The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Taking a Zero Trust Approach to Managing IoT in Manufacturing

Taking a Zero Trust Approach to Managing IoT in Manufacturing

As the manufacturing industry increasingly embraces the Internet of Things (IoT), the imperative for robust cybersecurity has never been more urgent.
Vital Signs: Why Monitoring High Tech Systems and Data Is Critical for Australian Healthcare Providers

Vital Signs: Why Monitoring High Tech Systems and Data Is Critical for Australian Healthcare Providers

World Patient Safety Day is a timely reminder of the threat hackers and cyber-criminals pose to the country’s most vulnerable.
What You Missed at TechLeaders 2024

What You Missed at TechLeaders 2024

I recently headed down to TechLeaders, which was hosted at Kirkton Park in the Hunter Valley. TechLeaders Australia is dedicated to the Australian technology industry. It serves as a platform for professionals, businesses, and organisations to connect, collaborate, and stay informed about the latest trends and developments in the tech sector. This ...
How AI Is Helping to Strengthen Corporate Cybersecurity

How AI Is Helping to Strengthen Corporate Cybersecurity

As AI continues to permeate an increasing portion of daily business life, the need for robust cybersecurity measures has become vital.
Acting With Intent With AI

Acting With Intent With AI

The Need for Intention Jim Carrey said, “Not one single thing has ever been accomplished without intention”. When we intentionally set out to do something we plan to fulfil a motive, purpose, or objective as a result. There is a meaning behind the action; a sense of achieving some sort of progress after it’s done. Modern artificial intelligence ...
Opening up Cloud Architecture for Safer Security Infrastructure

Opening up Cloud Architecture for Safer Security Infrastructure

The evolution of the humble security camera into a cloud-connected multifunction safety device we see used today has come with a plethora of new capabilities and opportunities for security practitioners. Yet with internet-connected devices come risks. Let's explore why open-source architectures are, in fact, more secure while offering greater ...
Sports Venues Must Vet Their Vendors to Maintain Security

Sports Venues Must Vet Their Vendors to Maintain Security

High-profile sporting events over the last few months have presented a number of cybersecurity challenges. Sporting events generate a lot of consumer activity, from hotels and restaurants to retail. Large sporting events are held together by webs of connectivity that include vendors, sponsors, employees, and consumers. These networks connect ticketing, ...
New Tenable Research Reveals Only 3% of Vulnerabilities  Pose Significant Cybersecurity Risk

New Tenable Research Reveals Only 3% of Vulnerabilities Pose Significant Cybersecurity Risk

Company analysed 50 Trillion data points over two decades to identify critical vulnerabilities
No results found.

In the News

Ping Identity Launches ‘Identity for AI’ Solution to Power Innovation and Trust in the Agent Economy

Ping Identity Launches ‘Identity for AI’ Solution to Power Innovation and Trust in the Agent Economy

Helping enterprises close the AI trust gap through identity-first accountability.
VAST Data Secures Commercial Partnership Deal With CoreWeave for US$1.17 Billion to Power the Next Generation of AI

VAST Data Secures Commercial Partnership Deal With CoreWeave for US$1.17 Billion to Power the Next Generation of AI

VAST Data today announced it has signed a commercial agreement valued at US$1.17 billion with CoreWeave. The expanded partnership reinforces CoreWeave’s long-standing commitment to the VAST AI OS as its primary data foundation, solidifying VAST as a key component of CoreWeave’s AI cloud. Powered by the VAST AI OS, CoreWeave’s infrastructure delivers ...
Barracuda Launches AI-Powered Assistant to Simplify Security Operations

Barracuda Launches AI-Powered Assistant to Simplify Security Operations

New Barracuda Assistant Transforms Security Operations, delivers Smarter, Faster Security to Strengthen Cyber Resilience and Drive Productivity and ROI
Nozomi Networks Strengthens Its Commitment to Its Global Partner Ecosystem With Latest Executive Appointments

Nozomi Networks Strengthens Its Commitment to Its Global Partner Ecosystem With Latest Executive Appointments

• Matthew Cowell joins as Vice President of Strategic Alliances. • Tyson Gerhold Named Vice President of Global Partner and Channel Sales.
Seven Critical Vulnerabilities Open ChatGPT to Data Theft and Hijacking

Seven Critical Vulnerabilities Open ChatGPT to Data Theft and Hijacking

Tenable research reveals hidden AI flaws that allow data exfiltration, safety override, and persistent compromise within ChatGPT
Check Point Software Achieves the Highest Security Effectiveness at 99.59% in NSS Labs Enterprise Firewall Test

Check Point Software Achieves the Highest Security Effectiveness at 99.59% in NSS Labs Enterprise Firewall Test

As AI transforms cyber threats, NSS Labs recognition affirms Check Point’s leadership in prevention-first security, outperforming the competition
ASUG Tech Connect 2025 Taps SecurityBridge to Discuss SAP Cybersecurity Strategies

ASUG Tech Connect 2025 Taps SecurityBridge to Discuss SAP Cybersecurity Strategies

The SecurityBridge presentation aligns with the technical education focus by detailing the use of context- and risk-based multi-factor authentication (MFA) and step-up authentication via TrustBroker, along with security monitoring, vulnerability management, and incident response practices. In addition, the speakers will also discuss integrating ...
CrowdStrike Expands the Agentic Security Workforce, Trained on the Knowledge of Elite Analysts

CrowdStrike Expands the Agentic Security Workforce, Trained on the Knowledge of Elite Analysts

New mission-ready agents work in concert with custom-built and third-party agents to automate high-impact workflows across the full security lifecycle
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This