The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why CISOs Need a Voice In the Boardroom

Why CISOs Need a Voice In the Boardroom

Many organisations feel they are adequately prepared for cyber security these days, due to the simple fact of having a CISO (Chief Information Security Officer) in-situ. Having a senior level executive to oversee security and develop security policies feels like the job is done. However, this is just part (the start) of the journey to cyber maturity. ...
Remediation Over Ratings – Achieving Third-Party Cyber Risk Reduction

Remediation Over Ratings – Achieving Third-Party Cyber Risk Reduction

Modern businesses focussed on third-party cyber risk reduction require both a more comprehensive solution to third-party cyber risk; one that fully manages risk by rapidly identifying and resolving critical cyber security issues in the third-party ecosystem.
Three Force Multipliers To Boost Cybersecurity Protections For Governments

Three Force Multipliers To Boost Cybersecurity Protections For Governments

Government departments, agencies and councils are looking to invest in capabilities and tooling that can act as ‘force multipliers’ for improving their protective coverage against cybersecurity threats.
Combating AI-Driven Attacks with Predictive Breach Technology

Combating AI-Driven Attacks with Predictive Breach Technology

Zscaler's CSO and Head of Security Research, Deepen Desai, recently discussed the latest advancements in AI, cybersecurity, and zero trust strategies during his talk at Zenith Live. One of the key focal points of Desai's presentation was the intersection of AI and cybersecurity. The Researcher explained the landscape of AI-driven attacks and how ...
Small Businesses Can Pull Their SOCs Up

Small Businesses Can Pull Their SOCs Up

Security Operations Centres, or SOCs, are no longer the exclusive domain of large enterprises. Cost-prohibitive legacy on-premises security solutions have given way to the cloud solutions offering greater scalability for enterprises.
Unlocking Cybersecurity Talent – There Are No mythical Unicorns, But You Can Create Strong Diverse Teams

Unlocking Cybersecurity Talent – There Are No mythical Unicorns, But You Can Create Strong Diverse Teams

The mythical cybersecurity unicorn – someone that can manage the minutiae of data coming in from logs, understand business risks in detail, communicate them to your board and run your security education and awareness program – does not exist.  
Mobile Security Becomes Critical as Android Users Continue Using Handsets After Expiry

Mobile Security Becomes Critical as Android Users Continue Using Handsets After Expiry

As people put off upgrading their still-functional Android phones, an ever-growing proportion are becoming outdated, and threat actors are cashing in.
Why Software Developers Play a Critical Role in Achieving Effective Cybersecurity

Why Software Developers Play a Critical Role in Achieving Effective Cybersecurity

Raising the standard of code quality will take a significant change in how developers view and learn security best practices. With the challenge of protecting against an evolving threat landscape in perpetuity, the time to implement lasting change is now.
No results found.

In The News

Oracle to Offer Google’s Gemini Models to Customers, Accelerating Enterprises’ Agentic AI Journeys

Oracle to Offer Google’s Gemini Models to Customers, Accelerating Enterprises’ Agentic AI Journeys

Customers will have access to highly performant, flexible Gemini multimodal models via OCI Generative AI service. Oracle will collaborate with Google Cloud on various Gemini model integrations across business applications
CrowdStrike Unveils Falcon Next-Gen Identity Security, the First Unified Solution to Protect Every Identity Across the Attack Chain

CrowdStrike Unveils Falcon Next-Gen Identity Security, the First Unified Solution to Protect Every Identity Across the Attack Chain

Only CrowdStrike unifies initial access, privileged access, ITDR, and SaaS security for every human, non-human, and AI agent identity into a single platform – delivered today, without delays or integration complexity
VAST Data Collaborates with SK Telecom to Optimise Korea’s Largest AI Infrastructure Based on NVIDIA Supercomputers

VAST Data Collaborates with SK Telecom to Optimise Korea’s Largest AI Infrastructure Based on NVIDIA Supercomputers

VAST Data today announced a partnership with SK Telecom (SKT), South Korea’s leading telecommunications provider that’s transforming itself into an AI company. To deploy its advanced AI platform on SKT’s new sovereign AI infrastructure powered by the latest NVIDIA Blackwell GPUs. Named the Haein Cluster, this AI infrastructure, designed initially ...
From Weakest Link to Cyber Shield: ESET Launches Awareness Training in Australia

From Weakest Link to Cyber Shield: ESET Launches Awareness Training in Australia

ESET launches ESET Cybersecurity Awareness Training in Australia, helping local businesses to avoid breaches resulting from human error. ESET Cybersecurity Awareness Training helps meet ISM-0252, NIS2, HIPAA, PCI, SOX, GDPR, and CCPA compliance requirements, as well as insurance requirements. This online educational and testing source puts 30 years ...
Qualys Honored with Dual Win at Prestigious Pwnie Awards for Groundbreaking Cybersecurity Research

Qualys Honored with Dual Win at Prestigious Pwnie Awards for Groundbreaking Cybersecurity Research

Wins for Epic Achievement and Best RCE spotlight Qualys’ industry-leading research into critical OpenSSH vulnerabilities, reinforcing its leadership in global cybersecurity innovation
Tenable Jailbreaks OpenAI’s GPT-5 Within 24 Hours, Bypassing New Safety Features

Tenable Jailbreaks OpenAI’s GPT-5 Within 24 Hours, Bypassing New Safety Features

Just 24 hours after OpenAI launched its highly anticipated GPT−5 model with promises of “significantly more sophisticated” prompt safety, exposure management company Tenable has successfully jailbroken the platform, compelling it to provide detailed instructions on how to build a Molotov cocktail. On August 7, 2025, OpenAI unveiled GPT−5, touting its ...
Fortinet Enhances FortiRecon to Align With Continuous Threat Exposure Management Framework to Help Organisations Stay Ahead of Threats

Fortinet Enhances FortiRecon to Align With Continuous Threat Exposure Management Framework to Help Organisations Stay Ahead of Threats

New features integrate attack surface management, threat intelligence, and security orchestration to help security teams reduce risk faster and more proactively
Genetec Continues To Dominate Video Surveillance Software Market, According To Latest Analyst Reports

Genetec Continues To Dominate Video Surveillance Software Market, According To Latest Analyst Reports

Growing SaaS adoption and customer demand for flexible, open solutions strengthen company’s continued market leadership.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This