The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

AI for Cybersecurity: Use With Caution

AI for Cybersecurity: Use With Caution

This article discusses the challenges and opportunities that AI poses to cybersecurity, specifically looking into how companies can approach it with caution.
Why Humans Are No Longer The Weakest Link In The Cyber Chain

Why Humans Are No Longer The Weakest Link In The Cyber Chain

We’ve all heard the mantra that ‘humans are the weakest link’ in any organisation’s cybersecurity defences, but with generative AI technology making exploits such as phishing email campaigns more convincing and scalable, it’s no longer fair — or effective — to blame individuals for succumbing to attacks. It’s Andrew’s view that while cyber training ...
Stream-Jacking 2.0: Deep fakes power account takeovers on YouTube to maximise crypto-doubling scams

Stream-Jacking 2.0: Deep fakes power account takeovers on YouTube to maximise crypto-doubling scams

Stream-Jacking & Deep fakes. If you ever observe content promoting giveaways or other events from well-known companies, always make sure to double-check the promotions on official websites.
Credential Stuffing – Industry Commentary from Tenable

Credential Stuffing – Industry Commentary from Tenable

Commentary on a new tactic scammers are employing called credential stuffing which is affecting the retail sector and can result in fraudulent transactions being made using payment information saved on popular retail sites.
Why Effective Digital ID Management is Vital in Financial Services

Why Effective Digital ID Management is Vital in Financial Services

Institutions that take digital ID seriously and put it at the forefront of application planning and deployment will be best placed to secure an increasing share of a rapidly growing market.
Improving Cybersecurity Within Australia’s Water Utilities

Improving Cybersecurity Within Australia’s Water Utilities

In a world of unceasing cyberattacks, security is no longer a luxury but a vital investment. By taking action now, utilities can ensure the uninterrupted flow of water to their customers at all times.
The Three Steps to Mitigate API Abuse in Cloud-hosted Applications

The Three Steps to Mitigate API Abuse in Cloud-hosted Applications

APIs have become a strategic necessity for business because they aid flexibility and agility, yet many organisations have remained cautious of their use due to worries about the data that APIs expose. The concerns are fanned by regular reports of IT security breaches that cause downtime, data loss and financial problems for victims. This article looks ...
Cybersecurity Challenges and the Need for a Mindset Shift

Cybersecurity Challenges and the Need for a Mindset Shift

In a recent interview with cybersecurity expert, Corien Vermaak, Head of Cybersecurity from Cisco ANZ, was a discussion about the evolving landscape of cybersecurity and the challenges posed by breaches and the shortage of skilled practitioners shed light on the urgent need for a value mind shift in understanding the importance of personal data ...
No results found.

In The News

Building Cyber Resilience With Yubico and Microsoft

Building Cyber Resilience With Yubico and Microsoft

In today’s digital landscape, cyber threats are evolving at an unprecedented pace: every second, a phishing attack takes place. In fact, over 80% of these attacks are the result of stolen login credentials and almost 70% of phishing attacks relied on AI last year alone. Recent data from Microsoft Entra also reveals a staggering increase in attempted ...
Over 72% of APAC Warehouse Workers Report Injury Concerns On Ground

Over 72% of APAC Warehouse Workers Report Injury Concerns On Ground

Workers also stressed about meeting business goals if warehouse leaders don’t embrace intelligent automation
Fastly Research Reveals 93% of Organisations Working to Reduce CISO Liability Risk

Fastly Research Reveals 93% of Organisations Working to Reduce CISO Liability Risk

Increasing CISO involvement in strategic decisions at the board level and improving legal support for cybersecurity staff among the corporate policy changes 
South Australia’s Southern Cyber Strengthens Security with Check Point Software Prevention-First Strategy

South Australia’s Southern Cyber Strengthens Security with Check Point Software Prevention-First Strategy

Sydney – 6 March 2025 – Check Point Software Technologies Ltd (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced that Adelaide-based Southern Cyber, a leading provider of cyber security solutions, has reinforced its commitment to delivering world-class cyber security by implementing a prevention-first ...
Progress Unveils New Data Security Features to Help Organisations Meet PCI DSS 4.0 Requirements

Progress Unveils New Data Security Features to Help Organisations Meet PCI DSS 4.0 Requirements

The new WAF functionality in MOVEit Cloud adds additional protection against cyber threats and supports compliance with evolving security standards for sensitive data transfers
JFrog and Hugging Face Team to Improve Machine Learning Security and Transparency for Developers

JFrog and Hugging Face Team to Improve Machine Learning Security and Transparency for Developers

New integration significantly improves the quality and trustworthiness of open-source ML Models, resulting in safer, more responsible AI for everyone
JFrog Becomes an AI System of Record, Launches JFrog ML – Industry’s First End-to-End DevOps, DevSecOps & MLOps Platform for Trusted AI Delivery

JFrog Becomes an AI System of Record, Launches JFrog ML – Industry’s First End-to-End DevOps, DevSecOps & MLOps Platform for Trusted AI Delivery

JFrog ML Drives MLOps practices coupled with AI Security - Unifying Developer, Data Science & Operations Teams with Enterprise-wide Automation & Control of AI-powered Software Delivery 
JFrog Unveils Secure AI Model Delivery Accelerated by NVIDIA NIM Microservices

JFrog Unveils Secure AI Model Delivery Accelerated by NVIDIA NIM Microservices

Sydney, Australia – March 5, 2025  – JFrog Ltd (Nasdaq: FROG), the Liquid Software company and creators of the JFrog Software Supply Chain Platform, is announcing general availability of its integration with NVIDIA  NIM microservices, part of the NVIDIA AI Enterprise software platform. The JFrog Platform is the only unified, end-to-end, and secure ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This