The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Sports Venues Must Vet Their Vendors To Maintain Security

Sports Venues Must Vet Their Vendors To Maintain Security

High-profile sporting events over the last few months have presented a number of cybersecurity challenges. Sporting events generate a lot of consumer activity, from hotels and restaurants to retail. Large sporting events are held together by webs of connectivity that include vendors, sponsors, employees, and consumers. These networks connect ticketing, ...
New Tenable Research Reveals Only 3% of Vulnerabilities  Pose Significant Cybersecurity Risk

New Tenable Research Reveals Only 3% of Vulnerabilities Pose Significant Cybersecurity Risk

Company analysed 50 Trillion data points over two decades to identify critical vulnerabilities
From Dollars to Digital – Your Guide to Investing Safely

From Dollars to Digital – Your Guide to Investing Safely

Australia has become a growing market for use of cryptocurrency with awareness amongst Australian consumers reaching a new high of 95 per cent. Despite this, recent 2024 data suggests almost half of the Australian population are hesitant to buy cryptocurrency. We know common misconceptions and reasons for the hesitancy include beliefs the pricing ...
The Evolving Threat Landscape Facing Australia’s Banks

The Evolving Threat Landscape Facing Australia’s Banks

The increasing reliance on digital and mobile banking has created new opportunities for fraudsters. While digital banking offers convenience and efficiency, it also introduces new vulnerabilities. The move away from in-person interactions has made it easier for cybercriminals to target individuals and carry out fraudulent activities online.
Why ‘Secure by Design’ Is Critical In Today’s Interconnected World

Why ‘Secure by Design’ Is Critical In Today’s Interconnected World

Organisations are currently unprepared to enact a high, consistent standard of software creation that follows secure-by-design principles. This needs to improve exponentially, and precision measurement of organisational security maturity—and individual developer security skills—will be paramount in facilitating the right growth and knowledge building.
Ransom Data Should Be Made Public

Ransom Data Should Be Made Public

The Government should consider making data on ransoms paid for cyber attacks public to educate industry about the scale of the problem.
Cybersecurity in the Age of AI

Cybersecurity in the Age of AI

Venky Raju, Field CTO, ColorTokens, writes on why AI-powered threats demand a shift in breach readiness strategies and how microsegmentation can help.
Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum

Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum

The sale and purchase of unauthorised access to compromised enterprise networks has become a linchpin for cybercriminal operations, particularly in facilitating ransomware attacks. Underground forums are sharing guidelines on breaching networks and selling the access they obtain, leaving the exploitation to other malicious actors. In this article, we ...
No results found.

In The News

Mitsubishi Electric to Acquire Nozomi Networks to Improve Industrial Cyber Defences and Power Operational Transformation

Mitsubishi Electric to Acquire Nozomi Networks to Improve Industrial Cyber Defences and Power Operational Transformation

• ‍Nozomi Networks, a global leader in OT, IoT and CPS security, defends organisations around the world from cyber threats and operational disruption ‍ • The acquisition accelerates Nozomi’s industrial cybersecurity innovation while maintaining its heterogeneous approach to supporting customers and partners ‍ • Both companies share a vision for the ...
DevSecOps in the AI Era: JFrog Powers Agentic Remediation with Self-Healing Software Supply Chain

DevSecOps in the AI Era: JFrog Powers Agentic Remediation with Self-Healing Software Supply Chain

New JFrog Platform MCP connections with GitHub Copilot deliver autonomous security resolution capabilities directly into developer workflows
JFrog Unveils Industry’s First Agentic Repository, Revolutionising How Developers Deliver AI-Native Software

JFrog Unveils Industry’s First Agentic Repository, Revolutionising How Developers Deliver AI-Native Software

JFrog Fly delivers a zero-config, fully transparent agentic repository for accelerating modern, AI-driven software delivery
JFrog Unveils AppTrust: “DevGovOps” Solution to Redefine Software Release Governance

JFrog Unveils AppTrust: “DevGovOps” Solution to Redefine Software Release Governance

Platform-native, secure, release management solution delivers evidence-based insights for software supply chain security, compliance, and integrity
Kyndryl Survey Reveals That Mainframe Modernisation Projects Deliver 2-3X Return on Investment

Kyndryl Survey Reveals That Mainframe Modernisation Projects Deliver 2-3X Return on Investment

Respondents expect AI will drive billions in cost savings and increased revenues. The mainframe powers AI innovation across hybrid IT environments.
KnowBe4 Defines a Holistic Approach to Human Risk Management

KnowBe4 Defines a Holistic Approach to Human Risk Management

KnowBe’s new HRM framework guides organisations to transform employees into an active layer of defence through data-driven insights, cultural understanding and targeted interventions
Cohesity Appoints Greg Statton as Chief Technology Officer, Asia Pacific and Japan

Cohesity Appoints Greg Statton as Chief Technology Officer, Asia Pacific and Japan

SYDNEY – September 10 2025 – Cohesity, a leader in AI-powered data security, today announced the appointment of Greg Statton as Chief Technology Officer for the Asia Pacific and Japan (APJ) region. In this newly created role, Statton will lead technology strategy and innovation initiatives across APJ, supporting Cohesity’s mission to deliver ...
Secure Code Warrior Expands Commitment to Secure by Design Best Practices with Free Secure Code Video Series for Developers

Secure Code Warrior Expands Commitment to Secure by Design Best Practices with Free Secure Code Video Series for Developers

Launch of new 12-week video series on AI/LLM security empowers developers to safely adopt AI coding and mitigate emerging security risks 
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This