The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Exclusive: Zero Trust Security – the Way Forward for IT and Security
In sunny and warm Las Vegas (47 degrees or 116 fahrenheit) was an interview between myself and Kavitha Mariappan, Executive Vice President, Customer Experience and Transformation from Zscaler. Kavitha spoke to me exclusively at Zenith Live about her thoughts on today’s cyber market and predictions in regards to the future of cybersecurity. The crucial ...

How Australian Manufacturers Are Adapting to New Cyber Insurance Realities
As insurers impose stricter limitations, manufacturers must revise their risk management strategies and implement proactive measures to uphold operational security.

Deepfakes and the US Election | a Slippery Slope
The proliferation of misinformation, deceptive content, and deepfake technology has raised significant concerns about the impact on society, elections, and trust in online information. Bob Huber, Chief Security Officer and Head of Research at Tenable, discussed the complexities of discerning authentic content from manipulated information. There is ...

JFrog Prevents Supply Chain Attack Through Binary Secret Scanning
The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Python’s, PyPI’s and Python Software Foundation’s GitHub repositories, which was leaked in a public Docker container hosted on Docker Hub.
As a community service, the JFrog Security Research team continuously scans public ...
Dark Web Shows Cybercriminals Ready for Olympics. Are You?
Major sporting events like the World Cup, Super Bowl, and Wimbledon attract millions, even billions, of viewers. Argentina’s shootout win over France in the final game of the Qatar 2022 World Cup reached a global audience of 1.5 billion viewers. And the Olympics, starting later this month in Paris, is the biggest of them all—with the 2020 Tokyo ...

How Privacy-By-Design Is Influencing Australia’s Physical Security Environments
When designing a comprehensive data protection and privacy strategy, it’s best practice to aim higher than the current legislative requirements. One way to do this is by adopting a privacy-by-design approach - centering on the principle that respect for individual privacy is the foundation of responsible and innovative design. By proactively embedding ...

Technology Company Names Have More Meaning Than We Expected…
Creating a strong brand identity is an integral aspect of any technology business, and a large part of any brand identity lies in its name. While many brands are simply named after their Founders, or geological locations others have more interesting origins. These names are often carefully chosen to reflect the company's mission, values, or ...

Exploring Opportunities, Fears, and the Future With AI
Claudionor Coelho, Chief AI Officer from Zscaler, and a member of the World Economic Forum AI Group at Zenith Live chatted with me about large language models (LLMs) and the potential ethical challenges surrounding their use.Recently it was announced about the launch of Copilot at Zscaler and how the technologies presented were utilised in the creation ...
No results found.
In the News
Dynatrace and Microsoft Partner to Scale Enterprise Customer AI Initiatives
New integration enables customers to automate majority of cloud operations tasks
Modern 42 Appointed BeyondTrust’s First Advanced Implementation Partner in Australia
Canberra, 17 November 2025 – Modern 42, a specialist provider of Identity and Access Management, Privileged Access Management, CIAM and Securing Entra ID, today announced that it has been appointed the first BeyondTrust Advanced Implementation Partner in Australia.
Appointed initially as a BeyondTrust partner in 2023, the new advanced implementation ...
Dynatrace Announces New Cloud Operations Solution for Microsoft Azure
Provides customers with comprehensive visibility into their Azure environments, enabling automatic remediation, prevention, and optimisation
Barracuda Identifies Three Concerning Trends in Email-Based Cyber Attacks
Over the last month, Barracuda threat analysts have seen the following notable developments in email-based threats targeting organisations:
New tools and tactics for the Tycoon 2FA phishing kit
Invisible characters that help Cephas kit evade scanners and rules
A sophisticated attack involving steganography (image-concealed ...
Kyndryl Launches New Agentic AI Services to Support Agentic-driven Workforce Strategy Development and Customer Experience
New Kyndryl Consult organisational change management services harness Kyndryl Agentic AI Framework to help enterprises ready their workforces and redefine how work is done
NetApp Fortifies Channel Leadership in APAC, Driven by Robust Partner Program
NetApp® (NASDAQ: NTAP), the Intelligent Data Infrastructure company, today announced the impact of Partner Sphere, its hallmark partner program that is designed to accelerate partners’ strategic growth and hone their competitive edge and differentiating factor. To ramp up partners’ proficiencies in addressing enterprises’ complex digital transformation ...
Armis Expands Technology Partner Ecosystem to Help Global Organisations Fortify Cyber Defences
Strategic integrations unify cyber capabilities, enhancing joint customers’ existing technology stacks
Rapid7 Q3 Threat Report Reveals Ransomware Alliances, AI Weaponisation, and the Obsolescence of “Time to Patch”
Rapid7’s latest Q3 2025 Threat Landscape Report reveals how cybercriminals are accelerating exploitation timelines, consolidating ransomware alliances, and weaponising AI to outpace defenders.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
- 353
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
