The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Romantic Chatbots – To Be, or Not To Be

Romantic Chatbots – To Be, or Not To Be

‘Digital companionship’ has transcended science fiction. It’s now in a fledgling state, driven by a flourishing, if somewhat opportunistic, zeitgeist of AI-driven everything. Chatbots have been around for a long time, digitally speaking - nearly 60 years in fact since ELIZA was first created. And like most technologies, it eventually - and ...
Modern Threats Need Modern Defences – Why We Need To Modernise Cybersecurity

Modern Threats Need Modern Defences – Why We Need To Modernise Cybersecurity

With the benefit of hindsight, we can now look back and understand some of the cyber security missteps of 2023 to understand what we’re missing and how we can learn from our mistakes. We see artificial intelligence adding real tangible value in our efforts to increase defences around risk scoring and create efficiencies in threat hunting – meaning ...
How Organisations Can Combat the Surge in Phishing Attacks

How Organisations Can Combat the Surge in Phishing Attacks

As we rapidly progress into the digital era, Australia aims to become a world leader in cyber security by 2030. However, the threat of cybercrime continues to grow at an alarming rate. Australia has continued to see high-profile breaches leaving Australians’ sensitive data vulnerable and exploited, with some impacted falling victim to several breaches ...
Why Human-Based and Identity Security is Becoming Increasingly Important

Why Human-Based and Identity Security is Becoming Increasingly Important

By adopting a strategy of implementing identity-based security measures, organisations can proactively improve their security posture by establishing defensive practices that help manage threats arising from unpredictable human behaviour. However, for this to work, user actions need to be taken into account.
Upholding the Principles of “Responsible Tech” in a Rapidly-Changing World

Upholding the Principles of “Responsible Tech” in a Rapidly-Changing World

It’s no surprise that with the rapidly evolving landscape of tech, scepticism and concerns - from customers and shareholders is growing. As business leaders, it’s our responsibility to ensure that responsible tech principles are built into the very fibre of what we do. Ensuring that people and the planet are taken care of along the value chain. At BT ...
Is Using Generative AI at Work Cheating? A Quarter of Aussie Office Workers Say “Yes”

Is Using Generative AI at Work Cheating? A Quarter of Aussie Office Workers Say “Yes”

A lack of guidance on generative AI tools in the Australian workplace is creating rifts and increasing risks.
Dragos OT Cybersecurity “Year in Review” Reports Rise in Geopolitically Driven Attacks, Ransomware, and Threat Groups

Dragos OT Cybersecurity “Year in Review” Reports Rise in Geopolitically Driven Attacks, Ransomware, and Threat Groups

The 2023 Dragos OT Cybersecurity Year in Review is an annual overview and analysis of OT-focused global threat activities, vulnerabilities, and industry insights and trends.
Australian Security Teams Start To Address Functional Overlap In Their Tooling Stacks

Australian Security Teams Start To Address Functional Overlap In Their Tooling Stacks

Simplification is a key priority when it comes to uplifting cybersecurity strategies
No results found.

In The News

Blue Connections IT Achieves ISO/IEC 27001:2022 Certification, Reinforcing Its Commitment to Security-centric IT Practices

Blue Connections IT Achieves ISO/IEC 27001:2022 Certification, Reinforcing Its Commitment to Security-centric IT Practices

January 22, 2025 - Blue Connections IT, a gold and platinum partner for the world’s largest technology vendors, has announced that it has achieved ISO/IEC 27001:2022 certification, the globally recognised standard for information security management systems (ISMS). This certification highlights the company’s dedication to implementing robust security ...
F5 Equips Network and Security Teams With AI Assistant For F5 Distributed Cloud Services

F5 Equips Network and Security Teams With AI Assistant For F5 Distributed Cloud Services

‘Intelligent partner’ for SecOps and NetOps will allow teams to query network activity, drill down into security events and rapidly implement mitigations. New support for teams who must manage more deployment models than ever, with 88% of organisations now employing a hybrid approach
espresso Displays Selects Oracle NetSuite To Streamline Global Processes

espresso Displays Selects Oracle NetSuite To Streamline Global Processes

espresso Displays Gains a Sharper Picture of its Business with Oracle NetSuite Australian tech company chooses NetSuite to help streamline global processes and increase productivity as it grows SYDNEY, January 22, 2024 - espresso Displays, an Australian tech company that developed the world’s thinnest interactive portable displays, has selected ...
CloudSEK Warns of Scammers Exploiting Zendesk to Impersonate Brands

CloudSEK Warns of Scammers Exploiting Zendesk to Impersonate Brands

BENGALURU: CloudSEK, a leader in AI-powered cybersecurity solutions, has uncovered how cybercriminals can exploit a seemingly simple feature of Zendesk’s SaaS platform. CloudSEK’s latest research highlights how Zendesk subdomain registrations could be misused to impersonate legitimate brands and facilitate phishing and investment scams, putting ...
Exabeam Continues to Deliver Real AI-Driven Cybersecurity with Launch of LogRhythm Intelligence Copilot

Exabeam Continues to Deliver Real AI-Driven Cybersecurity with Launch of LogRhythm Intelligence Copilot

BROOMFIELD, Colo. & FOSTER CITY, Calif. – January 20, 2025 -- Exabeam, a global cybersecurity leader that delivers AI-driven security operations, today announced the launch of LogRhythm Intelligence Copilot, a generative AI-powered feature delivering actionable insights to empower security teams and accelerate workflows. This release solidifies ...
Hack The Emulated Planet: Vulnerability Hunting Planet WGS-804HPT Industrial Switch

Hack The Emulated Planet: Vulnerability Hunting Planet WGS-804HPT Industrial Switch

Emulators such as the open-source, cross-platform QEMU framework are invaluable tools for researchers conducting vulnerability research. QEMU and other emulators act as great testing environments where software and firmware can be analyzed for exploitable vulnerabilities. They can also be taken a step further for testing exploits within a safe ...
Cognizant Leads Enterprises into Next Generation of AI Adoption with Neuro® AI Multi-Agent Accelerator and Multi-Agent Services Suite

Cognizant Leads Enterprises into Next Generation of AI Adoption with Neuro® AI Multi-Agent Accelerator and Multi-Agent Services Suite

Cognizant has announced its Neuro® AI Multi-Agent Accelerator and Multi-Agent Service Suite. These new offerings accelerate the development and adoption of AI agents, helping empower businesses to transform their business processes using AI agents for adaptive operations, real-time decision-making, and personalised customer experiences - to support all ...
Trend Micro is Recognised as a 2024 Gartner® Peer Insights™ Customers’ Choice for Cloud-Native Application Protection Platforms

Trend Micro is Recognised as a 2024 Gartner® Peer Insights™ Customers’ Choice for Cloud-Native Application Protection Platforms

The Gartner® Peer Insights™ Customers' Choice Distinction is based on feedback and ratings from end-user professionals who have experience with the product or service
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This