The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Make CNAPP Decisions To Stay Ahead Of Cloud Threats

Make CNAPP Decisions To Stay Ahead Of Cloud Threats

Cloud-Native Application Protection Platforms (CNAPPs) are a game changer in cloud security. CNAPPs are rapidly becoming the central nervous system of cloud defence, offering businesses a comprehensive solution to manage risk in today’s fast-changing digital environment.
The Unseen Powerhouse: 2020Partners

The Unseen Powerhouse: 2020Partners

As far as cybersecurity networks go, 2020Partners stands out—a private, non-commercial coalition of senior security professionals transcending conventional borders and limitations. Greg Sim is the Founding Partner of 2020Partners and the pioneer behind this exclusive network. "It’s not even a non-profit," Greg commented, referring to the networks ...
How Mobile Devices Became the Bad Guys’ Favourite Weapon

How Mobile Devices Became the Bad Guys’ Favourite Weapon

Everyone is glued to their mobile devices, sinister cyber threats lurk beneath those sleek screens, waiting to exploit our casual scrolling and innocent application installations. According to Jeff Lindholm, Chief Revenue Officer at Lookout Technologies, our beloved smartphones and tablets are digital best friends - but most are unware their risks that ...
Protecting Data from Ransomware: The Power of Advanced Encryption

Protecting Data from Ransomware: The Power of Advanced Encryption

Ransomware attacks have become a pressing threat to businesses worldwide, with their potential to encrypt sensitive data and hold organisations hostage. While many focus on preventing such attacks, the ability to mitigate their consequences is equally crucial. This article explores how advanced encryption techniques, including quantum-powered ...
Tackling Takedowns – How To Mitigate Risks of Fake Domains

Tackling Takedowns – How To Mitigate Risks of Fake Domains

As cyber threat actors continue to leverage more and more sophistication in phishing attacks and other cases of fraud targeting customers and consumers, organisations need to take proactive steps to stay ahead and be ready to respond when those threats are identified.
Oracle Cloud – The Late Bloomer

Oracle Cloud – The Late Bloomer

For years, the tech behemoth Oracle stood in the shadows of cloud giants like Amazon and Microsoft. But now, with their second-gen Oracle Cloud Infrastructure (OCI), Oracle is rewriting the cloud playbook. Oracle is far more than just the database company as most people would have memories of.Mahesh Thiagarajan, Executive Vice President of OCI, whose ...
The Invisible Siege on Our Supply Chain

The Invisible Siege on Our Supply Chain

Daniel Churches, Sales Director at ColorTokens, a captain in breach readiness and containment, lifts the veil on the precarious state of cybersecurity today. "When I say breach readiness, I speak from a place of inevitability," Churches states. The reality is that breaches aren’t just possible; they’re practically guaranteed. "A breach is likely ...
Identity Platforms are no Longer Just a Backend Issue

Identity Platforms are no Longer Just a Backend Issue

Businesses are perpetually cornered, navigating cybersecurity threats and trying to keep their head above water with their never ending laundry list of security to-do’s. Simon Hodgkinson, Advisor from Semperis and former Chief Information Security Officer (CISO) at one of the world's largest oil companies, opened up about his experience towards ...
No results found.

In The News

Dynatrace Achieves the AWS Generative AI Competency

Dynatrace Achieves the AWS Generative AI Competency

New milestone affirms Dynatrace ability to deliver enterprise-grade observability for generative AI applications on AWS
CyberArk Is a Proud Participant in the Microsoft Security Store Partner Ecosystem

CyberArk Is a Proud Participant in the Microsoft Security Store Partner Ecosystem

Streamlined deployment and seamless integration of pre-validated solutions  Customers get accelerated access to CyberArk’s trusted, innovative identity security platform  CyberArk and Microsoft are collaborating to shape the future of cybersecurity 
SailPoint Advances Identity Security to Deliver Visibility, Control and Scale Across Every Enterprise Identity

SailPoint Advances Identity Security to Deliver Visibility, Control and Scale Across Every Enterprise Identity

Delivering new capabilities in cloud, non-employee risk management, machine identity, and connectivity to strengthen enterprise identity security
Databricks Announces Data Intelligence for Cybersecurity 

Databricks Announces Data Intelligence for Cybersecurity 

The only unified platform for AI agent systems, enabling more accurate, real-time response against AI-driven threats
Check Point Enters Next Level of Strategic Partnership with Wiz to Deliver Integrated CNAPP and Cloud Network Security Solution

Check Point Enters Next Level of Strategic Partnership with Wiz to Deliver Integrated CNAPP and Cloud Network Security Solution

Building on February’s partnership announcement, Check Point and Wiz unveil unified Cloud Security Solution with Real-Time Visibility and AI-Powered Prevention 
New ISACA Study: Fewer Australian Enterprises Are Training Staff For Security Roles Despite Understaffed Teams

New ISACA Study: Fewer Australian Enterprises Are Training Staff For Security Roles Despite Understaffed Teams

ISACA’s State of Cybersecurity 2025 survey report also finds that 70 percent of security professionals expect the demand for technical cybersecurity pros to rise in the next year
Elastic Outscores Top Competitors for Threat Prevention in AV-Comparatives Endpoint Security Rankings

Elastic Outscores Top Competitors for Threat Prevention in AV-Comparatives Endpoint Security Rankings

Elastic Security stops sophisticated attacks across 50 simulated scenarios
Blue Connections IT Achieves Carbon Neutral Certification for The Third Consecutive Year

Blue Connections IT Achieves Carbon Neutral Certification for The Third Consecutive Year

The best-in-class IT solutions provider continues to lead on emissions reduction and operational sustainability, achieving Climate Active Carbon Neutral certification for organisations in FY24
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This