The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Five common challenges with securing cloud-based applications
The number of cloud applications has grown in parallel with the high rate of cloud adoption among Australian businesses over the past couple of years.

The overlap between physical and digital security – how to get smart with compliance
Government reforms, such as the recent review of the Privacy Act that proposes significant changes to data is collected, stored, used and disposed of has put all organisations on notice. And while the focus often falls on personal identifiable information (PII), the scope of the current legislation and proposed changes impacts the collection of ...

Espionage Fuels Global Cyberattacks
In the past year cyberattacks have touched 120 countries, fueled by government-sponsored spying and with influence operations (IO) also rising.
Cybersecurity Incidents Are Now Full-Scale Crisis Management
Cybersecurity incidents have typically been viewed through a technical lens.

Research: A Deep Dive into Stream-Jacking Attacks on YouTube
Bitdefender has released new research highlighting a rapid increase in YouTube stream-jacking attacks.

Quality over Quantity: Algorithmic Transparency, accountability and Intellectual Property- A Call for Explainable AI
Our society is populated by artificial entities known as the programmable race. While their presence is often apparent, comprehension sometimes takes a back seat. They serve us in customer service roles, engage with us in video games, and inundate our personalised social media feeds. Today, they have even infiltrated our financial lives, using AI tools ...

How CIAM Platforms Improve Customer Privacy and Security
As consumers undertake a growing proportion of transactions online, awareness is increasing of the need to have both strong security and privacy protection-measures in place. Businesses that can tick these boxes will find it much easier to attract and retain customers.

Secure Code Warrior to Host 3rd Annual Devlympics Competition
Held during Cybersecurity Awareness Month, global tournament enables DevOps community to test their skills against vulnerabilities
No results found.
In The News
espresso Displays Selects Oracle NetSuite To Streamline Global Processes
espresso Displays Gains a Sharper Picture of its Business with Oracle NetSuite
Australian tech company chooses NetSuite to help streamline global processes and increase productivity as it grows
SYDNEY, January 22, 2024 - espresso Displays, an Australian tech company that developed the world’s thinnest interactive portable displays, has selected ...

CloudSEK Warns of Scammers Exploiting Zendesk to Impersonate Brands
BENGALURU: CloudSEK, a leader in AI-powered cybersecurity solutions, has uncovered how cybercriminals can exploit a seemingly simple feature of Zendesk’s SaaS platform.
CloudSEK’s latest research highlights how Zendesk subdomain registrations could be misused to impersonate legitimate brands and facilitate phishing and investment scams, putting ...
Exabeam Continues to Deliver Real AI-Driven Cybersecurity with Launch of LogRhythm Intelligence Copilot
BROOMFIELD, Colo. & FOSTER CITY, Calif. – January 20, 2025 -- Exabeam, a global cybersecurity leader that delivers AI-driven security operations, today announced the launch of LogRhythm Intelligence Copilot, a generative AI-powered feature delivering actionable insights to empower security teams and accelerate workflows. This release solidifies ...
Hack The Emulated Planet: Vulnerability Hunting Planet WGS-804HPT Industrial Switch
Emulators such as the open-source, cross-platform QEMU framework are invaluable tools for researchers conducting vulnerability research. QEMU and other emulators act as great testing environments where software and firmware can be analyzed for exploitable vulnerabilities. They can also be taken a step further for testing exploits within a safe ...
Cognizant Leads Enterprises into Next Generation of AI Adoption with Neuro® AI Multi-Agent Accelerator and Multi-Agent Services Suite
Cognizant has announced its Neuro® AI Multi-Agent Accelerator and Multi-Agent Service Suite. These new offerings accelerate the development and adoption of AI agents, helping empower businesses to transform their business processes using AI agents for adaptive operations, real-time decision-making, and personalised customer experiences - to support all ...
Trend Micro is Recognised as a 2024 Gartner® Peer Insights™ Customers’ Choice for Cloud-Native Application Protection Platforms
The Gartner® Peer Insights™ Customers' Choice Distinction is based on feedback and ratings from end-user professionals who have experience with the product or service
SentinelOne Brings the Power of Purple AI to Zscaler, Okta, Palo Alto Networks, Proofpoint, Fortinet and Microsoft Data
Popular generative AI security analyst can now be used to speed cybersecurity investigations and simplify threat hunting across a growing list of native and third-party sources
CyberArk Integration with Microsoft Defender for Identity Speeds Identification and Containment of Cyber Threats
CyberArk (NASDAQ: CYBR) today announced a new integration between CyberArk Privileged Access Manager (PAM) and Microsoft Defender for Identity, giving organisations a unified, comprehensive view of their entire identity security landscape to allow quicker, more effective threat response and containment.
Defender for Identity is a cloud-based ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..