The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Cloudflare Helps Secure the World’s Most Popular Messaging Applications

Cloudflare Helps Secure the World’s Most Popular Messaging Applications

Connectivity cloud co, Cloudflare (NYSE: NET) announced Plexi, a new service to verify the integrity of public keys in the end-to-end encryption of popular messaging applications. A longtime Cloudflare verification partner, WhatsApp will be the first to implement this new auditing process to strengthen users’ trust in the application’s encryption method.
How Australian Organisations Can Combat Rising Business Logic Abuse

How Australian Organisations Can Combat Rising Business Logic Abuse

By Reuben Koh, Director of Security Technology & Strategy, APJ at Akamai Technologies As more economies around the world become digitalised, the adoption rate in Application Programming Interface (API) has also skyrocketed. According to Market Data Forecast, the size of the global API market is anticipated to grow 34.7% from 2024 to 2029.  ...
Building A Resilient Healthcare Environment Through Proactive Cybersecurity Practices

Building A Resilient Healthcare Environment Through Proactive Cybersecurity Practices

Anna Perez, business development manager, Wavelink and Connected Health  Healthcare providers must continue to prioritise patient data security as digital transformation reshapes the industry. Ensuring the security of sensitive information is about more than simply ticking boxes for compliance; it’s about upholding patient trust and safeguarding ...
The Five Key Processes For Staying Secure With SAP

The Five Key Processes For Staying Secure With SAP

Upon efficiently securing your SAP environment, the next step is to learn how to maintain that security and continuously improve your SAP Security posture. This article highlights some specific recommendations for SAP Security processes.
The Increasing Role Of LLMs And AI In Physical Security

The Increasing Role Of LLMs And AI In Physical Security

The rapid rise of large language models (LLMs) has ushered in a new era of technological possibilities. These AI-driven systems, capable of generating human-quality text, code, and even creative content, have captured the imagination of industries worldwide. The physical security sector is no exception, exploring how LLMs can enhance operations from ...
Oracle is More Than Just a Database Company That Everyone Remembers, says Regional Managing Director

Oracle is More Than Just a Database Company That Everyone Remembers, says Regional Managing Director

I headed over to my almost second home Las Vegas in the United States - where I was at the coalface at the Oracle CloudWorld Event hosted at the Venetian. I, like others, have traditionally known Oracle as the database company - despite OCI generating a foothold in the market. Stephen Bovis, Regional Managing Director of Oracle Australia, New Zealand, ...
Taking a Zero Trust Approach to Managing IoT in Manufacturing

Taking a Zero Trust Approach to Managing IoT in Manufacturing

As the manufacturing industry increasingly embraces the Internet of Things (IoT), the imperative for robust cybersecurity has never been more urgent.
Vital Signs: Why Monitoring High Tech Systems And Data Is Critical For Australian Healthcare Providers

Vital Signs: Why Monitoring High Tech Systems And Data Is Critical For Australian Healthcare Providers

World Patient Safety Day is a timely reminder of the threat hackers and cyber-criminals pose to the country’s most vulnerable.
No results found.

In The News

Turnitin Enhances Capabilities Amid Growing AI Bypasser Use

Turnitin Enhances Capabilities Amid Growing AI Bypasser Use

New detection feature helps educators detect potential AI misuse
Check Point Named a Leader in the 2025 Gartner Magic Quadrant for Hybrid Mesh Firewall

Check Point Named a Leader in the 2025 Gartner Magic Quadrant for Hybrid Mesh Firewall

Delivering AI-powered network security across on-premises, cloud and SASE to prevent the most advanced threats
CyberArk Helps Optiv Transform Workforce Access, Applying Privilege Controls to Every Identity

CyberArk Helps Optiv Transform Workforce Access, Applying Privilege Controls to Every Identity

Replaces legacy SSO with CyberArk to enable secure, frictionless workforce access
HCLTech and Rubrik to Deliver Multi-Layered Cybersecurity

HCLTech and Rubrik to Deliver Multi-Layered Cybersecurity

HCLTech’s VaultNXT powered by Rubrik provides ransomware detection and remediation, ensuring data integrity for complete cyber resilience
Citrix NetScaler ADC and NetScaler Gateway Zero-Day Remote Code Execution Vulnerability Exploited in the Wild

Citrix NetScaler ADC and NetScaler Gateway Zero-Day Remote Code Execution Vulnerability Exploited in the Wild

Citrix has released patches to address a zero-day remote code execution vulnerability in NetScaler ADC and NetScaler Gateway that has been exploited. Organisations are urged to patch immediately as Citrix’s NetScaler ADC and Gateway appliances have been a valuable target for attackers over the last several years. “While patches are available for ...
Exabeam Research: Insider Threats, Supercharged by AI, Set for Explosive Growth in Australia

Exabeam Research: Insider Threats, Supercharged by AI, Set for Explosive Growth in Australia

82% of Australian respondents report that AI is making insider threats more effective, and 84% expect insider threats to increase in the next 12 months
Axis Unveils Game-Changing Security Solutions for a Safer, Smarter Future at Security & Integrate 2025

Axis Unveils Game-Changing Security Solutions for a Safer, Smarter Future at Security & Integrate 2025

Sydney, Australia – 27 August 2025 – Axis Communications Oceania returns as headline sponsor of Security & Integrate 2025, showcasing intelligent technologies that transform insight into action.  In a world of complex security challenges, Axis is redefining safety, security, business intelligence, and operational efficiency with cutting-edge ...
Phishing Gangs Use Split and Nested QR Codes to Evade Detection In New Wave of ‘Quishing’ Attacks

Phishing Gangs Use Split and Nested QR Codes to Evade Detection In New Wave of ‘Quishing’ Attacks

Barracuda threat analysts have uncovered two innovative techniques being used by cyber attackers to help malicious QR codes evade detection in phishing attacks.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This