue

Identity Platforms are no Longer Just a Backend Issue

Businesses are perpetually cornered, navigating cybersecurity threats and trying to keep their head above water with their never ending laundry list of security to-doโ€™s. Simon Hodgkinson, an Advisor from Semperis and former Chief Information Security Officer (CISO) at one of the world's largest oil companies, opened up about his experience towards ...
The Art of Mastering Cyber Risk: From Spreadsheets to Strategic Resilience in Critical Infrastructure

The Art of Mastering Cyber Risk: From Spreadsheets to Strategic Resilience in Critical Infrastructure

Critical Infrastructure leaders must move beyond compliance to integrated cyber risk management to protect services and build resilience.
Cybersecurityโ€™s Evolution And The Shift Toward Secure-By-Design Principles

Cybersecurityโ€™s Evolution And The Shift Toward Secure-By-Design Principles

To achieve a high level of cybersecurity maturity, organisations must move beyond reliance on security tools and AppSec experts, embracing a culture of security at all levels. Effective Secure-by-Design adoption depends on building a security-conscious workforce through structured, ongoing education and incentives that encourage developers to take ...
Navigating The Identity Security Maze: Critical Challenges For Australian Financial Services In 2025

Navigating The Identity Security Maze: Critical Challenges For Australian Financial Services In 2025

Australia's digital payments sector is booming, but many financial institutions, particularly smaller ones, face significant challenges due to outdated identity security systems. These challenges are compounded by increasing cyberattacks, stringent regulatory pressures, inefficient manual processes, and the growing complexity of machine identities. In ...

In The News

Trend Micro is Recognised as a 2024 Gartnerยฎ Peer Insightsโ„ข Customersโ€™ Choice for Cloud-Native Application Protection Platforms

Trend Micro is Recognised as a 2024 Gartnerยฎ Peer Insightsโ„ข Customersโ€™ Choice for Cloud-Native Application Protection Platforms

The Gartnerยฎ Peer Insightsโ„ข Customers' Choice Distinction is based on feedback and ratings from end-user professionals who have experience with the product or service
SentinelOne Brings the Power of Purple AI to Zscaler, Okta, Palo Alto Networks, Proofpoint, Fortinet and Microsoft Data

SentinelOne Brings the Power of Purple AI to Zscaler, Okta, Palo Alto Networks, Proofpoint, Fortinet and Microsoft Data

Popular generative AI security analyst can now be used to speed cybersecurity investigations and simplify threat hunting across a growing list of native and third-party sources
CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats

CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats

CyberArkย (NASDAQ:ย CYBR) today announced a new integration between CyberArk Privileged Access Manager (PAM) and Microsoft Defender for Identity, giving organisations a unified, comprehensive view of their entire identity security landscape to allow quicker, more effective threat response and containment. Defender for Identity is a cloud-based ...
Dragos and Yokogawa Forge Global Partnership to Strengthen Cybersecurity for Industrial Systems Worldwide

Dragos and Yokogawa Forge Global Partnership to Strengthen Cybersecurity for Industrial Systems Worldwide

Dragos and Yokogawa Electric have partnered to enhance industrial cybersecurity. By integrating Dragosโ€™s OT cybersecurity platform with Yokogawaโ€™s CENTUM VP system, the collaboration will provide visibility, threat detection, and response capabilities for industrial systems, advancing cybersecurity resilience amid digital transformation in industrial ...
Cisco Unveils AI Defense to Secure the AI Transformation of Enterprises

Cisco Unveils AI Defense to Secure the AI Transformation of Enterprises

Ciscoโ€™s end-to-end solution protects both the development and use of AI applications so enterprises can advance their AI initiatives with confidence. AI Defense safeguards against the misuse of AI tools, data leakage, and increasingly sophisticated threats, which existing security solutions are not equipped to handle. ...
Cybersecurity In 2025: Insights and Predictions From Yubicoโ€™s Experts

Cybersecurity In 2025: Insights and Predictions From Yubicoโ€™s Experts

With 2024 behind us, we saw another challenging year in the world of cybersecurity โ€“ highlighted by new and evolving threats like Artificial Intelligence (AI)-driven phishing and increasingly sophisticated cyber attacks overall. Yubicoโ€™s Septemberย Global State of Authentication Surveyย confirmed the challenges, even underscoring the potential risks of ...
Aristotle Metadata Welcomes Shad Sears As Chief Commercial Officer and Chief Information Security Officer

Aristotle Metadata Welcomes Shad Sears As Chief Commercial Officer and Chief Information Security Officer

Aristotle Metadata is thrilled to announce the appointment of Shad Sears as their new Chief Commercial Officer (CCO) and Chief Information Security Officer (CISO). Shad brings a wealth of experience in cybersecurity, commercial leadership and strategic development to our team.
ExtraHopยฎ Celebrates Banner Year, Welcomes New CEO to Lead Next Phase of Growth

ExtraHopยฎ Celebrates Banner Year, Welcomes New CEO to Lead Next Phase of Growth

Industry veteran with experience scaling notable network security brands joins world-class management team to accelerate momentum

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This