The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

‘If We Had a Mother Like Mine…’ Says Global Chief Security Officer From NetApp
With over three decades of experience under her belt, Mignona Coté, Global Chief Security Officer at NetApp, discussed the so called ‘basics’ of cybersecurity to the intricacies of ransomware and AI integration.
Adapting to Threats
Coté reflected on the significant changes she has witnessed in the last 30 years. She reminded me of the growing ...
Cloudflare Helps Secure the World’s Most Popular Messaging Applications
Connectivity cloud co, Cloudflare (NYSE: NET) announced Plexi, a new service to verify the integrity of public keys in the end-to-end encryption of popular messaging applications. A longtime Cloudflare verification partner, WhatsApp will be the first to implement this new auditing process to strengthen users’ trust in the application’s encryption method.

How Australian Organisations Can Combat Rising Business Logic Abuse
By Reuben Koh, Director of Security Technology & Strategy, APJ at Akamai Technologies
As more economies around the world become digitalised, the adoption rate in Application Programming Interface (API) has also skyrocketed. According to Market Data Forecast, the size of the global API market is anticipated to grow 34.7% from 2024 to 2029. ...

Building a Resilient Healthcare Environment Through Proactive Cybersecurity Practices
Anna Perez, business development manager, Wavelink and Connected Health
Healthcare providers must continue to prioritise patient data security as digital transformation reshapes the industry. Ensuring the security of sensitive information is about more than simply ticking boxes for compliance; it’s about upholding patient trust and safeguarding ...

The Five Key Processes for Staying Secure With SAP
Upon efficiently securing your SAP environment, the next step is to learn how to maintain that security and continuously improve your SAP Security posture. This article highlights some specific recommendations for SAP Security processes.

The Increasing Role of LLMs and AI in Physical Security
The rapid rise of large language models (LLMs) has ushered in a new era of technological possibilities. These AI-driven systems, capable of generating human-quality text, code, and even creative content, have captured the imagination of industries worldwide. The physical security sector is no exception, exploring how LLMs can enhance operations from ...

Oracle Is More Than Just a Database Company That Everyone Remembers, Says Regional Managing Director
I headed over to my almost second home Las Vegas in the United States - where I was at the coalface at the Oracle CloudWorld Event hosted at the Venetian. I, like others, have traditionally known Oracle as the database company - despite OCI generating a foothold in the market. Stephen Bovis, Regional Managing Director of Oracle Australia, New Zealand, ...

Taking a Zero Trust Approach to Managing IoT in Manufacturing
As the manufacturing industry increasingly embraces the Internet of Things (IoT), the imperative for robust cybersecurity has never been more urgent.
No results found.
In the News
Cisco Simplifies Security for Managed Service Providers, Accelerating Their Hybrid Mesh Firewall Deployments and Business Growth
Cisco introduces foundational multi-customer management capabilities within Cisco Security Cloud Control, purpose-built for Managed Service Providers (MSPs). | The innovation streamlines operations, significantly reduces costs, and accelerates time-to-value for MSPs to deliver advanced managed security services. | MSPs can efficiently deploy and manage ...
Cisco Debuts New Unified Edge Platform for Distributed Agentic AI Workloads
Cisco Unified Edge extends data center power and scale to the edge, enabling real-time applications and AI inferencing where data is generated. |
Cisco is first-to-market with an edge optimized platform that’s more than a server - integrating compute, networking, and storage into a single system backed by an extensive partner ecosystem. | The new ...
Ping Identity Strengthens Defence Against AI-Driven Impersonation With Privacy-Preserving Biometrics
Signs agreement to acquire Keyless, expanding privacy-first authentication across the entire user journey.
Kaseya Connect APAC 2025 Awards Celebrate Regional MSP Excellence
The awards recognise outstanding innovation and service excellence from MSPs and IT professionals across the Asia Pacific region.
Camelot Secure CEO Stan Oliver Named One of the Daily Record’s 2025 Most Admired CEOs
Oliver’s recognition reflects a career defined by both innovation and inclusivity. Since founding Camelot Secure in 2022, he has spearheaded pioneering work in Advanced Persistent Threat (APT) Hunting, Attack Surface Management, Penetration Testing, and Threat Detection & Incident Response. Under his leadership, the company has also developed ...
Lakera Launches Open-Source Security Benchmark for LLM Backends in AI Agents
SAN FRANCISCO and ZURICH - October 27, 2025 – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, and Lakera, a world leading AI-native security platform for Agentic AI applications, with researchers from The UK AI Security Institute (AISI), have announced the release of the backbone breaker ...
Tech Professionals in Oceania Brace for a Year of AI Risks, Regulation and a Focus on Business Continuity
ISACA’s 2026 Tech Trends & Priorities Pulse Poll reveals the top threats and pressures keeping Oceania’s digital trust professionals awake at night
Cloudian HyperScale AI Data Platform Powered by NVIDIA Unlocks Sovereign AI
Cloudian is enabling governments, enterprises, and service providers worldwide to develop sovereign AI projects within their national borders, using its proven S3-compatible storage platforms. With Cloudian HyperStore for AI data management and the Cloudian HyperScale AI Data Platform – which integrates NVIDIA accelerated computing, networking and ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
