The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Escalating Cyberattacks Puts Pressure On Marketers To Rethink Customer Data
With boards and organisations feeling the heat, is it time for marketers to analyse the customer information they really need and consider more innovative methods to connect with customers and prospects. One of the keys to building a successful sales funnel is understanding what your new and potential customers want. That means collecting and using ...

Softly, Softly: Why The Australian Cybersecurity Strategy Is A Missed Opportunity To Alter The Status Quo
It’s fair to say that, for the past couple of years, we have seen regular changes to cybersecurity policy across most Western governments. The United States has been exceptionally proactive, spurred on by the fallout of large-scale cyber incidents like the Solar Winds supply chain attack, and the disruptive Colonial Pipeline cyberattack. And on our own ...

Separating Fact From Fiction: The Importance of Transparency in Cybersecurity
A closer look at our recent interview with Raj Samani, Senior Vice President, Chief Scientist from Rapid7.

The Unspoken Voice – CFOs Perspective On Security
The increasing and severe impact of cybersecurity risks on businesses. Short-term effects, like stock price declines after a cyberattack, are well-known, but the long-term consequences can be even more significant. Cyber incidents can lead to a loss of competitive advantage, reduced credit rating, and increased cyber insurance premiums. The financial ...

Cybersecurity Implications of Cryptocurrency and Blockchain Technology
Introduction
This essay explores the intricate relationship between cybersecurity and cryptocurrency, with a focus on the underlying blockchain technology. Cryptocurrencies, led by Bitcoin, have gained significant traction in recent years, revolutionising financial transactions. However, the decentralised and pseudonymous nature of cryptocurrencies, ...

Can Being “Compliant” Ever Top Being “Secure”?
My question is, who’s regularly assessing to make sure those locks aren’t being picked, that the alarms haven’t been disabled, and that the guards aren’t asleep?

A Look Inside a Cybercriminal Execution Chain
During a cyber attack, the process of compromising a machine rarely involves a single step.

The Top Seven Tech and Cybersecurity Predictions To Watch Out For in 2024
With the end of the year rapidly approaching, it’s time to make some educated predictions about what 2024 has in store when it comes to technology and cybersecurity.
No results found.
In The News
CyberArk Acquires Zilla Security to Reshape Identity Governance and Administration for the Modern Enterprise
Industry-leading identity security combined with modern IGA sets a new paradigm for compliance and identity lifecycle management
Bitdefender Acquires BitShield Division to Expand Presence in Asia-Pacific
Bitdefender has announced the acquisition of a key division of BitShield, responsible for distributing Bitdefender solutions in Malaysia and Brunei as a trusted Country Partner. The acquisition underscores Bitdefender’s continued investment in the Asia-Pacific (APAC) region, one of cybersecurity’s fastest-growing markets.
This acquisition aligns ...
Victorian Government Extends Investment in Resilient Land Mobile Radio Communications with Motorola Solutions
The Victorian government has signed a 10-year, AUD $500 million (USD ~$330 million) contract with Motorola Solutions to maintain and enhance the Metropolitan Mobile Radio network (MMR) relied upon by the state’s emergency services.
The contract with the Department of Justice and Community Safety will extend MMR’s operation until 2035, providing ...
Confluent and Databricks Expand Partnership to Usher In New Age of Real-time AI
Data streaming company Confluent has unveiled a major expansion of its partnership with Databricks, bringing together Confluent’s complete Data Streaming Platform and Databricks’ Data Intelligence Platform to empower enterprises with real-time data for AI-driven decision-making. New integrations between Confluent's Tableflow and Databricks Unity ...
LLMjacking Targets DeepSeek: A Growing Security Threat
Since its initial discovery in May 2024 by the Sysdig Threat Research Team (TRT), LLMjacking has rapidly evolved, posing a significant risk to organizations relying on large language models (LLMs). The latest wave of attacks has set its sights on DeepSeek, a fast-growing AI model that cybercriminals exploited within days of its release.
Understanding ...
JFrog Signs Agreement with AWS to Help Enterprises Unlock Business Value from Their Software Supply Chains
The new strategic collaboration agreement (SCA) allows enterprise customers to cost-effectively scale their DevSecOps and AI-driven software solutions in the cloud
Check Point and Wiz Enter Strategic Partnership to Deliver End-to-End Cloud Security
The partnership integrates some of the best-in-class cloud network and CNAPP security through seamless technology integration and a strategic business alliance, setting a new standard for enterprise protection
Nozomi Networks Welcomes Schneider Electric to Its MSSP Elite Partner Program to Deliver Advanced Managed Security Services Worldwide
New Full-Scale, Industrial-Focused Security Management Service Designed to Safeguard the Most Complex Operational Environments
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..