The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Two Forces Reshaping Our Cyber Defences for the Better

The Two Forces Reshaping Our Cyber Defences for the Better

Introduction It’s very hard to catch a ball in flight without being able to make real-time calculations based on a continuous and uninterrupted stream of information from your eyes to your brain. The same can be said for cyber security. It’s tough to catch threats in play without truly real-time data. The need for real-time data and data processing ...
Understanding the Risks Associated With ‘Shadow AI’ in Software Development

Understanding the Risks Associated With ‘Shadow AI’ in Software Development

There are ways for CISOs to bring AI-assisted coding out of the shadows, allowing staff to get the most out of productivity benefits while avoiding vulnerabilities. This can be done by embracing it – as opposed to blanket suppression – and pursuing a three-point plan to establish reasonable guardrails and raise security awareness capabilities among ...
Six Trends Shaping the Future of the Security Industry in 2025

Six Trends Shaping the Future of the Security Industry in 2025

In 2025, security will be transformed by hybrid architectures, advanced AI, and high-resolution imaging, enabling smarter, more flexible systems. Security technologies will deliver business intelligence, while software-driven solutions and core technology ownership ensure resilience, efficiency, and innovation.
Malicious AdTech and Compromised Websites: A Dangerous Combination

Malicious AdTech and Compromised Websites: A Dangerous Combination

In the security industry, we rarely tell a story from the victim’s perspective. Instead, we focus on a malicious actor’s perspective: their tactics, techniques, and procedures (TTPs). So, I decided to take a turn as a victim and see what happened after visiting a compromised website with malicious adtech.
The Four Key Challenges Facing AI Adoption in Australian Banks

The Four Key Challenges Facing AI Adoption in Australian Banks

Artificial intelligence (AI) is slowly revolutionising almost every industry, and banking is no exception. AI offers a host of opportunities and tools that can be used to deliver faster services, more personalised customer experiences, and boost operational efficiency at a scale we’ve never seen before. But for all its promise, many banks are still ...
Reframing the CISO’s Imperative: From Vulnerability Management to Business Risk

Reframing the CISO’s Imperative: From Vulnerability Management to Business Risk

Richard Seiersen discusses how CISOs must shift from vulnerability management to risk quantification, using measurement-driven approaches to align security with business objectives and secure executive buy-in.
The Quantum Age: Unlocking New Opportunities, and Not Just for Vendors.

The Quantum Age: Unlocking New Opportunities, and Not Just for Vendors.

As quantum computing advances, the conversation around post-quantum cryptography (PQC) has largely focused on mitigating security risks. However, this transition brings more than just enhanced protection - it unlocks new opportunities for businesses and industries worldwide. This article explores how the shift away from one-size-fits-all cryptography, ...
Quantum Computing – the Next Frontier

Quantum Computing – the Next Frontier

Are we there yet with quantum computing? Paddy McGuinness, former UK Deputy National Security Advisor and current Senior Advisor at Brunswick Group, brings insights into the quantum conversation from leading national resilience and cyber security in the UK to his current advisory role. McGuinness reflected on his tenure in government service, focusing ...
No results found.

In the News

CrowdStrike and Nord Security Announce Strategic Partnership to Redefine SMB Cybersecurity

CrowdStrike and Nord Security Announce Strategic Partnership to Redefine SMB Cybersecurity

The partnership combines Nord Security’s secure access and credential management solutions with the CrowdStrike Falcon platform, delivering enterprise-grade protection that’s simple, accessible, and built for every business
Motorola Solutions Expands AI-Powered Security Platform to Solve Complex Safety and Operational Challenges

Motorola Solutions Expands AI-Powered Security Platform to Solve Complex Safety and Operational Challenges

At Intersec Dubai, Motorola Solutions is showcasing how its latest advancements in AI are helping critical enterprises and security providers maintain safety and awareness across vast operations, moving from reactive incident detection to proactive response. Avigilon Visual Alerts uses intuitive conversational interfaces to significantly expand the ...
SecurityBridge Announces CEO Transition to Accelerate Global Expansion

SecurityBridge Announces CEO Transition to Accelerate Global Expansion

Ingolstadt, Germany, January 12, 2026 - SecurityBridge, a leading provider of cybersecurity solutions for SAP, today announced the appointment of Jesper Zerlang as Chief Executive Officer, effective January 1, 2026. Zerlang transitions from his role as Chairman of the Board, a position he has held for the past 12 months, as the company enters its next ...
Radware Reveals ZombieAgent Zero-Click Vulnerability Enabling Silent AI Agent Takeover and Data Exfiltration

Radware Reveals ZombieAgent Zero-Click Vulnerability Enabling Silent AI Agent Takeover and Data Exfiltration

Radware® (NASDAQ: RDWR), a global leader in application security and delivery solutions for multi-cloud environments, today announced the discovery of ZombieAgent, a new zero-click indirect prompt injection (IPI) vulnerability affecting OpenAI’s ChatGPT models. The vulnerability could enable attackers to silently hijack AI agents, persist within their ...
Ping Identity Marks Digital Trust Milestone With Zero-Knowledge Biometrics in the Age of AI

Ping Identity Marks Digital Trust Milestone With Zero-Knowledge Biometrics in the Age of AI

Completion of the Keyless acquisition adds privacy-preserving biometric authentication and re-verification to strengthen enterprise defences against AI-powered spoofing and fraud.
Ping Identity Appoints Adnan Chaudhry as Chief Revenue Officer to Scale Trusted Identity for the AI Era

Ping Identity Appoints Adnan Chaudhry as Chief Revenue Officer to Scale Trusted Identity for the AI Era

Enterprise go-to-market leader joins Ping Identity as organisations face accelerating demand for trusted identity in an AI-driven world
Exabeam Introduces First Connected System for AI Agent Behaviour Analytics and AI Security Posture Insight

Exabeam Introduces First Connected System for AI Agent Behaviour Analytics and AI Security Posture Insight

Industry leadership expanded with connected capabilities that not only uncover AI agent activity, but centralise investigation, and deliver measurable AI security posture insights
NinjaOne Surpasses US$500 Million in ARR in Record Fiscal Year

NinjaOne Surpasses US$500 Million in ARR in Record Fiscal Year

NinjaOne has today announced significant business momentum in fiscal year 2025 as global demand for the NinjaOne Unified IT Operations Platform significantly outpaces growth within the broader IT market.  NinjaOne’s recent business and financial achievements include: Completing the acquisition of Australian SaaS backup and data protection ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This