The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

What in the DeepSeek?

What in the DeepSeek?

DeepSeek, the tool designed to exploit vulnerabilities in AI systems, raises significant concerns amongst the security industry, particularly OpenAI. The DeepSeek competitor discussed the potential for DeepSeek to undermine the security of AI applications, which could have far-reaching consequences for technology as we know it. Satnam Narang, Senior ...
AI First, Human Second: The New Cybersecurity Command Structure

AI First, Human Second: The New Cybersecurity Command Structure

"Man is the measure of all things." ― Protagora - pre-Socratic Greek philosopher It’s an ancient idea, yet it feels more relevant than ever as machines start making decisions that were once left to human minds. In today’s high-stakes cybersecurity landscape, artificial intelligence is no longer a future wager; it’s a frontline asset. AI systems detect ...
Data Management – It’s A High-stakes Game

Data Management – It’s A High-stakes Game

This article explores the security risks associated with poorly managed data, and details how regulations from OAIC and APRA are raising the stakes for both professionals and organisations alike.
Account Takeover Attacks on Social Media: A Rising Threat for Content Creators and Influencers

Account Takeover Attacks on Social Media: A Rising Threat for Content Creators and Influencers

In 2024 and continuing into 2025, social media platforms were prime targets for cybercriminals, with content creators facing the brunt of the malicious attacks, including a surge in account takeovers, malicious live streams, and sophisticated phishing campaigns. Bitdefender Labs has been at the forefront in analysing these threats, and the numbers ...
The Growing Nexus of Cyber Security and Financial Warfare – An Australian’s Perspective

The Growing Nexus of Cyber Security and Financial Warfare – An Australian’s Perspective

Opening Remarks Sadly, it has become an undeniable reality that the traditional boundaries between conventional warfare and economic statecraft are rapidly dissolving. Cyber security and financial warfare have evolved into critical instruments of geopolitical influence and power projection, with significant implications for nations like Australia. The ...
Security Is An Arms Race, and The Bad Guys Are Two Steps Ahead

Security Is An Arms Race, and The Bad Guys Are Two Steps Ahead

Cloud environments are a notorious ransomware attack hot spot. It’s a calculated strategy on the part of the cybercriminals. As the old adage goes, ‘follow the money’, and that’s exactly what they’re doing. Predictions suggest cloud infrastructure spend will reach over US$135 billion in 2026, accounting for over 67 per cent of total compute and ...
The Challenges of Underfunding Data Teams: How Data Drives AI and Security

The Challenges of Underfunding Data Teams: How Data Drives AI and Security

This article delves into the critical role of data teams in supporting AI and security initiatives within organisations. It highlights the challenges that arise from underfunding these teams, emphasising the importance of data quality, governance, and management. The piece explores the imbalance in budget allocation, potential risks, and inefficiencies ...
Google’s Acquisition of Wiz Signals a Shift in Cloud Security

Google’s Acquisition of Wiz Signals a Shift in Cloud Security

The cloud security landscape is facing a seismic shift. With Google’s recent acquisition of Wiz, one of the industry’s most prominent cloud security providers, many in the industry are considering the implications of cloud providers also serving as vendors. Organisations operating in multi-cloud and hybrid environments must carefully evaluate how these ...
No results found.

In The News

ColorTokens Achieves FedRAMP® Moderate Authorization, Accelerating Secure Zero Trust Adoption Across Federal Agencies

ColorTokens Achieves FedRAMP® Moderate Authorization, Accelerating Secure Zero Trust Adoption Across Federal Agencies

Xshield Now Listed on the FedRAMP Marketplace, Expanding Access to Zero Trust Microsegmentation for Federal Agencies
CrowdStrike and Nord Security Announce Strategic Partnership to Redefine SMB Cybersecurity

CrowdStrike and Nord Security Announce Strategic Partnership to Redefine SMB Cybersecurity

The partnership combines Nord Security’s secure access and credential management solutions with the CrowdStrike Falcon platform, delivering enterprise-grade protection that’s simple, accessible, and built for every business
Motorola Solutions Expands AI-Powered Security Platform to Solve Complex Safety and Operational Challenges

Motorola Solutions Expands AI-Powered Security Platform to Solve Complex Safety and Operational Challenges

At Intersec Dubai, Motorola Solutions is showcasing how its latest advancements in AI are helping critical enterprises and security providers maintain safety and awareness across vast operations, moving from reactive incident detection to proactive response. Avigilon Visual Alerts uses intuitive conversational interfaces to significantly expand the ...
SecurityBridge Announces CEO Transition to Accelerate Global Expansion

SecurityBridge Announces CEO Transition to Accelerate Global Expansion

Ingolstadt, Germany, January 12, 2026 - SecurityBridge, a leading provider of cybersecurity solutions for SAP, today announced the appointment of Jesper Zerlang as Chief Executive Officer, effective January 1, 2026. Zerlang transitions from his role as Chairman of the Board, a position he has held for the past 12 months, as the company enters its next ...
Radware Reveals ZombieAgent Zero-Click Vulnerability Enabling Silent AI Agent Takeover and Data Exfiltration

Radware Reveals ZombieAgent Zero-Click Vulnerability Enabling Silent AI Agent Takeover and Data Exfiltration

Radware® (NASDAQ: RDWR), a global leader in application security and delivery solutions for multi-cloud environments, today announced the discovery of ZombieAgent, a new zero-click indirect prompt injection (IPI) vulnerability affecting OpenAI’s ChatGPT models. The vulnerability could enable attackers to silently hijack AI agents, persist within their ...
Ping Identity Marks Digital Trust Milestone with Zero-Knowledge Biometrics in the Age of AI

Ping Identity Marks Digital Trust Milestone with Zero-Knowledge Biometrics in the Age of AI

Completion of the Keyless acquisition adds privacy-preserving biometric authentication and re-verification to strengthen enterprise defences against AI-powered spoofing and fraud.
Ping Identity Appoints Adnan Chaudhry as Chief Revenue Officer to Scale Trusted Identity for the AI Era

Ping Identity Appoints Adnan Chaudhry as Chief Revenue Officer to Scale Trusted Identity for the AI Era

Enterprise go-to-market leader joins Ping Identity as organisations face accelerating demand for trusted identity in an AI-driven world
Exabeam Introduces First Connected System for AI Agent Behaviour Analytics and AI Security Posture Insight

Exabeam Introduces First Connected System for AI Agent Behaviour Analytics and AI Security Posture Insight

Industry leadership expanded with connected capabilities that not only uncover AI agent activity, but centralise investigation, and deliver measurable AI security posture insights
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This