The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Data Transfer Secrets Revealed

Data Transfer Secrets Revealed

From the battlefields of war to the boardrooms of civilian enterprises, Antony Reynolds, Vice President of Federal and National Security at Bridgeworks, or "Tony" as I’ve come to know him, delivers revelations on the technology transforming data transfer from a sluggish chore to a lightning-fast marvel. Reynolds’ belief and metaphor he goes by is: ...
Make CNAPP Decisions To Stay Ahead Of Cloud Threats

Make CNAPP Decisions To Stay Ahead Of Cloud Threats

Cloud-Native Application Protection Platforms (CNAPPs) are a game changer in cloud security. CNAPPs are rapidly becoming the central nervous system of cloud defence, offering businesses a comprehensive solution to manage risk in today’s fast-changing digital environment.
The Unseen Powerhouse: 2020Partners

The Unseen Powerhouse: 2020Partners

As far as cybersecurity networks go, 2020Partners stands out—a private, non-commercial coalition of senior security professionals transcending conventional borders and limitations. Greg Sim is the Founding Partner of 2020Partners and the pioneer behind this exclusive network. "It’s not even a non-profit," Greg commented, referring to the networks ...
How Mobile Devices Became the Bad Guys’ Favourite Weapon

How Mobile Devices Became the Bad Guys’ Favourite Weapon

Everyone is glued to their mobile devices, sinister cyber threats lurk beneath those sleek screens, waiting to exploit our casual scrolling and innocent application installations. According to Jeff Lindholm, Chief Revenue Officer at Lookout Technologies, our beloved smartphones and tablets are digital best friends - but most are unware their risks that ...
Protecting Data from Ransomware: The Power of Advanced Encryption

Protecting Data from Ransomware: The Power of Advanced Encryption

Ransomware attacks have become a pressing threat to businesses worldwide, with their potential to encrypt sensitive data and hold organisations hostage. While many focus on preventing such attacks, the ability to mitigate their consequences is equally crucial. This article explores how advanced encryption techniques, including quantum-powered ...
Tackling Takedowns – How To Mitigate Risks of Fake Domains

Tackling Takedowns – How To Mitigate Risks of Fake Domains

As cyber threat actors continue to leverage more and more sophistication in phishing attacks and other cases of fraud targeting customers and consumers, organisations need to take proactive steps to stay ahead and be ready to respond when those threats are identified.
Oracle Cloud – The Late Bloomer

Oracle Cloud – The Late Bloomer

For years, the tech behemoth Oracle stood in the shadows of cloud giants like Amazon and Microsoft. But now, with their second-gen Oracle Cloud Infrastructure (OCI), Oracle is rewriting the cloud playbook. Oracle is far more than just the database company as most people would have memories of.Mahesh Thiagarajan, Executive Vice President of OCI, whose ...
The Invisible Siege on Our Supply Chain

The Invisible Siege on Our Supply Chain

Daniel Churches, Sales Director at ColorTokens, a captain in breach readiness and containment, lifts the veil on the precarious state of cybersecurity today. "When I say breach readiness, I speak from a place of inevitability," Churches states. The reality is that breaches aren’t just possible; they’re practically guaranteed. "A breach is likely ...

In The News

Builder.ai Secures and Automates Identities in the Cloud With CyberArk

Builder.ai Secures and Automates Identities in the Cloud With CyberArk

CyberArk (NASDAQ: CYBR), the global leader in identity security, today announced that Builder.ai has selected CyberArk to secure identities across its multi-cloud environment, protecting and automating workforce and developer user access to all apps with intelligent privilege controls. Builder.ai leads the industry with its AI-powered composable ...
Palo Alto Networks Introduces Cortex Cloud, the Future of Real-Time Cloud Security

Palo Alto Networks Introduces Cortex Cloud, the Future of Real-Time Cloud Security

Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, is doubling down on cloud security with the introduction of Cortex® Cloud, the next version of Prisma Cloud, that natively brings together new releases of its best-in-class cloud detection and response (CDR) and industry-leading cloud native application protection platform (CNAPP) ...
CyberArk Acquires Zilla Security to Reshape Identity Governance and Administration for the Modern Enterprise

CyberArk Acquires Zilla Security to Reshape Identity Governance and Administration for the Modern Enterprise

Industry-leading identity security combined with modern IGA sets a new paradigm for compliance and identity lifecycle management
Bitdefender Acquires BitShield Division to Expand Presence in Asia-Pacific

Bitdefender Acquires BitShield Division to Expand Presence in Asia-Pacific

Bitdefender has announced the acquisition of a key division of BitShield, responsible for distributing Bitdefender solutions in Malaysia and Brunei as a trusted Country Partner. The acquisition underscores Bitdefender’s continued investment in the Asia-Pacific (APAC) region, one of cybersecurity’s fastest-growing markets. This acquisition aligns ...
Victorian Government Extends Investment in Resilient Land Mobile Radio Communications with Motorola Solutions

Victorian Government Extends Investment in Resilient Land Mobile Radio Communications with Motorola Solutions

The Victorian government has signed a 10-year, AUD $500 million (USD ~$330 million) contract with Motorola Solutions to maintain and enhance the Metropolitan Mobile Radio network (MMR) relied upon by the state’s emergency services. The contract with the Department of Justice and Community Safety will extend MMR’s operation until 2035, providing ...
Confluent and Databricks Expand Partnership to Usher In New Age of Real-time AI

Confluent and Databricks Expand Partnership to Usher In New Age of Real-time AI

Data streaming company Confluent has unveiled a major expansion of its partnership with Databricks, bringing together Confluent’s complete Data Streaming Platform and Databricks’ Data Intelligence Platform to empower enterprises with real-time data for AI-driven decision-making. New integrations between Confluent's Tableflow and Databricks Unity ...
LLMjacking Targets DeepSeek: A Growing Security Threat

LLMjacking Targets DeepSeek: A Growing Security Threat

Since its initial discovery in May 2024 by the Sysdig Threat Research Team (TRT), LLMjacking has rapidly evolved, posing a significant risk to organizations relying on large language models (LLMs). The latest wave of attacks has set its sights on DeepSeek, a fast-growing AI model that cybercriminals exploited within days of its release. Understanding ...
JFrog Signs Agreement with AWS to Help Enterprises Unlock Business Value from Their Software Supply Chains

JFrog Signs Agreement with AWS to Help Enterprises Unlock Business Value from Their Software Supply Chains

The new strategic collaboration agreement (SCA) allows enterprise customers to cost-effectively scale their DevSecOps and AI-driven software solutions in the cloud

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This