The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

JFrog Prevents Supply Chain Attack Through Binary Secret Scanning

JFrog Prevents Supply Chain Attack Through Binary Secret Scanning

The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Python’s, PyPI’s and Python Software Foundation’s GitHub repositories, which was leaked in a public Docker container hosted on Docker Hub. As a community service, the JFrog Security Research team continuously scans public ...
Dark Web Shows Cybercriminals Ready For Olympics. Are you?

Dark Web Shows Cybercriminals Ready For Olympics. Are you?

Major sporting events like the World Cup, Super Bowl, and Wimbledon attract millions, even billions, of viewers. Argentina’s shootout win over France in the final game of the Qatar 2022 World Cup reached a global audience of 1.5 billion viewers. And the Olympics, starting later this month in Paris, is the biggest of them all—with the 2020 Tokyo ...
How Privacy-By-Design Is Influencing Australia’s Physical Security Environments

How Privacy-By-Design Is Influencing Australia’s Physical Security Environments

When designing a comprehensive data protection and privacy strategy, it’s best practice to aim higher than the current legislative requirements. One way to do this is by adopting a privacy-by-design approach - centering on the principle that respect for individual privacy is the foundation of responsible and innovative design. By proactively embedding ...
Technology Company Names Have More Meaning than We Expected…

Technology Company Names Have More Meaning than We Expected…

Creating a strong brand identity is an integral aspect of any technology business, and a large part of any brand identity lies in its name. While many brands are simply named after their Founders, or geological locations others have more interesting origins. These names are often carefully chosen to reflect the company's mission, values, or ...
Exploring Opportunities, Fears, and the Future with AI

Exploring Opportunities, Fears, and the Future with AI

Claudionor Coelho, Chief AI Officer from Zscaler, and a member of the World Economic Forum AI Group at Zenith Live chatted with me about large language models (LLMs) and the potential ethical challenges surrounding their use.Recently it was announced about the launch of Copilot at Zscaler and how the technologies presented were utilised in the creation ...
Why Robust Disaster Recovery Is a USP for MSPs

Why Robust Disaster Recovery Is a USP for MSPs

As Australia’s technological landscape continues to evolve rapidly, businesses are turning to cloud solutions to enhance their operations. But for many starting their cloud journey, concerns about security and disaster recovery can be overlooked when trying to manage and optimise new cloud resources effectively. So who can businesses turn to for proper ...
Why CISOs Need a Voice In the Boardroom

Why CISOs Need a Voice In the Boardroom

Many organisations feel they are adequately prepared for cyber security these days, due to the simple fact of having a CISO (Chief Information Security Officer) in-situ. Having a senior level executive to oversee security and develop security policies feels like the job is done. However, this is just part (the start) of the journey to cyber maturity. ...
Remediation Over Ratings – Achieving Third-Party Cyber Risk Reduction

Remediation Over Ratings – Achieving Third-Party Cyber Risk Reduction

Modern businesses focussed on third-party cyber risk reduction require both a more comprehensive solution to third-party cyber risk; one that fully manages risk by rapidly identifying and resolving critical cyber security issues in the third-party ecosystem.
No results found.

In The News

Pax8 Names Lindsay Zwart as EVP and General Manager of the Asia-Pacific Region at Pax8

Pax8 Names Lindsay Zwart as EVP and General Manager of the Asia-Pacific Region at Pax8

BRISBANE, AUSTRALIA (August 8, 2025) – Pax8, the leading cloud commerce Marketplace, today announced the appointment of Lindsay Zwart as Executive Vice President and General Manager of the Pax8 Asia-Pacific (APAC) region. In this role, Zwart will spearhead all aspects of the APAC business for Pax8, driving the company’s ambitious growth strategy by ...
ManageEngine to ‘Bowl Over’ Cyber Threats at Iconic Australian Cricket Grounds

ManageEngine to ‘Bowl Over’ Cyber Threats at Iconic Australian Cricket Grounds

Company announces events that explore the intersection of identity security, Zero Trust, and real-time threat defence in a unique Australian setting
Oracle Helps Customers Achieve Extreme Availability and Performance for Mission-Critical and Agentic AI Applications

Oracle Helps Customers Achieve Extreme Availability and Performance for Mission-Critical and Agentic AI Applications

With Oracle Globally Distributed Exadata Database on Exascale Infrastructure, customers can run distributed workloads of all types, including agentic AI, analytics, and transactional while lowering costs. Transparent access to data and the industry’s broadest set of data distribution policies help customers address data sovereignty and performance ...
Fortinet Reports Second Quarter 2025 Financial Results

Fortinet Reports Second Quarter 2025 Financial Results

Highlights  Revenue grew 14 per cent year over year to US$1.63 billion  Billings grew 15 per cent year over year to US$1.78 billion (1)  Unified secure access service edge (SASE) annual recurring revenue (ARR) up 22 per cent and Security Operations ARR up 35 per cent, year over year (2)  GAAP operating margin of 28 per cent  Non-GAAP operating ...
Ransomware Attacks Surge in Australia: One in Three Hit Multiple Times – New Report

Ransomware Attacks Surge in Australia: One in Three Hit Multiple Times – New Report

One in Three Australian Ransomware Victims Hit Multiple Times as Security Gaps Persist. New International Research Shows Ransomware Thrives in Complex and Fragmented IT Security Environments.
F5 and Equinix Expand Partnership to Accelerate AI-Ready Infrastructure for Secure Global Application Delivery

F5 and Equinix Expand Partnership to Accelerate AI-Ready Infrastructure for Secure Global Application Delivery

New joint capabilities help enterprises deploy and secure distributed AI workloads and modern apps—without physical infrastructure overhead
Tenable Expands Exposure Management Platform to Secure Enterprise AI

Tenable Expands Exposure Management Platform to Secure Enterprise AI

Tenable AI Exposure gives organisations unprecedented visibility into and control over the use of widely adopted generative AI tools like ChatGPT Enterprise and Microsoft Copilot

KnowBe4 Deploys Additional Agentic Capabilities to Bolster Customers’ AI Defences

Sydney, Australia, 7 August 2025 –KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management (HRM), is proud to highlight the success of its customers in achieving remarkable transformations in their HRM programs. By leveraging KnowBe4’s HRM+ platform and advanced AI-driven products including AIDA ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This