The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How To Manage Risk Appetite By Balancing Cybersecurity With Business Growth

How To Manage Risk Appetite By Balancing Cybersecurity With Business Growth

Australia’s business leaders face a complex and rapidly evolving market landscape that is highly competitive, globally interconnected, and demands a proactive approach to risk management. As continued technological innovation drives business development, efficiency, and success, it simultaneously empowers malicious threat actors to evolve and make more ...
Enhancing And Democratising DevSecOps With Generative AI And ClickOps

Enhancing And Democratising DevSecOps With Generative AI And ClickOps

While still nascent, generative AI and no-code ClickOps solutions show immense promise for augmenting and spreading DevSecOps capabilities more widely in 2024, enabling enhanced delivery, and scalability across critical systems.
Protecting Your Heart and Wallet Against Phishing This Valentine’s Day

Protecting Your Heart and Wallet Against Phishing This Valentine’s Day

Phishing attacks, the most common form of social engineering, manipulate users into divulging sensitive information or clicking malicious links. With the rise of AI tools like ChatGPT, these scams have become more sophisticated, leveraging fake domains and chatbots to mimic legitimate entities or even potential romantic partners.
China’s Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage

China’s Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage

Why the PRC Fails to Back Its Claims of Western Espionage: China launched an offensive media strategy to push narratives around US hacking operations following a joint statement by the US, UK, and EU in July 2021 about China’s irresponsible behavior in cyberspace. Some PRC cybersecurity companies now coordinate report publication with government ...
The Future of CISOs: Navigating Trends and Evolving Roles

The Future of CISOs: Navigating Trends and Evolving Roles

With escalating cyber threats and data breaches, the need for effective cybersecurity leadership and measures has never been more important. The increasing trend of cyber criminality has placed the responsibility of Chief Information Security Officers (CISO) in the spotlight, and the role of the CISO is increasingly critical. With the rapid advancement ...
Pervasive OT and IoT Network Anomalies Raise Red Flags as Threats to Critical Infrastructure Become More Sophisticated

Pervasive OT and IoT Network Anomalies Raise Red Flags as Threats to Critical Infrastructure Become More Sophisticated

The latest Nozomi Networks Labs OT & IoT Security Report released today finds that network anomalies and attacks were the most prevalent threat to operational technology (OT) and internet of things (IoT) environments. Vulnerabilities within critical manufacturing also surged 230% – a cause for concern as threat actors have far more opportunities to ...
HijackLoader Expands Techniques to Improve Defense Evasion

HijackLoader Expands Techniques to Improve Defense Evasion

CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. Think of loaders like wolves in sheep clothing. Their purpose is to sneak in, introduce and execute more sophisticated threats and tools. Our research revealed that this recent variant of ...
Boosting Confidence In Ransomware Recovery

Boosting Confidence In Ransomware Recovery

The safeguarding of digital assets is an ongoing, uphill battle. This fight is made harder still by the gaps in cyber resilience policies and the alarming lack of confidence in ransomware recovery. The need for boosted recovery confidence underscores the importance of addressing these challenges to fortify organisations against the rising tide of ...
No results found.

In The News

JFrog Enables AI-Driven Developer Workflows with Robust MCP Server

JFrog Enables AI-Driven Developer Workflows with Robust MCP Server

JFrog’s Model Context Protocol (MCP) server allows developers to seamlessly employ AI-agents across the JFrog Platform, enabling faster, more reliable, secure software development & delivery at scale
Figma Deepens Local Roots In Australia With Local Data Hosting and More

Figma Deepens Local Roots In Australia With Local Data Hosting and More

Figma introduces new governance features for enterprise customers, with local data residency expected later this year.
ESET Announces Winner of the Australia 2025 Women in Cybersecurity Scholarship

ESET Announces Winner of the Australia 2025 Women in Cybersecurity Scholarship

The scholarship is part of ESET’s broader commitment to closing the gender gap in cybersecurity, an industry that remains disproportionately male, despite growing awareness of the need for diverse perspectives. With an estimated 5,000 additional cybersecurity professionals needed each year to meet national targets, programs like this play a vital role ...
Check Point Appoints Jonathan Zanger as Chief Technology Officer to Strengthen Cyber Security Capabilities through AI Innovation

Check Point Appoints Jonathan Zanger as Chief Technology Officer to Strengthen Cyber Security Capabilities through AI Innovation

Seasoned technologist and former Trigo CTO to lead Check Point’s global cyber security and AI strategy and AI centres
ROLLER Achieves 60% Cloud Savings and Improved Reliability with Datadog

ROLLER Achieves 60% Cloud Savings and Improved Reliability with Datadog

Sydney, Australia – July 22, 2025 – Datadog, Inc. (NASDAQ: DDOG), the monitoring and security platform for cloud applications, today announced ROLLER, an Australian-founded software company for attractions, has streamlined operations, improved availability, and reduced cloud infrastructure costs using the Datadog platform. ROLLER is the software ...
BioCatch delivers Scams360 to help banks advance detection of emerging scam types

BioCatch delivers Scams360 to help banks advance detection of emerging scam types

Single, streamlined platform defends against full spectrum of scams
Check Point Software Infinity Global Services Earns CREST Accreditation for Penetration Testing, Setting a New Standard in Cyber Security Testing Excellence

Check Point Software Infinity Global Services Earns CREST Accreditation for Penetration Testing, Setting a New Standard in Cyber Security Testing Excellence

Accreditation affirms Check Point’s commitment to high-assurance, ethical and globally validated penetration testing services
F5 and MinIO Expand Strategic Partnership to Power High-Performance, Secure, and Scalable Data Pipelines for AI Factories

F5 and MinIO Expand Strategic Partnership to Power High-Performance, Secure, and Scalable Data Pipelines for AI Factories

Solution combines F5 Application Delivery and Security Platform (ADSP) with MinIO AIStor Enterprise Edition to augment AI performance, scalability, and reliability
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This