The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

WTF is Happening in Tech?

WTF is Happening in Tech?

In the latest episode of the DevSecOops podcast, hosts Tom Walker and Scott Fletcher discussed three of the most talked about topics in enterprise IT including Kubernetes, the March 2025 Oracle Cloud security breach, and how AI is reshaping both productivity and cybersecurity. Kubernetes - Necessary Evolution or Needless Complexity? Tom did not ...
Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets

Computer Emergency Response Teams and Their Critical Role in Protecting Australian Digital Assets

Computer Emergency Response Teams (CERTs) are the unsung heroes of cybersecurity. There are many myths about their role and function. Contrary to popular belief they don’t certify cybersecurity professionals, and many don’t do emergency response.  Operating in the background, CERTs provide vital functions in anticipating and reducing the impact of ...
Don’t Let Generative AI And LLMs Become A Third-Party Vulnerability

Don’t Let Generative AI And LLMs Become A Third-Party Vulnerability

As Large language models (LLMs) are increasingly being embedded into software development, organisations must ensure they understand the cyber security risks that come with it. Developer tools that have generative AI capability integrated to assist developers when writing code are on the rise. But the LLMs they rely on could be altered by threat actors.  
Creating Infrastructure Foundations For A Scalable Future

Creating Infrastructure Foundations For A Scalable Future

Meeting the complex demands of the future - including GenAI and ML - starts with getting ‘Network As a Service’ (NaaS) fundamentals right - right now.
The Cybersecurity Paradox: Mastering a Game That Has Already Changed

The Cybersecurity Paradox: Mastering a Game That Has Already Changed

For decades, enterprises have invested billions into mastering the art of cybersecurity firewalls, antivirus programs, perimeter defenses, and compliance checklists. Many have grown adept, even excellent, at these measures. However, excellence is a moving target in a world of relentless digital transformation. What if the tools we have perfected are no ...
How Unchecked Third-Party Access is Undermining Supply Chains

How Unchecked Third-Party Access is Undermining Supply Chains

As supply chains continue to evolve, so too must the frameworks that secure them. In an era where every digital interaction carries risk, identity is not just a technical concern: it’s the foundation of trust in the modern enterprise.
Why Securing Digital Identities Is Now a Business-Wide Imperative

Why Securing Digital Identities Is Now a Business-Wide Imperative

In the face of rising cyber risks, businesses that embed identity security into the fabric of their cybersecurity strategy will be better positioned to defend against attacks, protect data, and ensure operational resilience.
The Top Cyber Movies that Shaped our View for Better or for Worse?

The Top Cyber Movies that Shaped our View for Better or for Worse?

From flickering CRT monitors to sophisticated cyber heists, the proliferation of cyber films that mirrors our growing anxiety and fascination with life online. Hollywood has long toyed with the tension between human curiosity and digital dystopia. While some cyber films exaggerate for dramatic flair, others eerily foreshadow real world breaches, hacks, ...
No results found.

In The News

Tenable Research Warns of Critical AI Tool Vulnerability That Requires Immediate Attention [CVE-2025-49596]

Tenable Research Warns of Critical AI Tool Vulnerability That Requires Immediate Attention [CVE-2025-49596]

Tenable Research has identified a critical remote code execution vulnerability (CVE-2025-49596) in Anthropic's widely adopted MCP Inspector, an open-source tool crucial for AI development. With a CVSS score of 9.4, this flaw leverages default, insecure configurations, leaving organisations exposed by design. MCP Inspector is a popular tool with over ...
S&P 500 fetches Datadog

S&P 500 fetches Datadog

NASDAQ-listed monitoring and security platform for cloud applications, Datadog, has announced its inclusion on the S&P 500 Index, effective prior to the opening of trading today. The S&P 500 is widely regarded as the best single gauge of large-cap U.S. equities, tracking the stock performance of 500 leading US companies. Datadog’s addition ...
AI-Generated Media Drives Real-World Fraud, Identity Theft, and Business Compromise

AI-Generated Media Drives Real-World Fraud, Identity Theft, and Business Compromise

Trend Micro uncovers the criminal playbook for deepfake-enabled cybercrime
HID and ASSA ABLOY Recognised with Renowned Red Dot Award for Innovative Biometric eGate Design

HID and ASSA ABLOY Recognised with Renowned Red Dot Award for Innovative Biometric eGate Design

Combining an Aesthetically Appealing Design, Function and Innovation, the BG100 Speedgate Sets New Benchmark for Passenger Experience in Air Travel
State of Data Readiness – Report Suggests Large Gap Between Expectation And Reality

State of Data Readiness – Report Suggests Large Gap Between Expectation And Reality

A new report released by Commvault has revealed a significant gap between perceived and actual cyber readiness among Australian and New Zealand (ANZ) organisations—raising alarm bells for boards and business leaders across the region.
Barracuda Unveils Entra ID Backup Premium to Safeguard Identity Data

Barracuda Unveils Entra ID Backup Premium to Safeguard Identity Data

Barracuda Unveils Entra ID Backup Premium to Safeguard Identity Data New Solution Protects Against Accidental and Malicious Data Loss, Ensures Business Continuity and Strengthens Cyber Resilience
Cisco Appoints Ben Dawson as New SVP for APJC Sales and APJC President

Cisco Appoints Ben Dawson as New SVP for APJC Sales and APJC President

Singapore, July 9, 2025 – Cisco, the worldwide technology leader, today announced the appointment of Ben Dawson as the new President for its Asia Pacific, Japan and Greater China (APJC) business, succeeding Dave West. He will report to Oliver Tuszik, Executive Vice President of Global Sales and Chief Sales Officer, effective Monday, July 28, ...
Sophos Managed Risk Expands Capabilities with Internal Attack Surface Management (IASM) to Identify and Guide Organisations to Mitigate Internal Vulnerabilities

Sophos Managed Risk Expands Capabilities with Internal Attack Surface Management (IASM) to Identify and Guide Organisations to Mitigate Internal Vulnerabilities

Expands Visibility of Internal Exposures within an Organisation’s Environment
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This