The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

JFrog Prevents Supply Chain Attack Through Binary Secret Scanning

JFrog Prevents Supply Chain Attack Through Binary Secret Scanning

The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Python’s, PyPI’s and Python Software Foundation’s GitHub repositories, which was leaked in a public Docker container hosted on Docker Hub. As a community service, the JFrog Security Research team continuously scans public ...
Dark Web Shows Cybercriminals Ready For Olympics. Are you?

Dark Web Shows Cybercriminals Ready For Olympics. Are you?

Major sporting events like the World Cup, Super Bowl, and Wimbledon attract millions, even billions, of viewers. Argentina’s shootout win over France in the final game of the Qatar 2022 World Cup reached a global audience of 1.5 billion viewers. And the Olympics, starting later this month in Paris, is the biggest of them all—with the 2020 Tokyo ...
How Privacy-By-Design Is Influencing Australia’s Physical Security Environments

How Privacy-By-Design Is Influencing Australia’s Physical Security Environments

When designing a comprehensive data protection and privacy strategy, it’s best practice to aim higher than the current legislative requirements. One way to do this is by adopting a privacy-by-design approach - centering on the principle that respect for individual privacy is the foundation of responsible and innovative design. By proactively embedding ...
Technology Company Names Have More Meaning than We Expected…

Technology Company Names Have More Meaning than We Expected…

Creating a strong brand identity is an integral aspect of any technology business, and a large part of any brand identity lies in its name. While many brands are simply named after their Founders, or geological locations others have more interesting origins. These names are often carefully chosen to reflect the company's mission, values, or ...
Exploring Opportunities, Fears, and the Future with AI

Exploring Opportunities, Fears, and the Future with AI

Claudionor Coelho, Chief AI Officer from Zscaler, and a member of the World Economic Forum AI Group at Zenith Live chatted with me about large language models (LLMs) and the potential ethical challenges surrounding their use.Recently it was announced about the launch of Copilot at Zscaler and how the technologies presented were utilised in the creation ...
Why Robust Disaster Recovery Is a USP for MSPs

Why Robust Disaster Recovery Is a USP for MSPs

As Australia’s technological landscape continues to evolve rapidly, businesses are turning to cloud solutions to enhance their operations. But for many starting their cloud journey, concerns about security and disaster recovery can be overlooked when trying to manage and optimise new cloud resources effectively. So who can businesses turn to for proper ...
Why CISOs Need a Voice In the Boardroom

Why CISOs Need a Voice In the Boardroom

Many organisations feel they are adequately prepared for cyber security these days, due to the simple fact of having a CISO (Chief Information Security Officer) in-situ. Having a senior level executive to oversee security and develop security policies feels like the job is done. However, this is just part (the start) of the journey to cyber maturity. ...
Remediation Over Ratings – Achieving Third-Party Cyber Risk Reduction

Remediation Over Ratings – Achieving Third-Party Cyber Risk Reduction

Modern businesses focussed on third-party cyber risk reduction require both a more comprehensive solution to third-party cyber risk; one that fully manages risk by rapidly identifying and resolving critical cyber security issues in the third-party ecosystem.
No results found.

In The News

New Research Reveals 84% of Australian IT Leaders Trust AI Agents Equally or More than Humans

New Research Reveals 84% of Australian IT Leaders Trust AI Agents Equally or More than Humans

93% believe AI agents will deliver meaningful business outcomes in the next 12-18 months
Splunk Survey Highlights Financial Impact of Cybersecurity Downtime for ANZ Businesses

Splunk Survey Highlights Financial Impact of Cybersecurity Downtime for ANZ Businesses

Splunk, the cybersecurity and observability leader, today released a new report “Downtime: A rising challenge for organisations in Australia & New Zealand”, which highlights cybersecurity incidents as an escalating threat for businesses in ANZ. This report shows that unplanned downtime - any service degradation or outage of a business system - ...
Delinea Nears $400M, Demonstrating Strong Growth In Securing AI with Advanced Identity Security

Delinea Nears $400M, Demonstrating Strong Growth In Securing AI with Advanced Identity Security

Identity security leader Delinea closes fiscal year with $400M revenue, new CISO hire and expansion to Mexico City
VisualCortex Scales AI-Powered Video Analytics With SUSE

VisualCortex Scales AI-Powered Video Analytics With SUSE

SUSE helps VisualCortex simplify AI deployment, manage workloads at scale, and bring real-time video intelligence to more industries.
Cloudflare Expands Threat Intelligence Offering with New Comprehensive, Real-time Events Platform 

Cloudflare Expands Threat Intelligence Offering with New Comprehensive, Real-time Events Platform 

Customers can tap into insights from Cloudflare’s global network – one of the largest in the world – which blocked an average of 227 billion cyber threats each day during Q4 2024
Trend Micro to Open-source Model and AI Agent to Drive the Future of Agentic Cybersecurity

Trend Micro to Open-source Model and AI Agent to Drive the Future of Agentic Cybersecurity

Leveraging NVIDIA AI to deliver powerful proactive security and scalable threat prevention for GenAI applications
Elastic Expands Partnership with Tines to Simplify Security and Observability Workflow Automation

Elastic Expands Partnership with Tines to Simplify Security and Observability Workflow Automation

Integrated offering for Tines Workflow Automation and Elastic Search AI Platform helps increase operational efficiency, minimise security risk, and reduce downtime
A Million Phishing-as-a-Service Attacks In Two Months Highlight A Fast-evolving Threat – Barracuda Report

A Million Phishing-as-a-Service Attacks In Two Months Highlight A Fast-evolving Threat – Barracuda Report

The first few months of 2025 saw a massive spike in phishing-as-a-service (PhaaS) attacks targeting organizations around the world, with more than a million attacks detected by Barracuda systems in January and February. The attacks were powered by several leading PhaaS platforms, including Tycoon 2FA, EvilProxy, and Sneaky 2FA.  Between them, these ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This