The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Prioritise Foundational Cloud Security Before Leveraging Generative AI

Prioritise Foundational Cloud Security Before Leveraging Generative AI

An article around how to prioritise foundational cloud security before leveraging Generative AI.
How Data Quality Is Limiting Your Organisation’s AI Success

How Data Quality Is Limiting Your Organisation’s AI Success

Too often, having strong data processes can be seen as a ‘nice to have’. In our day-to-day work, it can feel like the job is done when the file is neatly labelled and saved in the right project folder. And yet, getting Information Management (IM) right is so much more than that. We’re now living in a world where holding onto too much data could get you ...
Cybersecurity Budgets and Readiness – Are we there yet?

Cybersecurity Budgets and Readiness – Are we there yet?

In a recent media briefing, hosted by ANZ Cybersecurity Director, Corien Vermaak at Cisco, the complex nature of cybersecurity preparedness and the challenges facing organisations as they allocate resources to fortify their defences was presented. The prevailing sentiment is that merely increasing budgetary allocations may not be the panacea or silver ...
The Role Of Regulatory Bodies In Safeguarding People From Artificial Intelligence

The Role Of Regulatory Bodies In Safeguarding People From Artificial Intelligence

Australian industry leaders are navigating a complex regulatory environment that is increasingly focused on the integration of Artificial Intelligence (AI) within business operations. This focus is driven by a concern for consumer protection, particularly the safety and security of personally identifiable information (PII) and the potential for ...
Business Risk Observability Is Vital For IT Teams To Come Together And Mitigate Security Risks Within Modern Applications

Business Risk Observability Is Vital For IT Teams To Come Together And Mitigate Security Risks Within Modern Applications

For all of the recent talk about the need for more integrated approaches within IT departments, the reality is that many security teams (SecOps) continue to operate separately from development and operations teams. Security has traditionally been seen as a reactive function within the IT department, there to resolve security breaches and patch up ...
Understanding the Growing Threat Posed by Deep Fakes

Understanding the Growing Threat Posed by Deep Fakes

With deep fakes becoming an increasing cybersecurity issue, there are seven key strategies that organisations can follow to reduce their chances of falling victim to an attack.
The Real “People Problem” In Cybersecurity Is Not What You Think It Is

The Real “People Problem” In Cybersecurity Is Not What You Think It Is

Growing the size of the security team, and increasing user awareness of the signs of attack, may not be enough to completely eliminate the people problem.
CISOs in 2024: Embracing a Strategic Security Vision

CISOs in 2024: Embracing a Strategic Security Vision

Key emerging trends highlight the need for CISOs to be proactive, adaptable, and strategic. Just as their role has evolved significantly in recent years, so it will continue to do so in the future.
No results found.

In The News

Oracle to Offer Google’s Gemini Models to Customers, Accelerating Enterprises’ Agentic AI Journeys

Oracle to Offer Google’s Gemini Models to Customers, Accelerating Enterprises’ Agentic AI Journeys

Customers will have access to highly performant, flexible Gemini multimodal models via OCI Generative AI service. Oracle will collaborate with Google Cloud on various Gemini model integrations across business applications
CrowdStrike Unveils Falcon Next-Gen Identity Security, the First Unified Solution to Protect Every Identity Across the Attack Chain

CrowdStrike Unveils Falcon Next-Gen Identity Security, the First Unified Solution to Protect Every Identity Across the Attack Chain

Only CrowdStrike unifies initial access, privileged access, ITDR, and SaaS security for every human, non-human, and AI agent identity into a single platform – delivered today, without delays or integration complexity
VAST Data Collaborates with SK Telecom to Optimise Korea’s Largest AI Infrastructure Based on NVIDIA Supercomputers

VAST Data Collaborates with SK Telecom to Optimise Korea’s Largest AI Infrastructure Based on NVIDIA Supercomputers

VAST Data today announced a partnership with SK Telecom (SKT), South Korea’s leading telecommunications provider that’s transforming itself into an AI company. To deploy its advanced AI platform on SKT’s new sovereign AI infrastructure powered by the latest NVIDIA Blackwell GPUs. Named the Haein Cluster, this AI infrastructure, designed initially ...
From Weakest Link to Cyber Shield: ESET Launches Awareness Training in Australia

From Weakest Link to Cyber Shield: ESET Launches Awareness Training in Australia

ESET launches ESET Cybersecurity Awareness Training in Australia, helping local businesses to avoid breaches resulting from human error. ESET Cybersecurity Awareness Training helps meet ISM-0252, NIS2, HIPAA, PCI, SOX, GDPR, and CCPA compliance requirements, as well as insurance requirements. This online educational and testing source puts 30 years ...
Qualys Honored with Dual Win at Prestigious Pwnie Awards for Groundbreaking Cybersecurity Research

Qualys Honored with Dual Win at Prestigious Pwnie Awards for Groundbreaking Cybersecurity Research

Wins for Epic Achievement and Best RCE spotlight Qualys’ industry-leading research into critical OpenSSH vulnerabilities, reinforcing its leadership in global cybersecurity innovation
Tenable Jailbreaks OpenAI’s GPT-5 Within 24 Hours, Bypassing New Safety Features

Tenable Jailbreaks OpenAI’s GPT-5 Within 24 Hours, Bypassing New Safety Features

Just 24 hours after OpenAI launched its highly anticipated GPT−5 model with promises of “significantly more sophisticated” prompt safety, exposure management company Tenable has successfully jailbroken the platform, compelling it to provide detailed instructions on how to build a Molotov cocktail. On August 7, 2025, OpenAI unveiled GPT−5, touting its ...
Fortinet Enhances FortiRecon to Align With Continuous Threat Exposure Management Framework to Help Organisations Stay Ahead of Threats

Fortinet Enhances FortiRecon to Align With Continuous Threat Exposure Management Framework to Help Organisations Stay Ahead of Threats

New features integrate attack surface management, threat intelligence, and security orchestration to help security teams reduce risk faster and more proactively
Genetec Continues To Dominate Video Surveillance Software Market, According To Latest Analyst Reports

Genetec Continues To Dominate Video Surveillance Software Market, According To Latest Analyst Reports

Growing SaaS adoption and customer demand for flexible, open solutions strengthen company’s continued market leadership.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This