The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Protecting Data From Ransomware: The Power of Advanced Encryption

Protecting Data From Ransomware: The Power of Advanced Encryption

Ransomware attacks have become a pressing threat to businesses worldwide, with their potential to encrypt sensitive data and hold organisations hostage. While many focus on preventing such attacks, the ability to mitigate their consequences is equally crucial. This article explores how advanced encryption techniques, including quantum-powered ...
Tackling Takedowns – How to Mitigate Risks of Fake Domains

Tackling Takedowns – How to Mitigate Risks of Fake Domains

As cyber threat actors continue to leverage more and more sophistication in phishing attacks and other cases of fraud targeting customers and consumers, organisations need to take proactive steps to stay ahead and be ready to respond when those threats are identified.
Oracle Cloud – the Late Bloomer

Oracle Cloud – the Late Bloomer

For years, the tech behemoth Oracle stood in the shadows of cloud giants like Amazon and Microsoft. But now, with their second-gen Oracle Cloud Infrastructure (OCI), Oracle is rewriting the cloud playbook. Oracle is far more than just the database company as most people would have memories of.Mahesh Thiagarajan, Executive Vice President of OCI, whose ...
The Invisible Siege on Our Supply Chain

The Invisible Siege on Our Supply Chain

Daniel Churches, Sales Director at ColorTokens, a captain in breach readiness and containment, lifts the veil on the precarious state of cybersecurity today. "When I say breach readiness, I speak from a place of inevitability," Churches states. The reality is that breaches aren’t just possible; they’re practically guaranteed. "A breach is likely ...
Identity Platforms Are No Longer Just a Backend Issue

Identity Platforms Are No Longer Just a Backend Issue

Businesses are perpetually cornered, navigating cybersecurity threats and trying to keep their head above water with their never ending laundry list of security to-do’s. Simon Hodgkinson, Advisor from Semperis and former Chief Information Security Officer (CISO) at one of the world's largest oil companies, opened up about his experience towards ...
The Art of Mastering Cyber Risk: From Spreadsheets to Strategic Resilience in Critical Infrastructure

The Art of Mastering Cyber Risk: From Spreadsheets to Strategic Resilience in Critical Infrastructure

Critical Infrastructure leaders must move beyond compliance to integrated cyber risk management to protect services and build resilience.
Cybersecurity’s Evolution and the Shift Toward Secure-By-Design Principles

Cybersecurity’s Evolution and the Shift Toward Secure-By-Design Principles

To achieve a high level of cybersecurity maturity, organisations must move beyond reliance on security tools and AppSec experts, embracing a culture of security at all levels. Effective Secure-by-Design adoption depends on building a security-conscious workforce through structured, ongoing education and incentives that encourage developers to take ...
Navigating the Identity Security Maze: Critical Challenges for Australian Financial Services in 2025

Navigating the Identity Security Maze: Critical Challenges for Australian Financial Services in 2025

Australia's digital payments sector is booming, but many financial institutions, particularly smaller ones, face significant challenges due to outdated identity security systems. These challenges are compounded by increasing cyberattacks, stringent regulatory pressures, inefficient manual processes, and the growing complexity of machine identities. In ...
No results found.

In the News

Check Point Introduces AI-Driven Exposure Management to Close the Cyber Security Remediation Gap

Check Point Introduces AI-Driven Exposure Management to Close the Cyber Security Remediation Gap

Designed for AI-era attacks, Exposure Management helps organisations reduce risk faster using existing security controls 
Black Kite’s 2026 Wholesale & Retail Report Reveals Over 70% of Major Retailers, Nearly 60% of Wholesalers, and 52% of the Supply Chain Have Exposed Credentials

Black Kite’s 2026 Wholesale & Retail Report Reveals Over 70% of Major Retailers, Nearly 60% of Wholesalers, and 52% of the Supply Chain Have Exposed Credentials

Report finds the sectors’ shared supply chain is the greatest risk, as attackers view wholesale and retail as an interconnected target landscape
Hiring Season Is Scam Season: How Fake Recruiters Exploit Job Seekers With Trusted Brand Names

Hiring Season Is Scam Season: How Fake Recruiters Exploit Job Seekers With Trusted Brand Names

According to Bitdefender’s Antispam Lab latest data, a wave of fake recruitment emails is actively circulating, timed to coincide with the early-year hiring surge. These scams impersonate well-known employers and staffing companies, promising easy jobs, fast interviews, and flexible work. ‘Your interview is confirmed’ These scams open with good ...
Total Economic Impact Study: JFrog Unifies and Accelerates the Secure Software Supply Chain From Code to AI

Total Economic Impact Study: JFrog Unifies and Accelerates the Secure Software Supply Chain From Code to AI

New Industry Analyst Study Shows that JFrog Delivered 282% ROI in Three Years, Reducing Risk While Accelerating Safer Software Releases for Enterprises
Check Point Software Technologies Reinforces New Zealand Presence With Local Check Point Harmony SASE Data Residency Instance

Check Point Software Technologies Reinforces New Zealand Presence With Local Check Point Harmony SASE Data Residency Instance

New Point of Presence Enhances Web application and API protection with low latency and delivers Industry-Leading Threat Prevention and Cloud-Ready Security Architecture
Sophos Expands Portfolio With Workspace Protection to Secure Hybrid Work and Govern Employee AI Use

Sophos Expands Portfolio With Workspace Protection to Secure Hybrid Work and Govern Employee AI Use

Sophos today announced Sophos Workspace Protection, expanding its portfolio to help organisations secure hybrid work and govern the use of emerging technologies, including AI. Built around the Sophos Protected Browser, powered by Island, the solution enables organisations to protect applications, data, users, and guests wherever work takes place, while ...
Five Enterprise Security Predictions for 2026 for Australia’s Most Critical Services

Five Enterprise Security Predictions for 2026 for Australia’s Most Critical Services

Weaponised AI and the cyber arms race
Ping Identity Advances Universal Services to Redefine Trust in the Age of AI-Driven Fraud

Ping Identity Advances Universal Services to Redefine Trust in the Age of AI-Driven Fraud

A new model for continuous, verified trust across every identity, every interaction, and every environment
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This