The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why Humans Are No Longer The Weakest Link In The Cyber Chain

Why Humans Are No Longer The Weakest Link In The Cyber Chain

We’ve all heard the mantra that ‘humans are the weakest link’ in any organisation’s cybersecurity defences, but with generative AI technology making exploits such as phishing email campaigns more convincing and scalable, it’s no longer fair — or effective — to blame individuals for succumbing to attacks. It’s Andrew’s view that while cyber training ...
Stream-Jacking 2.0: Deep fakes power account takeovers on YouTube to maximise crypto-doubling scams

Stream-Jacking 2.0: Deep fakes power account takeovers on YouTube to maximise crypto-doubling scams

Stream-Jacking & Deep fakes. If you ever observe content promoting giveaways or other events from well-known companies, always make sure to double-check the promotions on official websites.
Credential Stuffing – Industry Commentary from Tenable

Credential Stuffing – Industry Commentary from Tenable

Commentary on a new tactic scammers are employing called credential stuffing which is affecting the retail sector and can result in fraudulent transactions being made using payment information saved on popular retail sites.
Why Effective Digital ID Management is Vital in Financial Services

Why Effective Digital ID Management is Vital in Financial Services

Institutions that take digital ID seriously and put it at the forefront of application planning and deployment will be best placed to secure an increasing share of a rapidly growing market.
Improving Cybersecurity Within Australia’s Water Utilities

Improving Cybersecurity Within Australia’s Water Utilities

In a world of unceasing cyberattacks, security is no longer a luxury but a vital investment. By taking action now, utilities can ensure the uninterrupted flow of water to their customers at all times.
The Three Steps to Mitigate API Abuse in Cloud-hosted Applications

The Three Steps to Mitigate API Abuse in Cloud-hosted Applications

APIs have become a strategic necessity for business because they aid flexibility and agility, yet many organisations have remained cautious of their use due to worries about the data that APIs expose. The concerns are fanned by regular reports of IT security breaches that cause downtime, data loss and financial problems for victims. This article looks ...
Cybersecurity Challenges and the Need for a Mindset Shift

Cybersecurity Challenges and the Need for a Mindset Shift

In a recent interview with cybersecurity expert, Corien Vermaak, Head of Cybersecurity from Cisco ANZ, was a discussion about the evolving landscape of cybersecurity and the challenges posed by breaches and the shortage of skilled practitioners shed light on the urgent need for a value mind shift in understanding the importance of personal data ...
Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense

Navigating the Cyber Battlefield: AI-Driven Attacks and Strategies for Defense

In the ever-changing cybersecurity landscape, the integration of artificial intelligence (AI) has marked the advent of a new era defined by both innovation and vulnerability. It’s a ‘double-edged sword’ for cyber security experts: AI holds great promise for enhanced security (improving processes and ensuring fewer gaps in security controls), but it ...
No results found.

In The News

Cloudflare Accelerates AI Agent Development With The Industry’s First Remote MCP Server

Cloudflare Accelerates AI Agent Development With The Industry’s First Remote MCP Server

Sydney, Australia, April 8, 2025 – Cloudflare, Inc. (NYSE: NET), the leading connectivity cloud company, today announced several new offerings to accelerate the development of AI agents. Cloudflare now enables developers to easily build and deploy powerful AI agents with the industry’s first remote Model Context Protocol (MCP) server, generally ...
Pax8 Names Craig Foster as Chief Financial Officer

Pax8 Names Craig Foster as Chief Financial Officer

AUSTRALIA, SYDNEY (April 8, 2025) – Pax8, the leading cloud commerce marketplace, today announced the appointment of Craig Foster as its new Chief Financial Officer. In this role, Foster will set the financial course or Pax8 and oversee all aspects of the company’s financial strategy to ensure it continues driving sustainable growth and innovation. His ...
Check Point Recognised for #1 AI-Powered Cyber Security Platform by Miercom

Check Point Recognised for #1 AI-Powered Cyber Security Platform by Miercom

Independent testing by Miercom places Check Point Infinity Platform ahead of top security vendors in threat prevention, Zero Trust architecture, and AI-powered cyber defence
Symal Group Builds On Growth, DevOps and AI Capabilities With Macquarie Cloud Services

Symal Group Builds On Growth, DevOps and AI Capabilities With Macquarie Cloud Services

Macquarie Cloud Services today announced it is providing Microsoft Azure public cloud services to Symal Group to support the company’s digital foundation and rapid growth. Symal Group was founded in Melbourne with ‘a shovel, a wheelbarrow, and a ute’ in 2001, and has since evolved into a newly ASX-listed construction giant. The Group comprises five ...
SecurityBridge Expands Popular “Secure Together” SAP Security Event To The U.S.

SecurityBridge Expands Popular “Secure Together” SAP Security Event To The U.S.

The “Secure Together on the Road” event will occur on April 10, 2025, at the NASA Space Center in Houston, TX. SAP security professionals and IT leaders will gather to tackle the evolving cybersecurity challenges in SAP enterprise landscapes.
GitHub Announces Agent Mode and MCP Support Rolling Out To All VS Code Users

GitHub Announces Agent Mode and MCP Support Rolling Out To All VS Code Users

GitHub Copilot is getting a whole lot more agentic with increased context of tools and services, powered by the world’s leading models, starting today.
Self-Inflicted Cloud Wounds Still The Top Risk In Cloud Security, New Report Finds

Self-Inflicted Cloud Wounds Still The Top Risk In Cloud Security, New Report Finds

New research by Dark Reading commissioned by Qualys, The State of Cloud & SaaS Security Report, reveals top cloud and SaaS security threats facing enterprises today.
Check Point Software Emerges As A Leader In Attack Surface Management After Acquiring Cyberint, According To Latest GigaOm Radar Report

Check Point Software Emerges As A Leader In Attack Surface Management After Acquiring Cyberint, According To Latest GigaOm Radar Report

Cyberint, rebranded as Check Point External Risk Management, offers a comprehensive view of an organization's cyber threats across the open, deep, and dark web Sydney, 4 April 2025 – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, has emerged as a leading player in Attack Surface ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This