The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Ransom Data Should Be Made Public

Ransom Data Should Be Made Public

The Government should consider making data on ransoms paid for cyber attacks public to educate industry about the scale of the problem.
Cybersecurity in the Age of AI

Cybersecurity in the Age of AI

Venky Raju, Field CTO, ColorTokens, writes on why AI-powered threats demand a shift in breach readiness strategies and how microsegmentation can help.
Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum

Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum

The sale and purchase of unauthorised access to compromised enterprise networks has become a linchpin for cybercriminal operations, particularly in facilitating ransomware attacks. Underground forums are sharing guidelines on breaching networks and selling the access they obtain, leaving the exploitation to other malicious actors. In this article, we ...
The Role Of Data Resilience In AI And Cybersecurity

The Role Of Data Resilience In AI And Cybersecurity

Good AI and Cybersecurity Relies On Resilient Data General awareness of the technology landscape is currently driven by ongoing coverage on two sectors: AI and cybersecurity. AI has captured the attention of industry leaders and media alike resulting in comprehensive research initiatives such as those of the Australian National University, and ...
Cyber-insecurity – The Contact Centre Challenge (and Solution)

Cyber-insecurity – The Contact Centre Challenge (and Solution)

Introduction Contact centres are prime targets for cyberattacks due to the vast amounts of sensitive customer information they handle. Ensuring the security of this data is more than a technical challenge, it’s a critical business imperative. Consequently, the intersection of cybersecurity, contact centres, and artificial intelligence (AI) is ...
Securing IoMT Devices: Key Steps to Implementing Microsegmentation in Healthcare

Securing IoMT Devices: Key Steps to Implementing Microsegmentation in Healthcare

Learn how to secure IoMT healthcare devices with zero trust microsegmentation. Discover key steps for visibility, segmentation, and continuous monitoring.
From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems

From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems

Malicious traffic distribution systems (TDSs) have flown under the radar of most cybersecurity organisations for years: they have been largely ignored and thought of as simply advertising networks or “adware”, a term associated with nuisances and not threats. Cybercriminals have used this to their advantage and have built massive networks of domains ...
Disrupting The Cost Trajectory: Five Ways To Maximise Your Digital Transformation ROI

Disrupting The Cost Trajectory: Five Ways To Maximise Your Digital Transformation ROI

Technology leaders are increasingly asked to achieve more with fewer resources. Coupled with skills shortages, limited budgets, and outdated digital assets, striking this balance has never been more critical. The question - how can technology leaders realign their resources into high-value projects that deliver more for less? Here's five ways to drive ...
No results found.

In The News

CrowdStrike Unveils the Falcon Platform Fall Release to Lead Cybersecurity into the Agentic Era

CrowdStrike Unveils the Falcon Platform Fall Release to Lead Cybersecurity into the Agentic Era

Revolutionizing the Falcon platform with the industry’s richest AI-ready data layer – the foundation for unifying human and agent-based security 
BeyondTrust Delivers Identity Security Controls for AI, Turning Agent Visibility into Action

BeyondTrust Delivers Identity Security Controls for AI, Turning Agent Visibility into Action

BeyondTrust delivers three powerful capabilities to Identity Security Insights® and BeyondTrust Pathfinder Platform customers today: AI Agent Insights, secure Model Context Protocol (MCP) orchestration, and an omnipresent AI decision-support layer; the first production-ready identity security controls for the new era of agentic AI
Cyber Security Predictions for 2026

Cyber Security Predictions for 2026

Among the key trends, Excite Cyber, CEO, Bryan Saba highlights new AI regulations, stronger governance over LLM development and predicts cyber risks will become encompassed in comprehensive enterprise-wide business risk registers and demand will surge for digital forensics training. Excite Cyber also anticipates that Australia will see rapid adoption ...
Exabeam and Cribl Partner to Power Scalable, High-Fidelity Threat Detection with Next-Gen Data Pipelines

Exabeam and Cribl Partner to Power Scalable, High-Fidelity Threat Detection with Next-Gen Data Pipelines

Partnership advances an outcome-driven data strategy, decoupling security outcomes from data volume
Swift AI Innovation Creates Blueprint for Banks to Stop Fraud Faster Through Cross-Border Collaboration

Swift AI Innovation Creates Blueprint for Banks to Stop Fraud Faster Through Cross-Border Collaboration

Swift and 13 international banks doubled real time fraud detection in trials involving ten million test transactions Privacy-enhancing technologies enabled institutions to share transaction data while maintaining end-to-end privacy and security Used at scale, this technology could enable a joined-up fraud defence across global finance, lead to faster ...
Canalys Study Finds Every $1 of Falcon Platform Sales Leads Up to $7 in Partner Services Revenue

Canalys Study Finds Every $1 of Falcon Platform Sales Leads Up to $7 in Partner Services Revenue

Independent research validates Falcon platform transformation as the leading engine of partner profitability, fueling growth and sustained returns
CrowdStrike and Meta Deliver New Benchmarks for the Evaluation of AI Performance in Cybersecurity

CrowdStrike and Meta Deliver New Benchmarks for the Evaluation of AI Performance in Cybersecurity

New benchmarks define how LLMs should be tested in the SOC – measuring real threats, workflows, and outcomes to help defenders
CrowdStrike Secures the Future of AI Across the Enterprise Ecosystem

CrowdStrike Secures the Future of AI Across the Enterprise Ecosystem

Only CrowdStrike delivers unified protection across the entire AI stack – from compute to cloud, data to models, and agents to applications – in partnership with the world’s AI leaders
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This