The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Romantic Chatbots – To Be, or Not To Be
‘Digital companionship’ has transcended science fiction. It’s now in a fledgling state, driven by a flourishing, if somewhat opportunistic, zeitgeist of AI-driven everything.
Chatbots have been around for a long time, digitally speaking - nearly 60 years in fact since ELIZA was first created. And like most technologies, it eventually - and ...

Modern Threats Need Modern Defences – Why We Need To Modernise Cybersecurity
With the benefit of hindsight, we can now look back and understand some of the cyber security missteps of 2023 to understand what we’re missing and how we can learn from our mistakes. We see artificial intelligence adding real tangible value in our efforts to increase defences around risk scoring and create efficiencies in threat hunting – meaning ...

How Organisations Can Combat the Surge in Phishing Attacks
As we rapidly progress into the digital era, Australia aims to become a world leader in cyber security by 2030. However, the threat of cybercrime continues to grow at an alarming rate. Australia has continued to see high-profile breaches leaving Australians’ sensitive data vulnerable and exploited, with some impacted falling victim to several breaches ...

Why Human-Based and Identity Security is Becoming Increasingly Important
By adopting a strategy of implementing identity-based security measures, organisations can proactively improve their security posture by establishing defensive practices that help manage threats arising from unpredictable human behaviour. However, for this to work, user actions need to be taken into account.
Upholding the Principles of “Responsible Tech” in a Rapidly-Changing World
It’s no surprise that with the rapidly evolving landscape of tech, scepticism and concerns - from customers and shareholders is growing. As business leaders, it’s our responsibility to ensure that responsible tech principles are built into the very fibre of what we do. Ensuring that people and the planet are taken care of along the value chain. At BT ...
Is Using Generative AI at Work Cheating? A Quarter of Aussie Office Workers Say “Yes”
A lack of guidance on generative AI tools in the Australian workplace is creating rifts and increasing risks.
Dragos OT Cybersecurity “Year in Review” Reports Rise in Geopolitically Driven Attacks, Ransomware, and Threat Groups
The 2023 Dragos OT Cybersecurity Year in Review is an annual overview and analysis of OT-focused global threat activities, vulnerabilities, and industry insights and trends.
Australian Security Teams Start To Address Functional Overlap In Their Tooling Stacks
Simplification is a key priority when it comes to uplifting cybersecurity strategies
In The News
Fortinet Delivers AI-Enhanced Data Protection And Insider Risk Management
FortiDLP’s unified approach to data protection enables enterprise organisations to anticipate and prevent accidental and malicious data loss across cloud deployments, applications, and managed and unmanaged devices
Trustwave’s 2024 Retail Report Series Highlights Alarming e-Commerce Threats And Growing Fraud Against Retailers
October 30, 2024 – Trustwave, a leading cybersecurity and managed security services provider, has released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues.
In its annual research, Trustwave SpiderLabs highlights the unique factors at play in ...
TeamViewer Launches New AI-Powered Features Following Research Finding 75 Per Cent Of Global Decision-Makers Find AI Essential For Business Efficiency
61 per cent of decision-makers agree that the AI hype is over, emphasising the need for actionable solutions that deliver business results.
One-quarter of respondents believe that not adopting AI risks falling behind competitors and foresee increased costs due to a lack of automation.
AI helps IT professionals save around 16 hours each month already, ...
Ping Identity’s YOUniverse 2024 Celebrates the Future of Identity
Annual conference focused on streamlined digital experiences and preventing identity fraud with AI
Veeam Announces Update to Veeam Backup for Salesforce on Salesforce AppExchange, Further Strengthening #1 Data Resilience Capabilities
Veeam® Software, the #1 leader by market share in Data Resilience, today announced it has updated Veeam Backup for Salesforce on Salesforce AppExchange, a leading enterprise marketplace for partner apps and experts.
Veeam Backup for Salesforce ensures customers’ CRM data is resilient, secure and accessible. The solution eliminates the risk of data ...
Extreme Networks Raises the Bar for Simple, Secure Network Access with New Enhancements to ExtremeCloud Universal ZTNA
Easy application discovery, policy evaluation and troubleshooting further simplify management for IT and help ensure frictionless user experiences
Trend Micro ZDI Hosts Hacking Contest for Vulnerabilities in AI-Enabled Devices
Pwn2Own Ireland underscores Trend’s commitment to securing AI innovations
Quadrant Unveils Free Dark Web Reports That Reveal A Company’s Leaked Information And Credentials Sitting On The Dark Web
Quadrant's Free Dark Web Reports provide a proactive solution for identifying and addressing compromised credentials related to specific organizations. This service lets customers access monthly reports highlighting any newly discovered leaked information. These reports enable organizations to take swift action to secure their environments, such as ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..