The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Understanding The Risks Associated With ‘Shadow AI’ In Software Development

Understanding The Risks Associated With ‘Shadow AI’ In Software Development

There are ways for CISOs to bring AI-assisted coding out of the shadows, allowing staff to get the most out of productivity benefits while avoiding vulnerabilities. This can be done by embracing it – as opposed to blanket suppression – and pursuing a three-point plan to establish reasonable guardrails and raise security awareness capabilities among ...
Six Trends Shaping The Future Of The Security Industry In 2025

Six Trends Shaping The Future Of The Security Industry In 2025

In 2025, security will be transformed by hybrid architectures, advanced AI, and high-resolution imaging, enabling smarter, more flexible systems. Security technologies will deliver business intelligence, while software-driven solutions and core technology ownership ensure resilience, efficiency, and innovation.
Malicious AdTech And Compromised Websites: A Dangerous Combination

Malicious AdTech And Compromised Websites: A Dangerous Combination

In the security industry, we rarely tell a story from the victim’s perspective. Instead, we focus on a malicious actor’s perspective: their tactics, techniques, and procedures (TTPs). So, I decided to take a turn as a victim and see what happened after visiting a compromised website with malicious adtech.
The Four Key Challenges Facing AI Adoption In Australian Banks

The Four Key Challenges Facing AI Adoption In Australian Banks

Artificial intelligence (AI) is slowly revolutionising almost every industry, and banking is no exception. AI offers a host of opportunities and tools that can be used to deliver faster services, more personalised customer experiences, and boost operational efficiency at a scale we’ve never seen before. But for all its promise, many banks are still ...
Reframing The CISO’s Imperative: From Vulnerability Management To Business Risk

Reframing The CISO’s Imperative: From Vulnerability Management To Business Risk

Richard Seiersen discusses how CISOs must shift from vulnerability management to risk quantification, using measurement-driven approaches to align security with business objectives and secure executive buy-in.
The Quantum Age: Unlocking New Opportunities, and not Just for Vendors.

The Quantum Age: Unlocking New Opportunities, and not Just for Vendors.

As quantum computing advances, the conversation around post-quantum cryptography (PQC) has largely focused on mitigating security risks. However, this transition brings more than just enhanced protection - it unlocks new opportunities for businesses and industries worldwide. This article explores how the shift away from one-size-fits-all cryptography, ...
Quantum Computing – The Next Frontier

Quantum Computing – The Next Frontier

Are we there yet with quantum computing? Paddy McGuinness, former UK Deputy National Security Advisor and current Senior Advisor at Brunswick Group, brings insights into the quantum conversation from leading national resilience and cyber security in the UK to his current advisory role. McGuinness reflected on his tenure in government service, focusing ...
Data Privacy Day – SailPoint Shares Why A Unified Identity Security Approach Is Essential in the AI Era

Data Privacy Day – SailPoint Shares Why A Unified Identity Security Approach Is Essential in the AI Era

Gary Savarino, Identity Strategist for APAC at SailPoint shares his recommendations for businesses to adopt a unified identity security approach to safeguard data.
No results found.

In The News

DroneShield Releases RfPatrol-Plugin for the TAK Ecosystem

DroneShield Releases RfPatrol-Plugin for the TAK Ecosystem

DroneShield today announced the release of its RfPatrol-Plugin for the Team Awareness Kit (TAK) ecosystem, now available for RfPatrol Mk2 users via the DroneShield Access Portal. The plugin integrates DroneShield’s counter-drone intelligence directly into the civilian TAK command-and-control (C2) environment, supplementing existing data streams, gRPC ...
BlackBerry SecuSUITE Expands to Windows Devices, Extending Sovereign-Grade Protection Across the Digital Workplace

BlackBerry SecuSUITE Expands to Windows Devices, Extending Sovereign-Grade Protection Across the Digital Workplace

WATERLOO, ONTARIO – October 9 – BlackBerry Limited (NYSE: BB; TSX: BB) today announced the expansion of BlackBerry® SecuSUITE® to Windows® devices, extending sovereign-grade secure communications trusted by governments and critical enterprises to include laptops and workstations. This expansion will enable secure voice, messaging, and file sharing ...
Inside Akira’s SonicWall Campaign: Darktrace’s Detection and Response

Inside Akira’s SonicWall Campaign: Darktrace’s Detection and Response

Between July and August 2025, security teams worldwide observed a surge in Akira ransomware incidents involving SonicWall SSL VPN devices. Initially believed to be the result of an unknown zero-day vulnerability, SonicWall later released an advisory announcing that the activity was strongly linked to a previously disclosed vulnerability, ...
Bitdefender Launches Global Campaign to Combat AI-Driven Scams Targeting Families

Bitdefender Launches Global Campaign to Combat AI-Driven Scams Targeting Families

SYDNEY – 10 October 2025 – Bitdefender, a global leader in cybersecurity protection, today announced the launch of They Wear Our Faces, a global scam awareness campaign designed to educate consumers about the continued growth and sophistication of online scams. Timed with Cybersecurity Awareness Month, the campaign highlights the dangers of deepfake ...
Intel Unveils Panther Lake Architecture: First AI PC Platform Built on 18A

Intel Unveils Panther Lake Architecture: First AI PC Platform Built on 18A

Panther Lake will enter high-volume production at Intel’s newest fab in Arizona later this year as company invests in strengthening U.S. technology and manufacturing leadership.
CyberArk Expands Machine Identity Security Portfolio with Advanced Discovery and Context Capabilities, Enabling Enhanced Visibility and Control

CyberArk Expands Machine Identity Security Portfolio with Advanced Discovery and Context Capabilities, Enabling Enhanced Visibility and Control

Machine identities outnumber human identities by 82 to 1. Automated discovery and context-driven approaches are needed to meet complex machine identity security challenges. CyberArk’s platform enhancements help security teams easily find, manage and secure machine identities across the enterprise.
ColorTokens Completes IRAP Assessment to PROTECTED Level, Delivering Government-grade Breach Readiness in Australia

ColorTokens Completes IRAP Assessment to PROTECTED Level, Delivering Government-grade Breach Readiness in Australia

ColorTokens today reaffirmed its commitment to the Australian market including federal, state, and local government agencies, regulated industries, critical infrastructure operators, and enterprises.
Fortinet Annual Report Indicates Artificial Intelligence Skillsets Critical to Cybersecurity Skills Gap Solution

Fortinet Annual Report Indicates Artificial Intelligence Skillsets Critical to Cybersecurity Skills Gap Solution

87 per cent of cybersecurity professionals expect artificial intelligence to enhance their roles, offering efficiency and relief amid cyber skill shortages, but they require upskilling to unlock full potential
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This