The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Understanding The Risks Associated With ‘Shadow AI’ In Software Development

Understanding The Risks Associated With ‘Shadow AI’ In Software Development

There are ways for CISOs to bring AI-assisted coding out of the shadows, allowing staff to get the most out of productivity benefits while avoiding vulnerabilities. This can be done by embracing it – as opposed to blanket suppression – and pursuing a three-point plan to establish reasonable guardrails and raise security awareness capabilities among ...
Six Trends Shaping The Future Of The Security Industry In 2025

Six Trends Shaping The Future Of The Security Industry In 2025

In 2025, security will be transformed by hybrid architectures, advanced AI, and high-resolution imaging, enabling smarter, more flexible systems. Security technologies will deliver business intelligence, while software-driven solutions and core technology ownership ensure resilience, efficiency, and innovation.
Malicious AdTech And Compromised Websites: A Dangerous Combination

Malicious AdTech And Compromised Websites: A Dangerous Combination

In the security industry, we rarely tell a story from the victim’s perspective. Instead, we focus on a malicious actor’s perspective: their tactics, techniques, and procedures (TTPs). So, I decided to take a turn as a victim and see what happened after visiting a compromised website with malicious adtech.
The Four Key Challenges Facing AI Adoption In Australian Banks

The Four Key Challenges Facing AI Adoption In Australian Banks

Artificial intelligence (AI) is slowly revolutionising almost every industry, and banking is no exception. AI offers a host of opportunities and tools that can be used to deliver faster services, more personalised customer experiences, and boost operational efficiency at a scale we’ve never seen before. But for all its promise, many banks are still ...
Reframing The CISO’s Imperative: From Vulnerability Management To Business Risk

Reframing The CISO’s Imperative: From Vulnerability Management To Business Risk

Richard Seiersen discusses how CISOs must shift from vulnerability management to risk quantification, using measurement-driven approaches to align security with business objectives and secure executive buy-in.
The Quantum Age: Unlocking New Opportunities, and not Just for Vendors.

The Quantum Age: Unlocking New Opportunities, and not Just for Vendors.

As quantum computing advances, the conversation around post-quantum cryptography (PQC) has largely focused on mitigating security risks. However, this transition brings more than just enhanced protection - it unlocks new opportunities for businesses and industries worldwide. This article explores how the shift away from one-size-fits-all cryptography, ...
Quantum Computing – The Next Frontier

Quantum Computing – The Next Frontier

Are we there yet with quantum computing? Paddy McGuinness, former UK Deputy National Security Advisor and current Senior Advisor at Brunswick Group, brings insights into the quantum conversation from leading national resilience and cyber security in the UK to his current advisory role. McGuinness reflected on his tenure in government service, focusing ...
Data Privacy Day – SailPoint Shares Why A Unified Identity Security Approach Is Essential in the AI Era

Data Privacy Day – SailPoint Shares Why A Unified Identity Security Approach Is Essential in the AI Era

Gary Savarino, Identity Strategist for APAC at SailPoint shares his recommendations for businesses to adopt a unified identity security approach to safeguard data.
No results found.

In The News

GitHub Reveals Australian Growth Data and Developer Insights

GitHub Reveals Australian Growth Data and Developer Insights

Over 2 million Aussies are now coding software, as AI lowers barriers to entry worldwide
Trend Micro Awards Over USD$1,000,000 to Ethical Hackers 

Trend Micro Awards Over USD$1,000,000 to Ethical Hackers 

Participants at Pwn2Own Ireland discovered scores of zero-day vulnerabilities
Organisations That Delay Responding to Email Breaches are 79% More Likely to Suffer a Ransomware Hit

Organisations That Delay Responding to Email Breaches are 79% More Likely to Suffer a Ransomware Hit

· New research shows 76% of Australian respondents experienced an email security breach in the previous 12 months · The average cost of recovering from a single email security breach in Australia exceeds $280,000 USD (approx. $430,000 AUD). · Smaller companies are hit hardest with recovery costs of nearly $2,000 USD per employee
Nozomi Networks Innovates to Automate Cybersecurity Defences for Critical Infrastructure

Nozomi Networks Innovates to Automate Cybersecurity Defences for Critical Infrastructure

Nozomi Networks Inc., the leader in OT, IoT and CPS security today announced the industry’s first cybersecurity solution to safely automate threat responses in operational environments. With the latest release of Nozomi Arc, users gain robust, automated threat prevention capabilities for OT endpoints. First launched in 2023, Nozomi Arc is the ...
Trend Micro Launches End-to-End Protection for Agentic AI Systems with NVIDIA

Trend Micro Launches End-to-End Protection for Agentic AI Systems with NVIDIA

Extends Agentic AI Safety from infrastructure to application with agentless EDR and integrated guardrails to secure next-generation AI factories
Check Point Redefines AI Security for Enterprises with AI Cloud Protect Powered by NVIDIA BlueField

Check Point Redefines AI Security for Enterprises with AI Cloud Protect Powered by NVIDIA BlueField

Redwood City, CA – October 28, 2025 – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced it is working with NVIDIA to deliver an integrated security solution built for AI factories. AI Cloud Protect is now available for on-premises enterprise deployments to secure AI model ...
CrowdStrike and NVIDIA Redefine Cybersecurity with Always-On AI Agents Protecting the Nation’s Digital Infrastructure

CrowdStrike and NVIDIA Redefine Cybersecurity with Always-On AI Agents Protecting the Nation’s Digital Infrastructure

Always-on agents built with CrowdStrike Charlotte AI AgentWorks and integrated with NVIDIA Nemotron and NVIDIA NIM microservices will enable real-time threat detection and response across cloud, data center, and edge environments
Palo Alto Networks and Cyberlite Partner to Launch AI Safety in the Classroom Toolkit, a Landmark Resource to Equip Students with Critical Generative AI Skills

Palo Alto Networks and Cyberlite Partner to Launch AI Safety in the Classroom Toolkit, a Landmark Resource to Equip Students with Critical Generative AI Skills

New modular resource empowers non-experts, educators, parents, and instructors to teach students critical thinking for safe and ethical AI use
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This