The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Data Privacy Day – CyberArk’s Insights for Organisations to Protect Privacy

Data Privacy Day – CyberArk’s Insights for Organisations to Protect Privacy

Olly Stimpson, Senior Security Strategy Adviser ANZ at CyberArk provides his recommendations for organisations to protect privacy in the lead up to Data Privacy Day.
Cybersecurity in 2025: What Will and Needs to Transpire

Cybersecurity in 2025: What Will and Needs to Transpire

In 2025, there will be a shift in cybersecurity focus as companies examine how they address the operational demands involving the ever-present threats from bad actors. Many companies will renew their emphasis on organizational resilience and prioritize it over third-party software. They will strengthen their in-house security frameworks to withstand ...
Data Transfer Secrets Revealed

Data Transfer Secrets Revealed

From the battlefields of war to the boardrooms of civilian enterprises, Antony Reynolds, Vice President of Federal and National Security at Bridgeworks, or "Tony" as I’ve come to know him, delivers revelations on the technology transforming data transfer from a sluggish chore to a lightning-fast marvel. Reynolds’ belief and metaphor he goes by is: ...
Make CNAPP Decisions to Stay Ahead of Cloud Threats

Make CNAPP Decisions to Stay Ahead of Cloud Threats

Cloud-Native Application Protection Platforms (CNAPPs) are a game changer in cloud security. CNAPPs are rapidly becoming the central nervous system of cloud defence, offering businesses a comprehensive solution to manage risk in today’s fast-changing digital environment.
The Unseen Powerhouse: 2020partners

The Unseen Powerhouse: 2020partners

As far as cybersecurity networks go, 2020Partners stands out—a private, non-commercial coalition of senior security professionals transcending conventional borders and limitations. Greg Sim is the Founding Partner of 2020Partners and the pioneer behind this exclusive network. "It’s not even a non-profit," Greg commented, referring to the networks ...
How Mobile Devices Became the Bad Guys’ Favourite Weapon

How Mobile Devices Became the Bad Guys’ Favourite Weapon

Everyone is glued to their mobile devices, sinister cyber threats lurk beneath those sleek screens, waiting to exploit our casual scrolling and innocent application installations. According to Jeff Lindholm, Chief Revenue Officer at Lookout Technologies, our beloved smartphones and tablets are digital best friends - but most are unware their risks that ...
Protecting Data From Ransomware: The Power of Advanced Encryption

Protecting Data From Ransomware: The Power of Advanced Encryption

Ransomware attacks have become a pressing threat to businesses worldwide, with their potential to encrypt sensitive data and hold organisations hostage. While many focus on preventing such attacks, the ability to mitigate their consequences is equally crucial. This article explores how advanced encryption techniques, including quantum-powered ...
Tackling Takedowns – How to Mitigate Risks of Fake Domains

Tackling Takedowns – How to Mitigate Risks of Fake Domains

As cyber threat actors continue to leverage more and more sophistication in phishing attacks and other cases of fraud targeting customers and consumers, organisations need to take proactive steps to stay ahead and be ready to respond when those threats are identified.
No results found.

In the News

CrowdStrike Achieves ISO 42001 Certification for Responsible AI-Powered Cybersecurity

CrowdStrike Achieves ISO 42001 Certification for Responsible AI-Powered Cybersecurity

Certification accelerates leadership in trusted AI governance, enabling organizations to outpace AI-accelerated threats with speed and control
Rapid7 MDR Integrates Microsoft Defender Signals to Create Tangible Security Outcomes

Rapid7 MDR Integrates Microsoft Defender Signals to Create Tangible Security Outcomes

Rapid7 announces the availability of Rapid7 MDR for Microsoft – a pre-emptive threat detection, investigation, and response service that brings together Rapid7’s global SOC, our market-leading SIEM technology, and deeper bi-directional Microsoft Defender integrations.
Check Point Introduces AI-Driven Exposure Management to Close the Cyber Security Remediation Gap

Check Point Introduces AI-Driven Exposure Management to Close the Cyber Security Remediation Gap

Designed for AI-era attacks, Exposure Management helps organisations reduce risk faster using existing security controls 
Black Kite’s 2026 Wholesale & Retail Report Reveals Over 70% of Major Retailers, Nearly 60% of Wholesalers, and 52% of the Supply Chain Have Exposed Credentials

Black Kite’s 2026 Wholesale & Retail Report Reveals Over 70% of Major Retailers, Nearly 60% of Wholesalers, and 52% of the Supply Chain Have Exposed Credentials

Report finds the sectors’ shared supply chain is the greatest risk, as attackers view wholesale and retail as an interconnected target landscape
Hiring Season Is Scam Season: How Fake Recruiters Exploit Job Seekers With Trusted Brand Names

Hiring Season Is Scam Season: How Fake Recruiters Exploit Job Seekers With Trusted Brand Names

According to Bitdefender’s Antispam Lab latest data, a wave of fake recruitment emails is actively circulating, timed to coincide with the early-year hiring surge. These scams impersonate well-known employers and staffing companies, promising easy jobs, fast interviews, and flexible work. ‘Your interview is confirmed’ These scams open with good ...
Total Economic Impact Study: JFrog Unifies and Accelerates the Secure Software Supply Chain From Code to AI

Total Economic Impact Study: JFrog Unifies and Accelerates the Secure Software Supply Chain From Code to AI

New Industry Analyst Study Shows that JFrog Delivered 282% ROI in Three Years, Reducing Risk While Accelerating Safer Software Releases for Enterprises
Check Point Software Technologies Reinforces New Zealand Presence With Local Check Point Harmony SASE Data Residency Instance

Check Point Software Technologies Reinforces New Zealand Presence With Local Check Point Harmony SASE Data Residency Instance

New Point of Presence Enhances Web application and API protection with low latency and delivers Industry-Leading Threat Prevention and Cloud-Ready Security Architecture
Sophos Expands Portfolio With Workspace Protection to Secure Hybrid Work and Govern Employee AI Use

Sophos Expands Portfolio With Workspace Protection to Secure Hybrid Work and Govern Employee AI Use

Sophos today announced Sophos Workspace Protection, expanding its portfolio to help organisations secure hybrid work and govern the use of emerging technologies, including AI. Built around the Sophos Protected Browser, powered by Island, the solution enables organisations to protect applications, data, users, and guests wherever work takes place, while ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This