The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Sports Venues Must Vet Their Vendors To Maintain Security

Sports Venues Must Vet Their Vendors To Maintain Security

High-profile sporting events over the last few months have presented a number of cybersecurity challenges. Sporting events generate a lot of consumer activity, from hotels and restaurants to retail. Large sporting events are held together by webs of connectivity that include vendors, sponsors, employees, and consumers. These networks connect ticketing, ...
New Tenable Research Reveals Only 3% of Vulnerabilities  Pose Significant Cybersecurity Risk

New Tenable Research Reveals Only 3% of Vulnerabilities Pose Significant Cybersecurity Risk

Company analysed 50 Trillion data points over two decades to identify critical vulnerabilities
From Dollars to Digital – Your Guide to Investing Safely

From Dollars to Digital – Your Guide to Investing Safely

Australia has become a growing market for use of cryptocurrency with awareness amongst Australian consumers reaching a new high of 95 per cent. Despite this, recent 2024 data suggests almost half of the Australian population are hesitant to buy cryptocurrency. We know common misconceptions and reasons for the hesitancy include beliefs the pricing ...
The Evolving Threat Landscape Facing Australia’s Banks

The Evolving Threat Landscape Facing Australia’s Banks

The increasing reliance on digital and mobile banking has created new opportunities for fraudsters. While digital banking offers convenience and efficiency, it also introduces new vulnerabilities. The move away from in-person interactions has made it easier for cybercriminals to target individuals and carry out fraudulent activities online.
Why ‘Secure by Design’ Is Critical In Today’s Interconnected World

Why ‘Secure by Design’ Is Critical In Today’s Interconnected World

Organisations are currently unprepared to enact a high, consistent standard of software creation that follows secure-by-design principles. This needs to improve exponentially, and precision measurement of organisational security maturity—and individual developer security skills—will be paramount in facilitating the right growth and knowledge building.
Ransom Data Should Be Made Public

Ransom Data Should Be Made Public

The Government should consider making data on ransoms paid for cyber attacks public to educate industry about the scale of the problem.
Cybersecurity in the Age of AI

Cybersecurity in the Age of AI

Venky Raju, Field CTO, ColorTokens, writes on why AI-powered threats demand a shift in breach readiness strategies and how microsegmentation can help.
Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum

Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum

The sale and purchase of unauthorised access to compromised enterprise networks has become a linchpin for cybercriminal operations, particularly in facilitating ransomware attacks. Underground forums are sharing guidelines on breaching networks and selling the access they obtain, leaving the exploitation to other malicious actors. In this article, we ...
No results found.

In The News

Darktrace and SB C&S Corp Enter Into Distributor Agreement

Darktrace and SB C&S Corp Enter Into Distributor Agreement

Darktrace Limited (hereinafter “Darktrace”) and SB C&S Corp. (hereinafter “SB C&S”) have entered into a distribution agreement to provide Darktrace's innovative AI-based “ActiveAI Security Platform” to companies in Japan and will begin handling the product on August 20, 2025. In recent years, the frequency of cyber security incidents has ...
Rapid7 Launches Vector Command Advanced, Empowering Security Teams to Understand and Validate Exposures with Expertise of Elite Red Teamers

Rapid7 Launches Vector Command Advanced, Empowering Security Teams to Understand and Validate Exposures with Expertise of Elite Red Teamers

Rapid7 has launched Vector Command Advanced, expanding its continuous red teaming and exposure validation service.
LevelBlue Completes Acquisition of Trustwave to Form the World’s Largest Pure-Play Managed Security Services Provider

LevelBlue Completes Acquisition of Trustwave to Form the World’s Largest Pure-Play Managed Security Services Provider

August 20, 2025 – LevelBlue, a global leader in cloud-based, artificial intelligence (AI)-driven managed security services (MSS), has completed its acquisition of Trustwave, a global provider of cybersecurity and managed detection and response (MDR) leader. Today’s acquisition establishes LevelBlue as the world’s largest pure-play MSSP with the ...
New Fastly Threat Research Reveals AI Crawlers Make Up Almost 80% of AI Bot Traffic, Meta Leads AI Crawling As ChatGPT Dominates Real-Time Web Traffic

New Fastly Threat Research Reveals AI Crawlers Make Up Almost 80% of AI Bot Traffic, Meta Leads AI Crawling As ChatGPT Dominates Real-Time Web Traffic

AI bots are driving increased content scraping, operational load, and high-frequency access patterns, revealing emerging risks from unverified automation traffic.
Ping Identity Unveils Just-in-time Privileged Access Capability to Empower Enterprises Across the Full Identity Lifec

Ping Identity Unveils Just-in-time Privileged Access Capability to Empower Enterprises Across the Full Identity Lifec

Robust Identity Trifecta answers dynamic business needs within a centralised platform
BeyondTrust Completes Australian Infosec Registered Assessor Program (IRAP) at “PROTECTED” Classification Level

BeyondTrust Completes Australian Infosec Registered Assessor Program (IRAP) at “PROTECTED” Classification Level

New security status enables BeyondTrust to provide assurance in helping the Australian Government reinforce cloud posture. IRAP-assessed solutions now enable public sector agencies to ascertain BeyondTrust’s readiness for secure cloud adoption.
Oracle to Offer Google’s Gemini Models to Customers, Accelerating Enterprises’ Agentic AI Journeys

Oracle to Offer Google’s Gemini Models to Customers, Accelerating Enterprises’ Agentic AI Journeys

Customers will have access to highly performant, flexible Gemini multimodal models via OCI Generative AI service. Oracle will collaborate with Google Cloud on various Gemini model integrations across business applications
CrowdStrike Unveils Falcon Next-Gen Identity Security, the First Unified Solution to Protect Every Identity Across the Attack Chain

CrowdStrike Unveils Falcon Next-Gen Identity Security, the First Unified Solution to Protect Every Identity Across the Attack Chain

Only CrowdStrike unifies initial access, privileged access, ITDR, and SaaS security for every human, non-human, and AI agent identity into a single platform – delivered today, without delays or integration complexity
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This