The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Navigating And Combatting Scams In Banking

Navigating And Combatting Scams In Banking

By adopting a comprehensive cybersecurity strategy that integrates multiple data sources and streams and enhances the digital experience, banks can significantly bolster their defences and protect their customers.
The Two Forces Reshaping Our Cyber Defences For The Better

The Two Forces Reshaping Our Cyber Defences For The Better

Introduction It’s very hard to catch a ball in flight without being able to make real-time calculations based on a continuous and uninterrupted stream of information from your eyes to your brain. The same can be said for cyber security. It’s tough to catch threats in play without truly real-time data. The need for real-time data and data processing ...
Understanding The Risks Associated With ‘Shadow AI’ In Software Development

Understanding The Risks Associated With ‘Shadow AI’ In Software Development

There are ways for CISOs to bring AI-assisted coding out of the shadows, allowing staff to get the most out of productivity benefits while avoiding vulnerabilities. This can be done by embracing it – as opposed to blanket suppression – and pursuing a three-point plan to establish reasonable guardrails and raise security awareness capabilities among ...
Six Trends Shaping The Future Of The Security Industry In 2025

Six Trends Shaping The Future Of The Security Industry In 2025

In 2025, security will be transformed by hybrid architectures, advanced AI, and high-resolution imaging, enabling smarter, more flexible systems. Security technologies will deliver business intelligence, while software-driven solutions and core technology ownership ensure resilience, efficiency, and innovation.
Malicious AdTech And Compromised Websites: A Dangerous Combination

Malicious AdTech And Compromised Websites: A Dangerous Combination

In the security industry, we rarely tell a story from the victim’s perspective. Instead, we focus on a malicious actor’s perspective: their tactics, techniques, and procedures (TTPs). So, I decided to take a turn as a victim and see what happened after visiting a compromised website with malicious adtech.
The Four Key Challenges Facing AI Adoption In Australian Banks

The Four Key Challenges Facing AI Adoption In Australian Banks

Artificial intelligence (AI) is slowly revolutionising almost every industry, and banking is no exception. AI offers a host of opportunities and tools that can be used to deliver faster services, more personalised customer experiences, and boost operational efficiency at a scale we’ve never seen before. But for all its promise, many banks are still ...
Reframing The CISO’s Imperative: From Vulnerability Management To Business Risk

Reframing The CISO’s Imperative: From Vulnerability Management To Business Risk

Richard Seiersen discusses how CISOs must shift from vulnerability management to risk quantification, using measurement-driven approaches to align security with business objectives and secure executive buy-in.
The Quantum Age: Unlocking New Opportunities, and not Just for Vendors.

The Quantum Age: Unlocking New Opportunities, and not Just for Vendors.

As quantum computing advances, the conversation around post-quantum cryptography (PQC) has largely focused on mitigating security risks. However, this transition brings more than just enhanced protection - it unlocks new opportunities for businesses and industries worldwide. This article explores how the shift away from one-size-fits-all cryptography, ...
No results found.

In The News

JFrog Exposes Enterprise AI Blind Spots, Driving Centralised Software Supply Chain Governance

JFrog Exposes Enterprise AI Blind Spots, Driving Centralised Software Supply Chain Governance

New Shadow AI Detection capability enables transparency and risk management, guarding against uncontrolled use of AI models and API calls
Confluent Names New Leaders for Partners and APAC

Confluent Names New Leaders for Partners and APAC

Kamal Brar transitions to Senior Vice President Global Partners and Technology Group; Greg Taylor Joins as Senior Vice President and General Manager for APAC
Fastly Empowers Partners to Strengthen Customer Security and Expand Services with New Certification Program

Fastly Empowers Partners to Strengthen Customer Security and Expand Services with New Certification Program

Sydney, 17 November 2025 – Fastly, Inc. (NYSE: FSLY), a leader in global edge cloud platforms, has announced the launch of its new partner certification program, the Fastly Certified Services Partner Program. This new initiative is designed for technical security professionals at partner organisations, providing them with comprehensive training and ...
Dynatrace and Microsoft Partner to Scale Enterprise Customer AI Initiatives

Dynatrace and Microsoft Partner to Scale Enterprise Customer AI Initiatives

New integration enables customers to automate majority of cloud operations tasks

Modern 42 Appointed BeyondTrust’s First Advanced Implementation Partner in Australia

Canberra, 17 November 2025 – Modern 42, a specialist provider of Identity and Access Management, Privileged Access Management, CIAM and Securing Entra ID, today announced that it has been appointed the first BeyondTrust Advanced Implementation Partner in Australia. Appointed initially as a BeyondTrust partner in 2023, the new advanced implementation ...
Dynatrace Announces New Cloud Operations Solution for Microsoft Azure

Dynatrace Announces New Cloud Operations Solution for Microsoft Azure

Provides customers with comprehensive visibility into their Azure environments, enabling automatic remediation, prevention, and optimisation
Barracuda Identifies Three Concerning Trends in Email-Based Cyber Attacks

Barracuda Identifies Three Concerning Trends in Email-Based Cyber Attacks

 Over the last month, Barracuda threat analysts have seen the following notable developments in email-based threats targeting organisations: New tools and tactics for the Tycoon 2FA phishing kit Invisible characters that help Cephas kit evade scanners and rules A sophisticated attack involving steganography (image-concealed ...
Kyndryl Launches New Agentic AI Services to Support Agentic-driven Workforce Strategy Development and Customer Experience

Kyndryl Launches New Agentic AI Services to Support Agentic-driven Workforce Strategy Development and Customer Experience

New Kyndryl Consult organisational change management services harness Kyndryl Agentic AI Framework to help enterprises ready their workforces and redefine how work is done
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This