The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Corporate Game Nobody Talks About

The Corporate Game Nobody Talks About

Are leaders born, made or just good corporate game players? Corporate leadership isn’t a clean-cut meritocracy...it can somewhat feel like a gladiatorial arena where only the fittest survive. Industry heavyweight David Gee, Advisor at JS Careers, Bain & Company and Emertel pulls up on what it *really* takes to scale the corporate ladder, ...
From Facebook Ads to Fake News: Inside the World of Investment Scam Actors in A/NZ

From Facebook Ads to Fake News: Inside the World of Investment Scam Actors in A/NZ

A $ 945 million – that is how much money Australian consumers reported losing to investment scams in 2024. Often victims are only trying to create financial security and build a failsafe for the future. Instead, they are manipulated, defrauded, and left more vulnerable than before by the criminals. New research from Infoblox Threat Intel spotlights ...
Your Secrets Aren’t Safe – Frightening Flaws in Modern Messaging Apps

Your Secrets Aren’t Safe – Frightening Flaws in Modern Messaging Apps

Imagine pouring your country’s most sensitive secrets into a messaging app you downloaded for free. Now imagine those messages in the hands of your adversary. Sounds far-fetched? Not according to David Wiseman, VP of Secure Communications at BlackBerry, who warns that governments, businesses, and everyday people alike are hurtling towards a ...
From Gallipoli to the Digital Frontier: The ANZAC Spirit in Cybersecurity

From Gallipoli to the Digital Frontier: The ANZAC Spirit in Cybersecurity

Context As dawn breaks on ANZAC Day, Australians and New Zealanders pause to remember the sacrifices of the soldiers who stormed the beaches of Gallipoli in 1915. However, in a hyperconnected 21st-century world, the fight for national sovereignty has shifted from trenches and shores to servers and silicon. Today, a new generation of defenders stands ...
The Shadowy Threats Stalking Australia’s Ballot Box

The Shadowy Threats Stalking Australia’s Ballot Box

As Australia edges toward another election, a new and invisible threat stalks our democratic process, not from hackers in dark rooms, but from sophisticated, well-funded nation states wielding artificial intelligence. According to Ginny Badanes, General Manager of Democracy Forward at Microsoft, 2024 has seen democracy itself placed in the ...
How Adopting Maturity Models Can Improve Enterprise IT Security

How Adopting Maturity Models Can Improve Enterprise IT Security

Having developers well trained in security techniques is vital for the production of resilient code. Taking time to achieve this now can avoid significant disruption and losses in the future.
Why Web Application Firewalls Are a Critical Shield for Fintech Security

Why Web Application Firewalls Are a Critical Shield for Fintech Security

The implementation of AI-driven, cloud-native WAF solutions offers financial institutions a robust defence mechanism against cyber threats.
The Real Corporate Penetration Testing Process: How Companies Get Hacked Before the Hackers Do! 🚀

The Real Corporate Penetration Testing Process: How Companies Get Hacked Before the Hackers Do! 🚀

Hey guys, I’m sn0x — a cybersecurity researcher, bug hunter, and security enthusiast. I hold multiple certifications, including CNSP, EWPTXv2, CEH v11–12, GRC, RHCSA, and Cisco Cyber Threat Management. I’ve been ranked #1 in India and #2 globally on TryHackMe, secured #134 on Hack The Box in 2021, and even won HTB Battlegrounds twice. But hey, this ...
No results found.

In the News

Total Economic Impact Study: JFrog Unifies and Accelerates the Secure Software Supply Chain From Code to AI

Total Economic Impact Study: JFrog Unifies and Accelerates the Secure Software Supply Chain From Code to AI

New Industry Analyst Study Shows that JFrog Delivered 282% ROI in Three Years, Reducing Risk While Accelerating Safer Software Releases for Enterprises
Check Point Software Technologies Reinforces New Zealand Presence With Local Check Point Harmony SASE Data Residency Instance

Check Point Software Technologies Reinforces New Zealand Presence With Local Check Point Harmony SASE Data Residency Instance

New Point of Presence Enhances Web application and API protection with low latency and delivers Industry-Leading Threat Prevention and Cloud-Ready Security Architecture
Sophos Expands Portfolio With Workspace Protection to Secure Hybrid Work and Govern Employee AI Use

Sophos Expands Portfolio With Workspace Protection to Secure Hybrid Work and Govern Employee AI Use

Sophos today announced Sophos Workspace Protection, expanding its portfolio to help organisations secure hybrid work and govern the use of emerging technologies, including AI. Built around the Sophos Protected Browser, powered by Island, the solution enables organisations to protect applications, data, users, and guests wherever work takes place, while ...
Five Enterprise Security Predictions for 2026 for Australia’s Most Critical Services

Five Enterprise Security Predictions for 2026 for Australia’s Most Critical Services

Weaponised AI and the cyber arms race
Ping Identity Advances Universal Services to Redefine Trust in the Age of AI-Driven Fraud

Ping Identity Advances Universal Services to Redefine Trust in the Age of AI-Driven Fraud

A new model for continuous, verified trust across every identity, every interaction, and every environment
Lenovo Releases New AI Inferencing Servers

Lenovo Releases New AI Inferencing Servers

Lenovo announced a suite of purpose-built enterprise servers, solutions and services for AI inferencing workloads expanding the Lenovo Hybrid AI Advantage portfolio. Setting the stage for the next era of AI, Lenovo is advancing the field of inferencing and eliminating hurdles to power real-world AI use cases ranging from storefront customer ...
Australia’s Critical Infrastructure Unprepared for Emerging Drone Cyber Threats Warns University of Canberra Report

Australia’s Critical Infrastructure Unprepared for Emerging Drone Cyber Threats Warns University of Canberra Report

As drone technology becomes both more sophisticated and accessible across the country, researchers from Innovation Central Canberra (ICC) at the University of Canberra have teamed up with Australian tech company DroneShield to understand the risk profile of cyber-attacks to critical infrastructure. With the rapid expansion of drone tech reshaping ...
Rubrik Supports Companies to Take Control of Their Data

Rubrik Supports Companies to Take Control of Their Data

Global enterprises and governments gain jurisdictional control and advanced data protection without compromising data sovereignty
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This