The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Cybersecurity in the Age of AI

Cybersecurity in the Age of AI

Venky Raju, Field CTO, ColorTokens, writes on why AI-powered threats demand a shift in breach readiness strategies and how microsegmentation can help.
Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum

Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum

The sale and purchase of unauthorised access to compromised enterprise networks has become a linchpin for cybercriminal operations, particularly in facilitating ransomware attacks. Underground forums are sharing guidelines on breaching networks and selling the access they obtain, leaving the exploitation to other malicious actors. In this article, we ...
The Role of Data Resilience in AI and Cybersecurity

The Role of Data Resilience in AI and Cybersecurity

Good AI and Cybersecurity Relies on Resilient Data General awareness of the technology landscape is currently driven by ongoing coverage on two sectors: AI and cybersecurity. AI has captured the attention of industry leaders and media alike resulting in comprehensive research initiatives such as those of the Australian National University, and ...
Cyber-insecurity – the Contact Centre Challenge (and Solution)

Cyber-insecurity – the Contact Centre Challenge (and Solution)

Introduction Contact centres are prime targets for cyberattacks due to the vast amounts of sensitive customer information they handle. Ensuring the security of this data is more than a technical challenge, it’s a critical business imperative. Consequently, the intersection of cybersecurity, contact centres, and artificial intelligence (AI) is ...
Securing IoMT Devices: Key Steps to Implementing Microsegmentation in Healthcare

Securing IoMT Devices: Key Steps to Implementing Microsegmentation in Healthcare

Learn how to secure IoMT healthcare devices with zero trust microsegmentation. Discover key steps for visibility, segmentation, and continuous monitoring.
From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems

From Click to Chaos: Bouncing Around in Malicious Traffic Distribution Systems

Malicious traffic distribution systems (TDSs) have flown under the radar of most cybersecurity organisations for years: they have been largely ignored and thought of as simply advertising networks or “adware”, a term associated with nuisances and not threats. Cybercriminals have used this to their advantage and have built massive networks of domains ...
Disrupting the Cost Trajectory: Five Ways to Maximise Your Digital Transformation ROI

Disrupting the Cost Trajectory: Five Ways to Maximise Your Digital Transformation ROI

Technology leaders are increasingly asked to achieve more with fewer resources. Coupled with skills shortages, limited budgets, and outdated digital assets, striking this balance has never been more critical. The question - how can technology leaders realign their resources into high-value projects that deliver more for less? Here's five ways to drive ...
How to Strike Back Against Phishing and Takedown Fraudulent Websites in the Battle Against Escalating Cyber Crime

How to Strike Back Against Phishing and Takedown Fraudulent Websites in the Battle Against Escalating Cyber Crime

Phishing takedown services are a critical element of our fight against threat actors. The ungoverned and distributed nature of the Internet makes this challenging but organisations, such as AUSCERT, are critical and take down thousands of phishing and scam sites every year.
No results found.

In the News

Darktrace Brings Industry First Endpoint Visibility and Enhanced Agentic AI to ActiveAI Security Platform™, Closing the Gaps in Cyber Defences

Darktrace Brings Industry First Endpoint Visibility and Enhanced Agentic AI to ActiveAI Security Platform™, Closing the Gaps in Cyber Defences

These innovations provide a new level of understanding across an organisation’s digital footprint, enabling security teams to close the seams attackers exploit as they cross IT domain boundaries, stop emerging threats and act with the speed, context, and confidence needed to stay ahead of attackers.
New Report: Indo-Pacific Faces Growing AI Risks in Critical Infrastructure

New Report: Indo-Pacific Faces Growing AI Risks in Critical Infrastructure

Study Calls for cross-sector collaboration to safely scale AI without slowing innovation
Oracle Database@Google Cloud Is Now Available in Australia

Oracle Database@Google Cloud Is Now Available in Australia

Powerful multicloud database service will help customers in Australia improve analytics and AI productivity, support data hosting residency regulations, and accelerate IT modernisation | Oracle Exadata Database Service on Dedicated Infrastructure will be the first Oracle Database@Google Cloud service supported | Industry-first reseller program enables ...
Bitdefender and CYPFER Partner to Deliver End-to-End Cyber Resilience for Businesses Throughout the Entire Attack Lifecycle

Bitdefender and CYPFER Partner to Deliver End-to-End Cyber Resilience for Businesses Throughout the Entire Attack Lifecycle

Partnership Combines Bitdefender Solutions and Advanced Incident Response Expertise to Deliver Comprehensive Protection, Rapid Response, and Recovery for Organisations of Any Size
Updog.ai Unleashed: Public, Real-time Provider Status From Datadog

Updog.ai Unleashed: Public, Real-time Provider Status From Datadog

When external SaaS providers or cloud services degrade or go down, engineers often find themselves wondering if the issue they're encountering is local or more widespread. The answers they find are usually slow to surface, limited in detail, or entirely dependent on the provider's updates. Vendor-controlled status pages and third-party aggregators ...
DroneShield Expands Airspace Security With ADS-B Integration Into Its DroneSentry-C2 Software

DroneShield Expands Airspace Security With ADS-B Integration Into Its DroneSentry-C2 Software

Dual-band ADS-B reception enhances airspace safety awareness, supporting mixed-domain operations
New Rubrik Agent Cloud Simplifies Enterprise AI Deployment at Scale

New Rubrik Agent Cloud Simplifies Enterprise AI Deployment at Scale

• Industry's first solution to enable organisations to adopt agents at scale with the ability to monitor, govern and remediate • Discovers agents built on platforms such as OpenAI, Microsoft Copilot Studio, and Amazon Bedrock to provide a single pane of glass for AI operations • Where most tools stop at observability, only Rubrik empowers organisations ...
Mobile Danger Zone: AI-Powered Attacks and Human Error Create “Perfect Storm” for Organisations

Mobile Danger Zone: AI-Powered Attacks and Human Error Create “Perfect Storm” for Organisations

Verizon’s 2025 Mobile Security Index (MSI) reveals how AI-powered threats and human error are converging to reshape mobile risk across every sector — from government and enterprise to manufacturing and SMBs.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This