The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Sustainability in Business is More than a Reusable Coffee Cup

Sustainability in Business is More than a Reusable Coffee Cup

When people hear sustainability, some might straight away think - oh yes a reusable coffee cup. Perhaps, however in this context we’re talking about sustainability within tech businesses and what does this mean and more importantly - what does that look like?Luke Hargreaves, Founder and CEO from Aquainnis chatted to me about the urgent need for ...
How To Quickly Kick Start Holistic SAP Security

How To Quickly Kick Start Holistic SAP Security

SAP security teams can kick-start a comprehensive security program, gaining significant improvements within a day, with a holistic platform and a guided approach to SAP Security.
Exclusive: Zero Trust Security – The way Forward for IT and Security

Exclusive: Zero Trust Security – The way Forward for IT and Security

In sunny and warm Las Vegas (47 degrees or 116 fahrenheit) was an interview between myself and Kavitha Mariappan, Executive Vice President, Customer Experience and Transformation from Zscaler. Kavitha spoke to me exclusively at Zenith Live about her thoughts on today’s cyber market and predictions in regards to the future of cybersecurity. The crucial ...
How Australian Manufacturers Are Adapting To New Cyber Insurance Realities

How Australian Manufacturers Are Adapting To New Cyber Insurance Realities

As insurers impose stricter limitations, manufacturers must revise their risk management strategies and implement proactive measures to uphold operational security.
Deepfakes and the US Election | A Slippery Slope

Deepfakes and the US Election | A Slippery Slope

The proliferation of misinformation, deceptive content, and deepfake technology has raised significant concerns about the impact on society, elections, and trust in online information. Bob Huber, Chief Security Officer and Head of Research at Tenable, discussed the complexities of discerning authentic content from manipulated information. There is ...
JFrog Prevents Supply Chain Attack Through Binary Secret Scanning

JFrog Prevents Supply Chain Attack Through Binary Secret Scanning

The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Python’s, PyPI’s and Python Software Foundation’s GitHub repositories, which was leaked in a public Docker container hosted on Docker Hub. As a community service, the JFrog Security Research team continuously scans public ...
Dark Web Shows Cybercriminals Ready For Olympics. Are you?

Dark Web Shows Cybercriminals Ready For Olympics. Are you?

Major sporting events like the World Cup, Super Bowl, and Wimbledon attract millions, even billions, of viewers. Argentina’s shootout win over France in the final game of the Qatar 2022 World Cup reached a global audience of 1.5 billion viewers. And the Olympics, starting later this month in Paris, is the biggest of them all—with the 2020 Tokyo ...
How Privacy-By-Design Is Influencing Australia’s Physical Security Environments

How Privacy-By-Design Is Influencing Australia’s Physical Security Environments

When designing a comprehensive data protection and privacy strategy, it’s best practice to aim higher than the current legislative requirements. One way to do this is by adopting a privacy-by-design approach - centering on the principle that respect for individual privacy is the foundation of responsible and innovative design. By proactively embedding ...
No results found.

In The News

Claroty Named to Forbes Cloud 100 for Fourth Consecutive Year

Claroty Named to Forbes Cloud 100 for Fourth Consecutive Year

Claroty, the world’s leading cybersecurity company for cyber-physical systems (CPS) protection, has been listed on the Forbes 2025 Cloud 100 for the fourth consecutive year.
Backing Local, Securing National: Minister Opens New Cube Cyber Cybersecurity Operations Centre in Queensland

Backing Local, Securing National: Minister Opens New Cube Cyber Cybersecurity Operations Centre in Queensland

Brisbane, 5 September 2025 - In a significant step forward for sovereign cyber defence, The Hon. Steven Minnikin MP, Minister for Customer Services and Open Data and Minister for Small and Family Business, has officially opened Queensland headquartered Cube Cyber’s new Security Operations Centre (SOC) in Brisbane. The Cube Cyber centre represents a ...
Boomi Enterprise Platform Delivered 347% ROI and $9.8M NPV, According To New Independent TEI Study

Boomi Enterprise Platform Delivered 347% ROI and $9.8M NPV, According To New Independent TEI Study

SYDNEY, AUSTRALIA – Sept. 5, 2025 – Boomi™, the leader in AI-driven automation, today announced the results of a new Total Economic Impact™ (TEI) study conducted by Forrester Consulting. The study found that organisations using the Boomi Enterprise Platform achieved a 347 per cent return on investment (ROI) and a net present value (NPV) of $9.8 million ...
Claroty Named a Leader In IoT Security By Leading Independent Research Firm

Claroty Named a Leader In IoT Security By Leading Independent Research Firm

New analyst report gives Claroty highest score possible across 10 current offering and strategy criteria
Check Point Software Technologies Appoints Brett Theiss as Chief Marketing Officer to Drive Global Brand and Growth Strategy

Check Point Software Technologies Appoints Brett Theiss as Chief Marketing Officer to Drive Global Brand and Growth Strategy

Redwood City, CA – September 2, 2025 – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced the appointment of Brett Theiss as Chief Marketing Officer (CMO). As CMO, Theiss will shape and accelerate Check Point’s global growth agenda, strengthening brand presence, fuelling ...
Threat Spotlight: Tycoon Phishing Kit Reveals New Techniques to Hide Malicious Links

Threat Spotlight: Tycoon Phishing Kit Reveals New Techniques to Hide Malicious Links

SYDNEY, Australia – 4 September 2025 – Barracuda threat analysts have published a report on the latest techniques being used by the Tycoon phishing-as-a-service (PhaaS) kit to hide malicious links in emails. The techniques are designed to obscure, muddle and disrupt the structure of links, or URLs, with the aim of confusing automated detection systems ...
Veeam Launches Its First Fully Preconfigured, Software-only Appliance

Veeam Launches Its First Fully Preconfigured, Software-only Appliance

Veeam® Software, the #1 global leader by market share in Data Resilience, today announced the availability of its first fully pre-built, pre-hardened software appliance: the new Veeam Software Appliance. Built to give IT teams instant protection without complexity, the appliance eliminates the friction of manual setup, OS patching, and Windows ...
Sophos Endpoint Now Integrated with Taegis MDR and XDR

Sophos Endpoint Now Integrated with Taegis MDR and XDR

Sophos has announced that its endpoint Solution is now natively integrated and automatically included in all Taegis™ Extended Detection and Response (XDR) and Taegis Managed Detection and Response (MDR) subscriptions. This milestone gives customers immediate access to combined prevention, detection, and response capabilities in a single platform – ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This