The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why CISOs Need a Voice in the Boardroom

Why CISOs Need a Voice in the Boardroom

Many organisations feel they are adequately prepared for cyber security these days, due to the simple fact of having a CISO (Chief Information Security Officer) in-situ. Having a senior level executive to oversee security and develop security policies feels like the job is done. However, this is just part (the start) of the journey to cyber maturity. ...
Remediation Over Ratings – Achieving Third-Party Cyber Risk Reduction

Remediation Over Ratings – Achieving Third-Party Cyber Risk Reduction

Modern businesses focussed on third-party cyber risk reduction require both a more comprehensive solution to third-party cyber risk; one that fully manages risk by rapidly identifying and resolving critical cyber security issues in the third-party ecosystem.
Three Force Multipliers to Boost Cybersecurity Protections for Governments

Three Force Multipliers to Boost Cybersecurity Protections for Governments

Government departments, agencies and councils are looking to invest in capabilities and tooling that can act as ‘force multipliers’ for improving their protective coverage against cybersecurity threats.
Combating AI-Driven Attacks With Predictive Breach Technology

Combating AI-Driven Attacks With Predictive Breach Technology

Zscaler's CSO and Head of Security Research, Deepen Desai, recently discussed the latest advancements in AI, cybersecurity, and zero trust strategies during his talk at Zenith Live. One of the key focal points of Desai's presentation was the intersection of AI and cybersecurity. The Researcher explained the landscape of AI-driven attacks and how ...
Small Businesses Can Pull Their SOCs Up

Small Businesses Can Pull Their SOCs Up

Security Operations Centres, or SOCs, are no longer the exclusive domain of large enterprises. Cost-prohibitive legacy on-premises security solutions have given way to the cloud solutions offering greater scalability for enterprises.
Unlocking Cybersecurity Talent – There Are No Mythical Unicorns, but You Can Create Strong Diverse Teams

Unlocking Cybersecurity Talent – There Are No Mythical Unicorns, but You Can Create Strong Diverse Teams

The mythical cybersecurity unicorn – someone that can manage the minutiae of data coming in from logs, understand business risks in detail, communicate them to your board and run your security education and awareness program – does not exist.  
Mobile Security Becomes Critical as Android Users Continue Using Handsets After Expiry

Mobile Security Becomes Critical as Android Users Continue Using Handsets After Expiry

As people put off upgrading their still-functional Android phones, an ever-growing proportion are becoming outdated, and threat actors are cashing in.
Why Software Developers Play a Critical Role in Achieving Effective Cybersecurity

Why Software Developers Play a Critical Role in Achieving Effective Cybersecurity

Raising the standard of code quality will take a significant change in how developers view and learn security best practices. With the challenge of protecting against an evolving threat landscape in perpetuity, the time to implement lasting change is now.
No results found.

In the News

Organisations That Delay Responding to Email Breaches Are 79% More Likely to Suffer a Ransomware Hit

Organisations That Delay Responding to Email Breaches Are 79% More Likely to Suffer a Ransomware Hit

· New research shows 76% of Australian respondents experienced an email security breach in the previous 12 months · The average cost of recovering from a single email security breach in Australia exceeds $280,000 USD (approx. $430,000 AUD). · Smaller companies are hit hardest with recovery costs of nearly $2,000 USD per employee
Nozomi Networks Innovates to Automate Cybersecurity Defences for Critical Infrastructure

Nozomi Networks Innovates to Automate Cybersecurity Defences for Critical Infrastructure

Nozomi Networks Inc., the leader in OT, IoT and CPS security today announced the industry’s first cybersecurity solution to safely automate threat responses in operational environments. With the latest release of Nozomi Arc, users gain robust, automated threat prevention capabilities for OT endpoints. First launched in 2023, Nozomi Arc is the ...
Trend Micro Launches End-to-End Protection for Agentic AI Systems With NVIDIA

Trend Micro Launches End-to-End Protection for Agentic AI Systems With NVIDIA

Extends Agentic AI Safety from infrastructure to application with agentless EDR and integrated guardrails to secure next-generation AI factories
Check Point Redefines AI Security for Enterprises With AI Cloud Protect Powered by NVIDIA BlueField

Check Point Redefines AI Security for Enterprises With AI Cloud Protect Powered by NVIDIA BlueField

Redwood City, CA – October 28, 2025 – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced it is working with NVIDIA to deliver an integrated security solution built for AI factories. AI Cloud Protect is now available for on-premises enterprise deployments to secure AI model ...
CrowdStrike and NVIDIA Redefine Cybersecurity With Always-On AI Agents Protecting the Nation’s Digital Infrastructure

CrowdStrike and NVIDIA Redefine Cybersecurity With Always-On AI Agents Protecting the Nation’s Digital Infrastructure

Always-on agents built with CrowdStrike Charlotte AI AgentWorks and integrated with NVIDIA Nemotron and NVIDIA NIM microservices will enable real-time threat detection and response across cloud, data center, and edge environments
Palo Alto Networks and Cyberlite Partner to Launch AI Safety in the Classroom Toolkit, a Landmark Resource to Equip Students With Critical Generative AI Skills

Palo Alto Networks and Cyberlite Partner to Launch AI Safety in the Classroom Toolkit, a Landmark Resource to Equip Students With Critical Generative AI Skills

New modular resource empowers non-experts, educators, parents, and instructors to teach students critical thinking for safe and ethical AI use
DigiCert Launches Inaugural RADAR Brief

DigiCert Launches Inaugural RADAR Brief

New Cyber Intelligence Reveals ‘Internet Tsunami’ Attacks and Rising Automation in Global Attacks
NetApp Celebrates 25 Years of Excellence and Innovation in Australia

NetApp Celebrates 25 Years of Excellence and Innovation in Australia

Introduces new innovations for AI, cyber resilience and cloud transformation
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This