The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Social Responsibility of Data Security

The Social Responsibility of Data Security

Data breaches have become a common occurrence in our modern world. Unfortunately, many companies and individuals still don't take data security seriously. While most people recognize that a data breach could lead to financial loss, the potential consequences go far beyond dollars and cents. Data breaches can affect real people, including friends, ...
Soczilla Roadshow Launches in Australia and New Zealand

Soczilla Roadshow Launches in Australia and New Zealand

Recently, Palo Alto Networks launched their Cortex XSIAM platform across Australia and New Zealand. I attended to learn first hand about their capability at the place of the launch event, Palace Central in Sydney. The event kicked off with some drinks and entertainment followed by the session which was in a theatre lead by various members of the ...
BeyondTrust Releases Cybersecurity Predictions for 2024 and Beyond

BeyondTrust Releases Cybersecurity Predictions for 2024 and Beyond

BeyondTrust experts forecast future threat vectors most likely to affect organizsations worldwide in the New Year. Top cybersecurity threats include the evolution of the AI threat, Exploit mapping for ransomware, and the death of dedicated apps.
The Security Threat Posed by ‘Zombie’ APIs

The Security Threat Posed by ‘Zombie’ APIs

Zombies have been a mainstay of the horror movie genre for many years, both delighting and terrifying loyal fans. However, while they might be appreciated on the big screen, they’re much less welcome when it comes to the security of application programming interfaces (APIs). The challenge of ‘zombie APIs’ was highlighted in the recent State of API ...
AUKUS: Transforming Security Through Technology Sharing and Cybersecurity

AUKUS: Transforming Security Through Technology Sharing and Cybersecurity

The realm of international security is constantly evolving, and strategic alliances play a crucial role in shaping the defence landscape. A notable addition to this landscape is the AUKUS partnership, an innovative trilateral security alliance between Australia, the United Kingdom, and the United States.
Critical Infrastructure and IoT

Critical Infrastructure and IoT

The term ‘critical infrastructure’ was first used to refer to public works such as transportation infrastructure and public utilities. The term includes sectors such as health care, energy & utilities, telecommunications, and most recently, an argument for various manufacturers – particularly germane is the example of Personal Protective Equipment ...
Data Centres and Digital Assets

Data Centres and Digital Assets

INTRODUCTION While the Internet of Things is rapidly gaining traction around the world, it's critical to remember one factor that is critical to the technology's existence and how, without it, the entire system could implode. Naturally, we’re referring to data. By 2025, it is anticipated that there will be over 65 billion active IoT devices ...
Navigating Unique Cybersecurity Challenges in North Africa

Navigating Unique Cybersecurity Challenges in North Africa

The realm of cybersecurity is constantly evolving, with new challenges emerging in various regions across the globe. North Africa, with its diverse political, economic, and cultural landscape, presents a set of unique cybersecurity challenges. In this article, we will explore these challenges, offering an in-depth analysis backed by reliable ...
No results found.

In The News

Barracuda Networks Email Threat Radar April 2025

Barracuda Networks Email Threat Radar April 2025

Email Threat Radar – April 2025; Over the last month, Barracuda threat analysts identified several notable email-based threats targeting organizations around the world and designed to evade detection and boost the chances of success, including: Email attacks targeting victims with toxic calendar invites Phishing kits abusing a trusted ...
Rapid7’s Command Platform Launches Unified Threat-Informed Remediation

Rapid7’s Command Platform Launches Unified Threat-Informed Remediation

Rapid7 has launched major enhancements to its Command Platform, introducing unified threat-informed remediation to help security teams proactively identify, prioritise, and resolve critical exposures across their entire environment. Importantly, Rapid7 backs its solution with a Breach Protection Warranty, providing financial coverage and added ...
CrowdStrike Unveils Unified Data Protection to Secure Data Across Endpoints, Cloud, GenAI and SaaS

CrowdStrike Unveils Unified Data Protection to Secure Data Across Endpoints, Cloud, GenAI and SaaS

New Falcon Data Protection innovations stop encrypted file exfiltration, GenAI data leaks and SaaS misconfigurations, closing critical gaps attackers exploit to steal sensitive data
CIOSO Global’s Greg Sullivan Takes Main Stage At Kaseya Connect To Discuss “What Keeps CISOs Up At Night”

CIOSO Global’s Greg Sullivan Takes Main Stage At Kaseya Connect To Discuss “What Keeps CISOs Up At Night”

SAINT LOUIS, MO – April 29, 2025 – CIOSO Global, a leading provider of risk-based cybersecurity advisory services, today announced that Founding Partner Greg Sullivan has been invited to speak at Kaseya Connect Global, taking place April 28 – May 1, 2025, at the MGM Grand Resort in Las Vegas, Nevada. Hosted by Kaseya, the annual Kaseya Connect Global ...
SentinelOne Brings Deep Security Reasoning, Agentic Detection and Response, and Hyperautomation Workflows to Any SIEM or Data Source with Purple AI ‘Athena’ Release

SentinelOne Brings Deep Security Reasoning, Agentic Detection and Response, and Hyperautomation Workflows to Any SIEM or Data Source with Purple AI ‘Athena’ Release

Cybersecurity AI pioneer reveals next generation of Purple AI, sets course for delivering the industry’s first end-to-end agentic AI cybersecurity platform
Kaseya Announces Latest Innovations at Connect 2025

Kaseya Announces Latest Innovations at Connect 2025

New capabilities and commercial policies launched to help drive efficiency and streamline IT operations
New CyberArk Report Reveals Surge in Machine Identities as Cyber Priorities Lag Behind in Australian Organisations

New CyberArk Report Reveals Surge in Machine Identities as Cyber Priorities Lag Behind in Australian Organisations

Machine identities – most with unsecured access - are skyrocketing, increasing enterprise risk    Fragmented identity strategies leave critical assets exposed as cyber risks escalate Business-first mindset leaves compliance and security trailing behind
Lenovo Unveils Largest-ever Storage Refresh to Power the AI Era

Lenovo Unveils Largest-ever Storage Refresh to Power the AI Era

Lenovo today announced its largest storage portfolio refresh in company history, unveiling new Lenovo Data Storage Solutions that prepare enterprise IT for the age of AI with better efficiency, performance and scalability. The complete portfolio includes storage arrays, software defined storage (SDI), and new AI and virtualisation innovations to ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This