The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why Humans Are No Longer The Weakest Link In The Cyber Chain

Why Humans Are No Longer The Weakest Link In The Cyber Chain

We’ve all heard the mantra that ‘humans are the weakest link’ in any organisation’s cybersecurity defences, but with generative AI technology making exploits such as phishing email campaigns more convincing and scalable, it’s no longer fair — or effective — to blame individuals for succumbing to attacks. It’s Andrew’s view that while cyber training ...
Stream-Jacking 2.0: Deep fakes power account takeovers on YouTube to maximise crypto-doubling scams

Stream-Jacking 2.0: Deep fakes power account takeovers on YouTube to maximise crypto-doubling scams

Stream-Jacking & Deep fakes. If you ever observe content promoting giveaways or other events from well-known companies, always make sure to double-check the promotions on official websites.
Credential Stuffing – Industry Commentary from Tenable

Credential Stuffing – Industry Commentary from Tenable

Commentary on a new tactic scammers are employing called credential stuffing which is affecting the retail sector and can result in fraudulent transactions being made using payment information saved on popular retail sites.
Why Effective Digital ID Management is Vital in Financial Services

Why Effective Digital ID Management is Vital in Financial Services

Institutions that take digital ID seriously and put it at the forefront of application planning and deployment will be best placed to secure an increasing share of a rapidly growing market.
Improving Cybersecurity Within Australia’s Water Utilities

Improving Cybersecurity Within Australia’s Water Utilities

In a world of unceasing cyberattacks, security is no longer a luxury but a vital investment. By taking action now, utilities can ensure the uninterrupted flow of water to their customers at all times.
The Three Steps to Mitigate API Abuse in Cloud-hosted Applications

The Three Steps to Mitigate API Abuse in Cloud-hosted Applications

APIs have become a strategic necessity for business because they aid flexibility and agility, yet many organisations have remained cautious of their use due to worries about the data that APIs expose. The concerns are fanned by regular reports of IT security breaches that cause downtime, data loss and financial problems for victims. This article looks ...
Cybersecurity Challenges and the Need for a Mindset Shift

Cybersecurity Challenges and the Need for a Mindset Shift

In a recent interview with cybersecurity expert, Corien Vermaak, Head of Cybersecurity from Cisco ANZ, was a discussion about the evolving landscape of cybersecurity and the challenges posed by breaches and the shortage of skilled practitioners shed light on the urgent need for a value mind shift in understanding the importance of personal data ...
Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense

Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense

In the ever-changing cybersecurity landscape, the integration of artificial intelligence (AI) has marked the advent of a new era defined by both innovation and vulnerability. It’s a ‘double-edged sword’ for cyber security experts: AI holds great promise for enhanced security (improving processes and ensuring fewer gaps in security controls), but it ...
No results found.

In The News

Rubrik and Deloitte Team Up to Deliver Cyber Resilience

Rubrik and Deloitte Team Up to Deliver Cyber Resilience

PALO ALTO, Calif., March 18, 2025— As the threat landscape continuously evolves, the call for robust data security solutions has never been more urgent. Today, Rubrik (NYSE: RBRK), a leading cyber security company, is proud to announce a strategic alliance with Deloitte. Together, the companies will collaborate to deliver advanced data security and ...
Hundreds of Malicious Google Play-Hosted Apps Bypassed Android 13 Security With Ease

Hundreds of Malicious Google Play-Hosted Apps Bypassed Android 13 Security With Ease

Bitdefender's security researchers have identified a large-scale ad fraud campaign that deployed hundreds of malicious apps in the Google Play Store, resulting in more than 60 million downloads total. The apps display out-of-context ads and even try to persuade victims to give away credentials and credit card information in phishing attacks. The ...
CrowdStrike Collaborates with NVIDIA to Advance Agentic AI in Cybersecurity, Pioneer Testing of NVIDIA Reasoning Models

CrowdStrike Collaborates with NVIDIA to Advance Agentic AI in Cybersecurity, Pioneer Testing of NVIDIA Reasoning Models

Powered by NVIDIA NIM microservices—with reasoning models in testing—CrowdStrike's Charlotte AI delivers 2x faster detection triage with 50% less compute, maximizing SOC efficiency
Nozomi Networks Named to Fast Company’s World’s Most Innovative Companies 2025 List

Nozomi Networks Named to Fast Company’s World’s Most Innovative Companies 2025 List

The OT and IoT cybersecurity company is recognised for its AI-powered solutions protecting global critical infrastructure from the growing risk of cyber threats
UiPath to Unveil Latest Agentic Automation Solutions at Agentic AI Summit

UiPath to Unveil Latest Agentic Automation Solutions at Agentic AI Summit

UiPath to hold Agentic AI Summit on March 25 to demonstrate its latest agentic automation innovations and how UiPath customers are achieving transformational outcomes with these solutions
Lenovo Report Finds AI Investment In ANZ Increased Fourfold In 2025

Lenovo Report Finds AI Investment In ANZ Increased Fourfold In 2025

Business leaders and IT decision-makers confirm the accelerating shift toward ROI-driven-AI investments as organisations increase AI spending by 3.3x in AP and 4x in Australia & New Zealand, according to the third edition of Lenovo’s CIO Playbook 2025 - It’s Time for AI-nomics. Commissioned by Lenovo, the research is based on a global IDC study of ...
Rapid7 Announces Global Capability Centre in India

Rapid7 Announces Global Capability Centre in India

Rapid7 has announced plans for expansion in India, including the opening of a new Global Capability Centre in Pune to serve as an innovation hub and Security Operations Centre. In addition, the company will host a series of in-region events to engage with government, education, and talent stakeholders on Rapid7’s commitment to enable customers to ...
Lieutenant General Michelle Mcguinness Keynote Speaker At AUSCERT Cyber Security Conference

Lieutenant General Michelle Mcguinness Keynote Speaker At AUSCERT Cyber Security Conference

Lieutenant General Michelle McGuinness, Australia's National Cyber Security Coordinator, will be a keynote speaker at the AUSCERT Cyber Security Conference taking place at The Star on the Gold Coast on 20-23 May 2025.  
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This