The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Exclusive: Zero Trust Security – The way Forward for IT and Security

Exclusive: Zero Trust Security – The way Forward for IT and Security

In sunny and warm Las Vegas (47 degrees or 116 fahrenheit) was an interview between myself and Kavitha Mariappan, Executive Vice President, Customer Experience and Transformation from Zscaler. Kavitha spoke to me exclusively at Zenith Live about her thoughts on today’s cyber market and predictions in regards to the future of cybersecurity. The crucial ...
How Australian Manufacturers Are Adapting To New Cyber Insurance Realities

How Australian Manufacturers Are Adapting To New Cyber Insurance Realities

As insurers impose stricter limitations, manufacturers must revise their risk management strategies and implement proactive measures to uphold operational security.
Deepfakes and the US Election | A Slippery Slope

Deepfakes and the US Election | A Slippery Slope

The proliferation of misinformation, deceptive content, and deepfake technology has raised significant concerns about the impact on society, elections, and trust in online information. Bob Huber, Chief Security Officer and Head of Research at Tenable, discussed the complexities of discerning authentic content from manipulated information. There is ...
JFrog Prevents Supply Chain Attack Through Binary Secret Scanning

JFrog Prevents Supply Chain Attack Through Binary Secret Scanning

The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Python’s, PyPI’s and Python Software Foundation’s GitHub repositories, which was leaked in a public Docker container hosted on Docker Hub. As a community service, the JFrog Security Research team continuously scans public ...
Dark Web Shows Cybercriminals Ready For Olympics. Are you?

Dark Web Shows Cybercriminals Ready For Olympics. Are you?

Major sporting events like the World Cup, Super Bowl, and Wimbledon attract millions, even billions, of viewers. Argentina’s shootout win over France in the final game of the Qatar 2022 World Cup reached a global audience of 1.5 billion viewers. And the Olympics, starting later this month in Paris, is the biggest of them all—with the 2020 Tokyo ...
How Privacy-By-Design Is Influencing Australia’s Physical Security Environments

How Privacy-By-Design Is Influencing Australia’s Physical Security Environments

When designing a comprehensive data protection and privacy strategy, it’s best practice to aim higher than the current legislative requirements. One way to do this is by adopting a privacy-by-design approach - centering on the principle that respect for individual privacy is the foundation of responsible and innovative design. By proactively embedding ...
Technology Company Names Have More Meaning than We Expected…

Technology Company Names Have More Meaning than We Expected…

Creating a strong brand identity is an integral aspect of any technology business, and a large part of any brand identity lies in its name. While many brands are simply named after their Founders, or geological locations others have more interesting origins. These names are often carefully chosen to reflect the company's mission, values, or ...
Exploring Opportunities, Fears, and the Future with AI

Exploring Opportunities, Fears, and the Future with AI

Claudionor Coelho, Chief AI Officer from Zscaler, and a member of the World Economic Forum AI Group at Zenith Live chatted with me about large language models (LLMs) and the potential ethical challenges surrounding their use.Recently it was announced about the launch of Copilot at Zscaler and how the technologies presented were utilised in the creation ...
No results found.

In The News

Tenable Analysis – Cisco Zero-day Vulnerabilities

Tenable Analysis – Cisco Zero-day Vulnerabilities

Cisco published advisories and a supplemental post about three zero-day vulnerabilities, two of which were exploited in the wild by an advanced threat actor associated with the ArcaneDoor campaign. The two flaws, CVE-2025-20333 and CVE-2025-20362, when combined or “chained” together, would give an attacker full control over the vulnerable ...
Camelot Secure and DigiFlight Named Finalists in Three Categories within Maryland’s Cybersecurity Association 2025 Cybersecurity Awards

Camelot Secure and DigiFlight Named Finalists in Three Categories within Maryland’s Cybersecurity Association 2025 Cybersecurity Awards

The recognition reflects Camelot Secure’s groundbreaking work advancing its Secure360 platform, which unifies cyber and physical security to meet the growing convergence challenge. Secure360 integrates AI, machine learning, and advanced threat intelligence to provide a proactive, holistic defense—helping enterprises and government clients protect ...
Darktrace Unveils Automated Forensics Capabilities in its ActiveAI Security Platform™ to Advance Hybrid and Multi-Cloud Security 

Darktrace Unveils Automated Forensics Capabilities in its ActiveAI Security Platform™ to Advance Hybrid and Multi-Cloud Security 

Launch of Darktrace / Forensic Acquisition & Investigation™, the industry’s first truly automated cloud forensics solution, can cut investigation times from days to minutes   The launch comes amid a widening cloud security gap, with nearly 90% of surveyed organisations across the US and UK reporting that they suffered damage before they could contain ...
Proofpoint Secures Collaboration and Data in the Agentic Workspace with Industry-First Innovations

Proofpoint Secures Collaboration and Data in the Agentic Workspace with Industry-First Innovations

New solutions, including AI tools and intelligent agents, enable organizations to embrace the promise of AI while mitigating unprecedented risks
Cisco Announces Splunk and Australian Signals Directorate Joining Forces to Strengthen Australia’s Cyber Threat Intelligence Sharing

Cisco Announces Splunk and Australian Signals Directorate Joining Forces to Strengthen Australia’s Cyber Threat Intelligence Sharing

SYDNEY – September 25, 2025 – Today Cisco, the worldwide leader in networking and security, announced that Splunk has partnered with the Australian Signals Directorate (ASD) to deliver a new plug-in that integrates Splunk Enterprise Security with ASD’s Cyber Threat Intelligence Sharing (CTIS) platform. This integration allows Splunk customers who are ...
ShadowLeak and the Internet of Agents: The Next Frontier in AI Exploits 

ShadowLeak and the Internet of Agents: The Next Frontier in AI Exploits 

The September 2025 disclosure of ShadowLeak by Radware marks a turning point in the way the security community must think about artificial intelligence. This was not just another prompt injection. It was the first service-side, zero-click indirect prompt injection (IPI) against a widely deployed AI system—OpenAI’s ChatGPT. More importantly, it ...
Lenovo Launches New IT Infrastructure Solutions to Help Australian SMBs Scale

Lenovo Launches New IT Infrastructure Solutions to Help Australian SMBs Scale

Lenovo announced new IT infrastructure solutions tailored to help small and medium businesses (SMBs) easily deploy, scale and leverage modern IT in the era of AI. The solutions are designed to accelerate growth and innovation from day one with pre-tested and validated bundles of servers, software and consumption-based pricing options that help growing ...
Secure Code Warrior Launches Industry-First AI Traceability to Enable Secure Developers and Supercharge Safe Productivity

Secure Code Warrior Launches Industry-First AI Traceability to Enable Secure Developers and Supercharge Safe Productivity

New capabilities in SCW Trust Agent provide visibility and control over LLM usage for security leaders and CISOs
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This