The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why Taking A Customer-Centric Approach To Cybersecurity Incident Response Is Critical To Maintain Customer Trust

Why Taking A Customer-Centric Approach To Cybersecurity Incident Response Is Critical To Maintain Customer Trust

Introduction Cybersecurity is no longer just an IT issue; it directly impacts customer trust and loyalty. Customers expect their data to be secure and any breach can lead to a significant loss of customer confidence that impacts a company’s reputation and profitability. The increasing importance of regulatory compliance and legal obligations (1) mean ...
Why Agile Learning is Vital for Secure Software Development

Why Agile Learning is Vital for Secure Software Development

Agile learning has emerged as a critical training methodology for high-impact upskilling of software development teams
Romantic Chatbots – To Be, or Not To Be

Romantic Chatbots – To Be, or Not To Be

‘Digital companionship’ has transcended science fiction. It’s now in a fledgling state, driven by a flourishing, if somewhat opportunistic, zeitgeist of AI-driven everything. Chatbots have been around for a long time, digitally speaking - nearly 60 years in fact since ELIZA was first created. And like most technologies, it eventually - and ...
Modern Threats Need Modern Defences – Why We Need To Modernise Cybersecurity

Modern Threats Need Modern Defences – Why We Need To Modernise Cybersecurity

With the benefit of hindsight, we can now look back and understand some of the cyber security missteps of 2023 to understand what we’re missing and how we can learn from our mistakes. We see artificial intelligence adding real tangible value in our efforts to increase defences around risk scoring and create efficiencies in threat hunting – meaning ...
How Organisations Can Combat the Surge in Phishing Attacks

How Organisations Can Combat the Surge in Phishing Attacks

As we rapidly progress into the digital era, Australia aims to become a world leader in cyber security by 2030. However, the threat of cybercrime continues to grow at an alarming rate. Australia has continued to see high-profile breaches leaving Australians’ sensitive data vulnerable and exploited, with some impacted falling victim to several breaches ...
Why Human-Based and Identity Security is Becoming Increasingly Important

Why Human-Based and Identity Security is Becoming Increasingly Important

By adopting a strategy of implementing identity-based security measures, organisations can proactively improve their security posture by establishing defensive practices that help manage threats arising from unpredictable human behaviour. However, for this to work, user actions need to be taken into account.
Upholding the Principles of “Responsible Tech” in a Rapidly-Changing World

Upholding the Principles of “Responsible Tech” in a Rapidly-Changing World

It’s no surprise that with the rapidly evolving landscape of tech, scepticism and concerns - from customers and shareholders is growing. As business leaders, it’s our responsibility to ensure that responsible tech principles are built into the very fibre of what we do. Ensuring that people and the planet are taken care of along the value chain. At BT ...
Is Using Generative AI at Work Cheating? A Quarter of Aussie Office Workers Say “Yes”

Is Using Generative AI at Work Cheating? A Quarter of Aussie Office Workers Say “Yes”

A lack of guidance on generative AI tools in the Australian workplace is creating rifts and increasing risks.
No results found.

In The News

New CyberArk Research: Rapid Growth of Machine Identities, AI Adoption and Cloud Native Innovations Leave Organisations More Vulnerable to Attacks

New CyberArk Research: Rapid Growth of Machine Identities, AI Adoption and Cloud Native Innovations Leave Organisations More Vulnerable to Attacks

77% of security leaders view securing machine identities as vital to protecting the future of AI 
Bitdefender Threat Debrief | March 2025

Bitdefender Threat Debrief | March 2025

Bitdefender has combined information from openly available sources (OSINT) – including news reports and research – with data we gather by analysing Data Leak Portals (DLPs), websites where ransomware groups post details about their victims to develop our March 2025 Threat Debrief. It’s important to remember that we can't independently verify all of ...
Palantir and Databricks Announce Strategic Product Partnership to Deliver Secure and Efficient AI to Customers

Palantir and Databricks Announce Strategic Product Partnership to Deliver Secure and Efficient AI to Customers

Partnership combines Palantir’s Artificial Intelligence Platform (AIP) and Databricks’ Data Intelligence Platform to accelerate the production of AI applications and reduce TCO
Ghost in the Router: China-Linked Espionage Group UNC3886 Targets Juniper Networks

Ghost in the Router: China-Linked Espionage Group UNC3886 Targets Juniper Networks

Cybersecurity firm Mandiant, Google Cloud's threat intelligence division, has uncovered a sophisticated cyber espionage campaign by the China-linked hacking group UNC3886, which has been targeting end-of-life Juniper Networks routers with custom malware.
Intel Expands Tiber Trust Services Portfolio to Combat Evolving Threats

Intel Expands Tiber Trust Services Portfolio to Combat Evolving Threats

Intel Expands Tiber Trust Services Portfolio to Combat Evolving Threats 
Unlocking AI’s Full Potential: EXL’s “AI in action” Event Will Showcase Real-World Strategies to Scale AI for Business Leaders in ANZ

Unlocking AI’s Full Potential: EXL’s “AI in action” Event Will Showcase Real-World Strategies to Scale AI for Business Leaders in ANZ

Building on the success of previous AI in Action events, this year’s edition will bring together visionary leaders, AI experts, and industry professionals from banking, insurance, utilities, retail, technology, transportation, and more.
Extreme Networks Announces Appointment of Anisha Vaswani as Chief Information and Customer Officer

Extreme Networks Announces Appointment of Anisha Vaswani as Chief Information and Customer Officer

Company creates new executive role to drive the interlock between innovation and customer experience
Claroty Announces Amir Preminger as Chief Technology Officer

Claroty Announces Amir Preminger as Chief Technology Officer

Founder of Claroty’s Team82 and Former VP Research to Drive Innovation Across Products, Services, and Operations
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This