The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

AI for Cybersecurity: Use With Caution

AI for Cybersecurity: Use With Caution

This article discusses the challenges and opportunities that AI poses to cybersecurity, specifically looking into how companies can approach it with caution.
Why Humans Are No Longer The Weakest Link In The Cyber Chain

Why Humans Are No Longer The Weakest Link In The Cyber Chain

We’ve all heard the mantra that ‘humans are the weakest link’ in any organisation’s cybersecurity defences, but with generative AI technology making exploits such as phishing email campaigns more convincing and scalable, it’s no longer fair — or effective — to blame individuals for succumbing to attacks. It’s Andrew’s view that while cyber training ...
Stream-Jacking 2.0: Deep fakes power account takeovers on YouTube to maximise crypto-doubling scams

Stream-Jacking 2.0: Deep fakes power account takeovers on YouTube to maximise crypto-doubling scams

Stream-Jacking & Deep fakes. If you ever observe content promoting giveaways or other events from well-known companies, always make sure to double-check the promotions on official websites.
Credential Stuffing – Industry Commentary from Tenable

Credential Stuffing – Industry Commentary from Tenable

Commentary on a new tactic scammers are employing called credential stuffing which is affecting the retail sector and can result in fraudulent transactions being made using payment information saved on popular retail sites.
Why Effective Digital ID Management is Vital in Financial Services

Why Effective Digital ID Management is Vital in Financial Services

Institutions that take digital ID seriously and put it at the forefront of application planning and deployment will be best placed to secure an increasing share of a rapidly growing market.
Improving Cybersecurity Within Australia’s Water Utilities

Improving Cybersecurity Within Australia’s Water Utilities

In a world of unceasing cyberattacks, security is no longer a luxury but a vital investment. By taking action now, utilities can ensure the uninterrupted flow of water to their customers at all times.
The Three Steps to Mitigate API Abuse in Cloud-hosted Applications

The Three Steps to Mitigate API Abuse in Cloud-hosted Applications

APIs have become a strategic necessity for business because they aid flexibility and agility, yet many organisations have remained cautious of their use due to worries about the data that APIs expose. The concerns are fanned by regular reports of IT security breaches that cause downtime, data loss and financial problems for victims. This article looks ...
Cybersecurity Challenges and the Need for a Mindset Shift

Cybersecurity Challenges and the Need for a Mindset Shift

In a recent interview with cybersecurity expert, Corien Vermaak, Head of Cybersecurity from Cisco ANZ, was a discussion about the evolving landscape of cybersecurity and the challenges posed by breaches and the shortage of skilled practitioners shed light on the urgent need for a value mind shift in understanding the importance of personal data ...
No results found.

In The News

Trustwave Launches Managed Phishing for Microsoft Service to Strengthen Microsoft 365 Email Security

Trustwave Launches Managed Phishing for Microsoft Service to Strengthen Microsoft 365 Email Security

July 15, 2025 – Trustwave, a global cybersecurity and managed security services leader, has announced the launch of Managed Phishing for Microsoft, an advanced service designed to help organisations using Microsoft Office 365 and Defender for Office proactively defend against the evolving threat of phishing attacks. Phishing remains the most ...
Check Point Software Technologies Named a Leader in Zero Trust Platforms, Q3 2025 Evaluation

Check Point Software Technologies Named a Leader in Zero Trust Platforms, Q3 2025 Evaluation

Check Point’s Hybrid Mesh Security Platform recognised for plan to deliver AI-driven capabilities to automate network security functions
Kyndryl Partners with Microsoft to Launch the Kyndryl Microsoft Acceleration Hub to Drive Customer Innovation and Digital Transformation

Kyndryl Partners with Microsoft to Launch the Kyndryl Microsoft Acceleration Hub to Drive Customer Innovation and Digital Transformation

New Hub combines Kyndryl Consult expertise with Microsoft technologies to enable AI-first consulting capabilities and engagements
Semperis 2025 Purple Knight Report Reveals Persistent Security Gaps in Hybrid Active Directory and Entra ID Environments

Semperis 2025 Purple Knight Report Reveals Persistent Security Gaps in Hybrid Active Directory and Entra ID Environments

2025 Purple Knight Report Reveals Persistent Security Gaps in Hybrid Active Directory and Entra ID Environments The new report uncovers identity security risks, low initial assessment scores, and urgent need for remediation across Active Directory, Entra ID, and Okta—but substantial score improvements for users applying Purple Knight’s expert ...
Crypto Wallets Continue to be Drained in Elaborate Social Media Scam

Crypto Wallets Continue to be Drained in Elaborate Social Media Scam

Overview Continued research by Darktrace has revealed that cryptocurrency users are being targeted by threat actors in an elaborate social engineering scheme that continues to evolve. In December 2024, Cado Security Labs detailed a campaign targeting Web 3 employees in the Meeten campaign. The campaign included threat actors setting up meeting ...
Latest DigiCert Survey Finds Manual Processes Expose Organisations to Outages, Compliance Failures, and Six-Figure Losses as Certificate Volumes Climb

Latest DigiCert Survey Finds Manual Processes Expose Organisations to Outages, Compliance Failures, and Six-Figure Losses as Certificate Volumes Climb

Research highlights certificate mismanagement is draining enterprise resources and eroding digital trust
Operational Technology Cybersecurity Risk Elevates Within Executive Leadership Ranks

Operational Technology Cybersecurity Risk Elevates Within Executive Leadership Ranks

More than half (52 per cent) of organisations report that the chief information security officer/chief security officer is responsible for operational technology, up from 16 per cent in 2022, while 95 per cent of organisations report that the C-suite is responsible for operational technology, up from 41 per cent in 2022 
Bitdefender Forges Partnership With Creators Guild of America

Bitdefender Forges Partnership With Creators Guild of America

Bitdefender has announced a strategic partnership with the Creators Guild of America to provide digital security solutions tailored for online content creators. The partnership aims to raise awareness of the critical need for creators to protect their digital identities, content, and personal information from increasingly sophisticated and costly cyber ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This