The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How Privacy-By-Design Is Influencing Australia’s Physical Security Environments

How Privacy-By-Design Is Influencing Australia’s Physical Security Environments

When designing a comprehensive data protection and privacy strategy, it’s best practice to aim higher than the current legislative requirements. One way to do this is by adopting a privacy-by-design approach - centering on the principle that respect for individual privacy is the foundation of responsible and innovative design. By proactively embedding ...
Technology Company Names Have More Meaning than We Expected…

Technology Company Names Have More Meaning than We Expected…

Creating a strong brand identity is an integral aspect of any technology business, and a large part of any brand identity lies in its name. While many brands are simply named after their Founders, or geological locations others have more interesting origins. These names are often carefully chosen to reflect the company's mission, values, or ...
Exploring Opportunities, Fears, and the Future with AI

Exploring Opportunities, Fears, and the Future with AI

Claudionor Coelho, Chief AI Officer from Zscaler, and a member of the World Economic Forum AI Group at Zenith Live chatted with me about large language models (LLMs) and the potential ethical challenges surrounding their use.Recently it was announced about the launch of Copilot at Zscaler and how the technologies presented were utilised in the creation ...
Why Robust Disaster Recovery Is a USP for MSPs

Why Robust Disaster Recovery Is a USP for MSPs

As Australia’s technological landscape continues to evolve rapidly, businesses are turning to cloud solutions to enhance their operations. But for many starting their cloud journey, concerns about security and disaster recovery can be overlooked when trying to manage and optimise new cloud resources effectively. So who can businesses turn to for proper ...
Why CISOs Need a Voice In the Boardroom

Why CISOs Need a Voice In the Boardroom

Many organisations feel they are adequately prepared for cyber security these days, due to the simple fact of having a CISO (Chief Information Security Officer) in-situ. Having a senior level executive to oversee security and develop security policies feels like the job is done. However, this is just part (the start) of the journey to cyber maturity. ...
Remediation Over Ratings – Achieving Third-Party Cyber Risk Reduction

Remediation Over Ratings – Achieving Third-Party Cyber Risk Reduction

Modern businesses focussed on third-party cyber risk reduction require both a more comprehensive solution to third-party cyber risk; one that fully manages risk by rapidly identifying and resolving critical cyber security issues in the third-party ecosystem.
Three Force Multipliers To Boost Cybersecurity Protections For Governments

Three Force Multipliers To Boost Cybersecurity Protections For Governments

Government departments, agencies and councils are looking to invest in capabilities and tooling that can act as ‘force multipliers’ for improving their protective coverage against cybersecurity threats.
Combating AI-Driven Attacks with Predictive Breach Technology

Combating AI-Driven Attacks with Predictive Breach Technology

Zscaler's CSO and Head of Security Research, Deepen Desai, recently discussed the latest advancements in AI, cybersecurity, and zero trust strategies during his talk at Zenith Live. One of the key focal points of Desai's presentation was the intersection of AI and cybersecurity. The Researcher explained the landscape of AI-driven attacks and how ...
No results found.

In The News

Thoughtworks Technology Radar Highlights GenAI’s Impact And Key Factors Shaping Today’s Software Development And Delivery

Thoughtworks Technology Radar Highlights GenAI’s Impact And Key Factors Shaping Today’s Software Development And Delivery

Thoughtworks, a global technology consultancy that integrates strategy, design and engineering to drive digital innovation, today presents the 32nd edition of the Technology Radar. The biannual report is built on Thoughtworks’ frontline experiences solving its clients’ most complex business challenges. The latest edition of the Thoughtworks ...
SolarWinds Unveils Next-Generation Solutions To Tackle Modern IT Operational Resiliency Challenges

SolarWinds Unveils Next-Generation Solutions To Tackle Modern IT Operational Resiliency Challenges

SolarWinds (NYSE:SWI), a leading provider of simple, powerful, and secure observability and IT management solutions, today announced a major step forward in helping businesses achieve IT operational resilience. The latest enhancements across the SolarWinds portfolio integrate expanded capabilities across observability, incident response, service ...
CyberArk Secure Browser Achieves SOC 2 Type 2 Compliance

CyberArk Secure Browser Achieves SOC 2 Type 2 Compliance

CyberArk (NASDAQ: CYBR), the global leader in identity security, today announced that CyberArk Secure Browser has achieved SOC 2 Type 2 Compliance, underscoring CyberArk’s commitment to apply the right level of privilege controls to secure every user’s action, from endpoint to application. This certification confirms that CyberArk Secure Browser uses ...
New Research: Gen AI Scraper Bots Clogging Websites with Half a Million Fake Requests Per Day

New Research: Gen AI Scraper Bots Clogging Websites with Half a Million Fake Requests Per Day

Generative AI ‘gray bots’ pound websites up to half a million times a day Generative AI scraper bots target websites 24 hours a day with up to half a million requests for information, according to the latest Barracuda detection data. In a new report, Barracuda threat analysts highlight the relentless behaviour of generative AI (Gen AI) bots, which ...
Delinea Partners with Microsoft to Ensure Seamless Transition and Continued Security as Microsoft Entra Permissions Management Retires

Delinea Partners with Microsoft to Ensure Seamless Transition and Continued Security as Microsoft Entra Permissions Management Retires

Collaboration enables customers to easily switch to Delinea’s advanced CIEM solution, safeguarding human and machine identities in public, multi-cloud environments
Datadog Unveils Plans for Data Centre in Australia

Datadog Unveils Plans for Data Centre in Australia

Datadog today announced plans for a new data centre to be located in Australia. The data centre instance, which will be built on AWS, will be Datadog’s first in Australia and adds to existing locations in North America, Asia, Europe and AWS GovCloud. The Australian data centre will store and process data locally, creating sovereign capacity to help ...
Sophos IR and MDR Cases Highlight Attackers Are Exfiltrating Data in Just Three Days

Sophos IR and MDR Cases Highlight Attackers Are Exfiltrating Data in Just Three Days

Sophos today released the 2025 Sophos Active Adversary Report, which details attacker behavior and techniques from over 400 Managed Detection and Response (MDR) and Incident Response (IR) cases in 2024. The report found that the primary way attackers gained initial access to networks (56% of all cases across MDR and IR) was by exploiting external ...
Motorola Solutions Expands Avigilon Enterprise Security Suite to Accelerate Response During Emergencies

Motorola Solutions Expands Avigilon Enterprise Security Suite to Accelerate Response During Emergencies

Motorola Solutions today announced several new advanced features in its Avigilon physical security suite, debuting Alta SOS this week at ISC West. The new features for Avigilon Alta and Avigilon Unity unify enterprises’ physical security solutions to better protect employees, visitors and service providers, and directly coordinate with public ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This