The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why ‘Secure by Design’ Is Critical In Today’s Interconnected World

Why ‘Secure by Design’ Is Critical In Today’s Interconnected World

Organisations are currently unprepared to enact a high, consistent standard of software creation that follows secure-by-design principles. This needs to improve exponentially, and precision measurement of organisational security maturity—and individual developer security skills—will be paramount in facilitating the right growth and knowledge building.
Ransom Data Should Be Made Public

Ransom Data Should Be Made Public

The Government should consider making data on ransoms paid for cyber attacks public to educate industry about the scale of the problem.
Cybersecurity in the Age of AI

Cybersecurity in the Age of AI

Venky Raju, Field CTO, ColorTokens, writes on why AI-powered threats demand a shift in breach readiness strategies and how microsegmentation can help.
Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum

Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum

The sale and purchase of unauthorised access to compromised enterprise networks has become a linchpin for cybercriminal operations, particularly in facilitating ransomware attacks. Underground forums are sharing guidelines on breaching networks and selling the access they obtain, leaving the exploitation to other malicious actors. In this article, we ...
The Role Of Data Resilience In AI And Cybersecurity

The Role Of Data Resilience In AI And Cybersecurity

Good AI and Cybersecurity Relies On Resilient Data General awareness of the technology landscape is currently driven by ongoing coverage on two sectors: AI and cybersecurity. AI has captured the attention of industry leaders and media alike resulting in comprehensive research initiatives such as those of the Australian National University, and ...
Cyber-insecurity – The Contact Centre Challenge (and Solution)

Cyber-insecurity – The Contact Centre Challenge (and Solution)

Introduction Contact centres are prime targets for cyberattacks due to the vast amounts of sensitive customer information they handle. Ensuring the security of this data is more than a technical challenge, it’s a critical business imperative. Consequently, the intersection of cybersecurity, contact centres, and artificial intelligence (AI) is ...
Securing IoMT Devices: Key Steps to Implementing Microsegmentation in Healthcare

Securing IoMT Devices: Key Steps to Implementing Microsegmentation in Healthcare

Learn how to secure IoMT healthcare devices with zero trust microsegmentation. Discover key steps for visibility, segmentation, and continuous monitoring.
From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems

From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems

Malicious traffic distribution systems (TDSs) have flown under the radar of most cybersecurity organisations for years: they have been largely ignored and thought of as simply advertising networks or “adware”, a term associated with nuisances and not threats. Cybercriminals have used this to their advantage and have built massive networks of domains ...
No results found.

In The News

ShadowLeak and the Internet of Agents: The Next Frontier in AI Exploits 

ShadowLeak and the Internet of Agents: The Next Frontier in AI Exploits 

The September 2025 disclosure of ShadowLeak by Radware marks a turning point in the way the security community must think about artificial intelligence. This was not just another prompt injection. It was the first service-side, zero-click indirect prompt injection (IPI) against a widely deployed AI system—OpenAI’s ChatGPT. More importantly, it ...
Lenovo Launches New IT Infrastructure Solutions to Help Australian SMBs Scale

Lenovo Launches New IT Infrastructure Solutions to Help Australian SMBs Scale

Lenovo announced new IT infrastructure solutions tailored to help small and medium businesses (SMBs) easily deploy, scale and leverage modern IT in the era of AI. The solutions are designed to accelerate growth and innovation from day one with pre-tested and validated bundles of servers, software and consumption-based pricing options that help growing ...
Secure Code Warrior Launches Industry-First AI Traceability to Enable Secure Developers and Supercharge Safe Productivity

Secure Code Warrior Launches Industry-First AI Traceability to Enable Secure Developers and Supercharge Safe Productivity

New capabilities in SCW Trust Agent provide visibility and control over LLM usage for security leaders and CISOs
Motorola Solutions voted Best Workplace for Innovators by Fast Company

Motorola Solutions voted Best Workplace for Innovators by Fast Company

Motorola Solutions today announced it has been voted #1 by Fast Company for “Best Workplaces for Innovators.” Motorola Solutions was selected for its leadership in developing purpose-built AI that automates tasks and augments human attention, helping people detect, respond, verify and resolve safety and security threats. Fast Company honoured ...
Barracuda Announces CEO Transition: Rohit Ghai Appointed CEO as Hatem Naguib Steps Down

Barracuda Announces CEO Transition: Rohit Ghai Appointed CEO as Hatem Naguib Steps Down

SYDNEY, Australia – 24 September 2025 – Barracuda Networks, Inc., a leading cybersecurity company providing complete protection against complex threats for businesses of all sizes, today announced that Rohit Ghai, former Chief Executive Officer (CEO) of RSA, has been appointed CEO of Barracuda. Ghai succeeds Hatem Naguib, who has stepped down from his ...
Check Point Software Technologies Expands Australian Presence with Local Check Point Harmony SASE Data Residency and Check Point CloudGuard Web Application Firewall Instance

Check Point Software Technologies Expands Australian Presence with Local Check Point Harmony SASE Data Residency and Check Point CloudGuard Web Application Firewall Instance

New Point of Presence Enhances Web application and API protection with low latency and delivers Industry-Leading Threat Prevention and Cloud-Ready Security Architecture
Dynatrace Empowers GMHBA to Enhance Observability and Member Experience

Dynatrace Empowers GMHBA to Enhance Observability and Member Experience

SYDNEY, 24 September 2025 – Dynatrace, the leading AI-powered observability platform, today announced its successful collaboration with Australia's leading regionally based private health insurer GMHBA, to transform the performance and reliability of its technology infrastructure. The partnership has equipped GMHBA with advanced tools to predict and ...
Proofpoint Unveils First Agentic AI Solution for Human Communications Intelligence

Proofpoint Unveils First Agentic AI Solution for Human Communications Intelligence

Breakthrough innovation transforms enterprise communications into actionable intelligence, mitigating misconduct, regulatory risk, and insider threats in real time 
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This