The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Role Of Data Resilience In AI And Cybersecurity

The Role Of Data Resilience In AI And Cybersecurity

Good AI and Cybersecurity Relies On Resilient Data General awareness of the technology landscape is currently driven by ongoing coverage on two sectors: AI and cybersecurity. AI has captured the attention of industry leaders and media alike resulting in comprehensive research initiatives such as those of the Australian National University, and ...
Cyber-insecurity – The Contact Centre Challenge (and Solution)

Cyber-insecurity – The Contact Centre Challenge (and Solution)

Introduction Contact centres are prime targets for cyberattacks due to the vast amounts of sensitive customer information they handle. Ensuring the security of this data is more than a technical challenge, it’s a critical business imperative. Consequently, the intersection of cybersecurity, contact centres, and artificial intelligence (AI) is ...
Securing IoMT Devices: Key Steps to Implementing Microsegmentation in Healthcare

Securing IoMT Devices: Key Steps to Implementing Microsegmentation in Healthcare

Learn how to secure IoMT healthcare devices with zero trust microsegmentation. Discover key steps for visibility, segmentation, and continuous monitoring.
From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems

From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems

Malicious traffic distribution systems (TDSs) have flown under the radar of most cybersecurity organisations for years: they have been largely ignored and thought of as simply advertising networks or “adware”, a term associated with nuisances and not threats. Cybercriminals have used this to their advantage and have built massive networks of domains ...
Disrupting The Cost Trajectory: Five Ways To Maximise Your Digital Transformation ROI

Disrupting The Cost Trajectory: Five Ways To Maximise Your Digital Transformation ROI

Technology leaders are increasingly asked to achieve more with fewer resources. Coupled with skills shortages, limited budgets, and outdated digital assets, striking this balance has never been more critical. The question - how can technology leaders realign their resources into high-value projects that deliver more for less? Here's five ways to drive ...
How To Strike Back Against Phishing And Takedown Fraudulent Websites In The Battle Against Escalating Cyber Crime

How To Strike Back Against Phishing And Takedown Fraudulent Websites In The Battle Against Escalating Cyber Crime

Phishing takedown services are a critical element of our fight against threat actors. The ungoverned and distributed nature of the Internet makes this challenging but organisations, such as AUSCERT, are critical and take down thousands of phishing and scam sites every year.
Rome was not Built in a Day. Security is not Built in a Day

Rome was not Built in a Day. Security is not Built in a Day

Trust and security - something we often hear hand in hand. But what does this really mean?Wendy Thomas, Chief Executive Officer from Secureworks discusses her theory around ‘rethinking trust’. Thomas voices her opinion on the dire need for companies to exhibit genuine change and sustained effort over time. You’ve got to walk the walk. Virtue ...
Lessons In Improving Cyber Defences For Australian Organisations Through People, Processes, And Technology

Lessons In Improving Cyber Defences For Australian Organisations Through People, Processes, And Technology

Australian businesses face a growing number of cyberthreats as the digital landscape evolves. Malicious threat actors have become increasingly sophisticated, particularly with the help of artificial intelligence (AI). Their attacks are also more targeted and include info stealer malware, AI powered impersonations, and ransomware. The Logicalis CIO ...
No results found.

In The News

Cyber Frontlines: Hacktivist Surge Mirrors Escalating India-Pakistan Border Tensions

Cyber Frontlines: Hacktivist Surge Mirrors Escalating India-Pakistan Border Tensions

As geopolitical tensions flare between India and Pakistan following Operation Sindoor—the largest Indian cross-border strike since 1971—a parallel conflict is intensifying in cyberspace. Hacktivist groups aligned along political, religious, and nationalist lines are launching a wave of distributed denial-of-service (DDoS) attacks and cyber disruption ...
Sophos Accelerates Business Growth and Profitability for MSPs with the Launch of MSP Elevate Program

Sophos Accelerates Business Growth and Profitability for MSPs with the Launch of MSP Elevate Program

Sophos recently launched MSP Elevate, a new business-accelerating program for managed service providers (MSPs). With the new program, Sophos enables MSPs to expand their business with high-value, differentiated cybersecurity offerings that elevate their customers’ cyber defenses and rewards growth with additional investment to fuel further ...
Motorola Solutions Offers Assist Chat to all U.S. Public Safety Agencies Cost-Free and Expands AI Across Portfolio to Deliver Priority Intelligence to More Roles

Motorola Solutions Offers Assist Chat to all U.S. Public Safety Agencies Cost-Free and Expands AI Across Portfolio to Deliver Priority Intelligence to More Roles

Motorola Solutions today kicked off Summit 2025, its premier technology users conference, by announcing it is extending the capabilities of Assist, its public safety AI, to more people in more roles – from dispatch to investigations – to help prioritise what’s most important. The company will enable all public safety agencies with a complimentary ...
May Patch Tuesday Commentary from Tenable

May Patch Tuesday Commentary from Tenable

Microsoft patched 71 CVEs in its May 2025 Patch Tuesday release, with five rated critical and 66 rated as important. Remote code execution (RCE) vulnerabilities accounted for 39.4% of the vulnerabilities patched this month, followed by elevation of privilege (EoP) vulnerabilities at 25.4%. “For May 2025, Microsoft patched seven zero-day ...
First-Party Fraud Surpasses Scams to Become the Leading Form of Global Attacks

First-Party Fraud Surpasses Scams to Become the Leading Form of Global Attacks

Periods of inflation and rising living costs likely contribute to an increase in opportunistic fraud against financial services, ecommerce and other sectors AI-powered fraud expected to increase in 2025
JFrog Redefines Universal Artifact Management with Industry’s Widest Native Support for Software Packages, ML Models and AI Artifacts 

JFrog Redefines Universal Artifact Management with Industry’s Widest Native Support for Software Packages, ML Models and AI Artifacts 

Report Shows JFrog SaaS Customers Added 7M+ New Software Packages to their Enterprise Environments 
Fortinet Expands Hybrid Mesh Firewall Portfolio With FortiGate 700G

Fortinet Expands Hybrid Mesh Firewall Portfolio With FortiGate 700G

New FortiGate series delivers scalable, high-performance security for the modern campus, now enhanced with FortiOS post-quantum capabilities and FortiAI-Protect for advanced threat detection and generative artificial intelligence risk mitigation 
ColorTokens and Nozomi Networks Join Forces to Deliver Unmatched OT and IoT Security Through Zero Trust Microsegmentation

ColorTokens and Nozomi Networks Join Forces to Deliver Unmatched OT and IoT Security Through Zero Trust Microsegmentation

SAN JOSE, Calif., May 8, 2025 – ColorTokens Inc., a leader in zero trust microsegmentation, today announced a powerful new integration with Nozomi Networks, the leader in OT and IoT cybersecurity. This collaboration delivers unparalleled visibility and protection across operational environments - seamlessly uniting Nozomi Networks’ AI-powered threat ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This