The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Softly, Softly: Why The Australian Cybersecurity Strategy Is A Missed Opportunity To Alter The Status Quo

Softly, Softly: Why The Australian Cybersecurity Strategy Is A Missed Opportunity To Alter The Status Quo

It’s fair to say that, for the past couple of years, we have seen regular changes to cybersecurity policy across most Western governments. The United States has been exceptionally proactive, spurred on by the fallout of large-scale cyber incidents like the Solar Winds supply chain attack, and the disruptive Colonial Pipeline cyberattack. And on our own ...
Separating Fact From Fiction: The Importance of Transparency in Cybersecurity

Separating Fact From Fiction: The Importance of Transparency in Cybersecurity

A closer look at our recent interview with Raj Samani, Senior Vice President, Chief Scientist from Rapid7.
The Unspoken Voice – CFOs Perspective On Security

The Unspoken Voice – CFOs Perspective On Security

The increasing and severe impact of cybersecurity risks on businesses. Short-term effects, like stock price declines after a cyberattack, are well-known, but the long-term consequences can be even more significant. Cyber incidents can lead to a loss of competitive advantage, reduced credit rating, and increased cyber insurance premiums. The financial ...
Cybersecurity Implications of Cryptocurrency and Blockchain Technology

Cybersecurity Implications of Cryptocurrency and Blockchain Technology

Introduction This essay explores the intricate relationship between cybersecurity and cryptocurrency, with a focus on the underlying blockchain technology. Cryptocurrencies, led by Bitcoin, have gained significant traction in recent years, revolutionising financial transactions. However, the decentralised and pseudonymous nature of cryptocurrencies, ...
Can Being “Compliant” Ever Top Being “Secure”?

Can Being “Compliant” Ever Top Being “Secure”?

My question is, who’s regularly assessing to make sure those locks aren’t being picked, that the alarms haven’t been disabled, and that the guards aren’t asleep?
A Look Inside a Cybercriminal Execution Chain

A Look Inside a Cybercriminal Execution Chain

During a cyber attack, the process of compromising a machine rarely involves a single step.
The Top Seven Tech and Cybersecurity Predictions To Watch Out For in 2024

The Top Seven Tech and Cybersecurity Predictions To Watch Out For in 2024

With the end of the year rapidly approaching, it’s time to make some educated predictions about what 2024 has in store when it comes to technology and cybersecurity.
Unlocking Opportunities: Australian Talent in the US Job Market

Unlocking Opportunities: Australian Talent in the US Job Market

A Conversation with Amy Meyer, Founder from Aussie Recruit on Overcoming Challenges and Thriving in the US
No results found.

In The News

Extreme Networks Leads Industry With First All-in-One Networking Platform Powered by Conversational, Multimodal, And Agentic AI

Extreme Networks Leads Industry With First All-in-One Networking Platform Powered by Conversational, Multimodal, And Agentic AI

Now in Limited Availability, Extreme Platform ONE helps reduce manual tasks by up to 90 percent, offering the deepest and widest network visualisation and industry’s simplest licensing PARIS, FRANCE, EXTREME CONNECT--May 20, 2025: Extreme Networks, Inc. (NASDAQ: EXTR) today launched new capabilities within Extreme Platform ONE™, now in Limited ...
GitHub Introduces Coding Agent For GitHub Copilot

GitHub Introduces Coding Agent For GitHub Copilot

At Microsoft Build 2025, GitHub introduced a new, enterprise-ready coding agent for Copilot – integrated, responsible and secured by GitHub’s control layer
Teradata Completes IRAP Assessment for VantageCloud at PROTECTED Level

Teradata Completes IRAP Assessment for VantageCloud at PROTECTED Level

Newest Assessment Applies to VantageCloud Lake on AWS, Azure and Google Cloud, and Permits Teradata Cloud Offerings for Government Projects
Oracle EU Sovereign Cloud Helps Organisations Across Germany Securely Manage Critical Business Data

Oracle EU Sovereign Cloud Helps Organisations Across Germany Securely Manage Critical Business Data

RDV, BGN, and Vertama among public and private organisations taking advantage of sovereign cloud capabilities to run their sensitive workloads entirely within the borders of the EU
JFrog Partners With NVIDIA to Accelerate Agentic AI, Integrating the JFrog Platform With NVIDIA Enterprise AI Factory

JFrog Partners With NVIDIA to Accelerate Agentic AI, Integrating the JFrog Platform With NVIDIA Enterprise AI Factory

New Full-Stack, Validated Design Aims to Accelerate AI/ML Model Engineering, Security, Operations and Delivery for the AI-powered Enterprise
CloudSEK Raises $19 Million in Series B1 Funding to Scale Predictive Cybersecurity Platform

CloudSEK Raises $19 Million in Series B1 Funding to Scale Predictive Cybersecurity Platform

Bangalore, India – May 20, 2025 — CloudSEK, a leader in AI-powered cyber threat prediction and intelligence, has raised $19 million across its Series A2 and B1 funding rounds. The round included participation from a mix of India- and US-based investors, such as MassMutual Ventures, Inflexor Ventures, Prana Ventures, Tenacity Ventures, and select ...
Google Cloud Expands Risk Protection Program to Australia Amid Rising Cyber Threats and Insurance Pressures

Google Cloud Expands Risk Protection Program to Australia Amid Rising Cyber Threats and Insurance Pressures

Google Cloud today announced the expansion of its Risk Protection Program (RPP) to the Australian market, providing local organisations with a streamlined path to cyber insurance that reflects their real-time security posture. The move comes as Australian companies face rising cyber risks, stricter regulatory standards, and mounting insurance ...
SecurityBridge Teams Up With Microsoft To Enhance SAP Security With Microsoft Sentinel

SecurityBridge Teams Up With Microsoft To Enhance SAP Security With Microsoft Sentinel

SAP systems are integral to many organizations, managing critical business processes and sensitive data. However, protecting these systems against cyber threats has traditionally been challenging due to their complexity and the specialized nature of SAP applications.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This