The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Two Forces Reshaping Our Cyber Defences For The Better

The Two Forces Reshaping Our Cyber Defences For The Better

Introduction It’s very hard to catch a ball in flight without being able to make real-time calculations based on a continuous and uninterrupted stream of information from your eyes to your brain. The same can be said for cyber security. It’s tough to catch threats in play without truly real-time data. The need for real-time data and data processing ...
Understanding The Risks Associated With ‘Shadow AI’ In Software Development

Understanding The Risks Associated With ‘Shadow AI’ In Software Development

There are ways for CISOs to bring AI-assisted coding out of the shadows, allowing staff to get the most out of productivity benefits while avoiding vulnerabilities. This can be done by embracing it – as opposed to blanket suppression – and pursuing a three-point plan to establish reasonable guardrails and raise security awareness capabilities among ...
Six Trends Shaping The Future Of The Security Industry In 2025

Six Trends Shaping The Future Of The Security Industry In 2025

In 2025, security will be transformed by hybrid architectures, advanced AI, and high-resolution imaging, enabling smarter, more flexible systems. Security technologies will deliver business intelligence, while software-driven solutions and core technology ownership ensure resilience, efficiency, and innovation.
Malicious AdTech And Compromised Websites: A Dangerous Combination

Malicious AdTech And Compromised Websites: A Dangerous Combination

In the security industry, we rarely tell a story from the victim’s perspective. Instead, we focus on a malicious actor’s perspective: their tactics, techniques, and procedures (TTPs). So, I decided to take a turn as a victim and see what happened after visiting a compromised website with malicious adtech.
The Four Key Challenges Facing AI Adoption In Australian Banks

The Four Key Challenges Facing AI Adoption In Australian Banks

Artificial intelligence (AI) is slowly revolutionising almost every industry, and banking is no exception. AI offers a host of opportunities and tools that can be used to deliver faster services, more personalised customer experiences, and boost operational efficiency at a scale we’ve never seen before. But for all its promise, many banks are still ...
Reframing The CISO’s Imperative: From Vulnerability Management To Business Risk

Reframing The CISO’s Imperative: From Vulnerability Management To Business Risk

Richard Seiersen discusses how CISOs must shift from vulnerability management to risk quantification, using measurement-driven approaches to align security with business objectives and secure executive buy-in.
The Quantum Age: Unlocking New Opportunities, and not Just for Vendors.

The Quantum Age: Unlocking New Opportunities, and not Just for Vendors.

As quantum computing advances, the conversation around post-quantum cryptography (PQC) has largely focused on mitigating security risks. However, this transition brings more than just enhanced protection - it unlocks new opportunities for businesses and industries worldwide. This article explores how the shift away from one-size-fits-all cryptography, ...
Quantum Computing – The Next Frontier

Quantum Computing – The Next Frontier

Are we there yet with quantum computing? Paddy McGuinness, former UK Deputy National Security Advisor and current Senior Advisor at Brunswick Group, brings insights into the quantum conversation from leading national resilience and cyber security in the UK to his current advisory role. McGuinness reflected on his tenure in government service, focusing ...
No results found.

In The News

Barracuda Launches AI-Powered Assistant to Simplify Security Operations

Barracuda Launches AI-Powered Assistant to Simplify Security Operations

New Barracuda Assistant Transforms Security Operations, delivers Smarter, Faster Security to Strengthen Cyber Resilience and Drive Productivity and ROI
Nozomi Networks Strengthens its Commitment to its Global Partner Ecosystem with Latest Executive Appointments

Nozomi Networks Strengthens its Commitment to its Global Partner Ecosystem with Latest Executive Appointments

• Matthew Cowell joins as Vice President of Strategic Alliances. • Tyson Gerhold Named Vice President of Global Partner and Channel Sales.
Seven Critical Vulnerabilities Open ChatGPT to Data Theft and Hijacking

Seven Critical Vulnerabilities Open ChatGPT to Data Theft and Hijacking

Tenable research reveals hidden AI flaws that allow data exfiltration, safety override, and persistent compromise within ChatGPT
Check Point Software Achieves the Highest Security Effectiveness at 99.59% in NSS Labs Enterprise Firewall Test

Check Point Software Achieves the Highest Security Effectiveness at 99.59% in NSS Labs Enterprise Firewall Test

As AI transforms cyber threats, NSS Labs recognition affirms Check Point’s leadership in prevention-first security, outperforming the competition
ASUG Tech Connect 2025 Taps SecurityBridge To Discuss SAP Cybersecurity Strategies

ASUG Tech Connect 2025 Taps SecurityBridge To Discuss SAP Cybersecurity Strategies

The SecurityBridge presentation aligns with the technical education focus by detailing the use of context- and risk-based multi-factor authentication (MFA) and step-up authentication via TrustBroker, along with security monitoring, vulnerability management, and incident response practices. In addition, the speakers will also discuss integrating ...
CrowdStrike Expands the Agentic Security Workforce, Trained on the Knowledge of Elite Analysts

CrowdStrike Expands the Agentic Security Workforce, Trained on the Knowledge of Elite Analysts

New mission-ready agents work in concert with custom-built and third-party agents to automate high-impact workflows across the full security lifecycle
SecurityBridge Announces “Secure Together New York 2025” A Complimentary SAP Security Event at Accenture’s Manhattan Office

SecurityBridge Announces “Secure Together New York 2025” A Complimentary SAP Security Event at Accenture’s Manhattan Office

The company will join forces with partners Accenture, Bowbridge, Fortinet, NextLabs, and Saviynt to deliver a full day of expert sessions exploring the future of SAP security. These sessions will cover AI-powered segregation of duties (SoD) controls, quantum-resistant strategies, and defense mechanisms against modern ransomware and file-based exploits.
CrowdStrike Unveils Charlotte Agentic SOAR to Orchestrate the Agentic Security Workforce

CrowdStrike Unveils Charlotte Agentic SOAR to Orchestrate the Agentic Security Workforce

The orchestration layer of the Agentic Security Platform unites intelligent agents to coordinate real-time agent-to-agent and analyst-to-agent collaboration 
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This