The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Don’t Take The Bus Lane, Take The Fastlane

Don’t Take The Bus Lane, Take The Fastlane

Don’t Take The Bus Lane, Take The Fastlane From Karissa A. Breen Fastlane Solutions celebrates the launch of their new strategy   On Thursday 24th August, I hosted the Fastlane new strategy launch event at the exquisite Vini Divini Wine Lab on Carrington Street in Sydney. The event kicked off with a diverse selection of wines, and attendees ...
Benefits of AI-Tools for Software Developers Tempered by Security Shortcomings

Benefits of AI-Tools for Software Developers Tempered by Security Shortcomings

Since it first appeared late last year, ChatGPT has quickly built an extensive user base keen to put the evolving tool through its paces.
Why Banks are Increasingly Turning to External IT Security Resources

Why Banks are Increasingly Turning to External IT Security Resources

Thwarting cyberattacks is a key task for any CIO in the banking industry, however it’s not the only security-related challenge keeping them awake at night.
Flashpoint Report Shows Australia Among Most Targeted Countries for Ransomware Attacks in July

Flashpoint Report Shows Australia Among Most Targeted Countries for Ransomware Attacks in July

Flashpoint has published its July Cyber Threat Intelligence Index which shows Australia was in the top 10 countries for ransomware attacks last month.
Cloudflare Harnesses the Power of its Global Network to Identify Top Exploited Phishing Methods and Most Impersonated Brands in Inaugural Report

Cloudflare Harnesses the Power of its Global Network to Identify Top Exploited Phishing Methods and Most Impersonated Brands in Inaugural Report

Report underscores that email is the most exploited threat vector, Phishing remains borderless and attackers are increasingly impersonating trusted name brands
Achieving a Robust Zero Trust Environment

Achieving a Robust Zero Trust Environment

The concept of a Zero Trust infrastructure is now broadly understood across most industry sectors, but what’s less clear is the path organisations need to follow to get there.
How Businesses Today can Prevent Advanced Cyber Threats

How Businesses Today can Prevent Advanced Cyber Threats

In recent years workforces have become increasingly mobile, with employees using laptops at home, airports, cafes etc. Then, with the onset of COVID-19, the number of people accessing corporate resources from devices outside the corporate network increased enormously.
Tenable CEO and Chairman calls out Microsoft for unacceptable cybersecurity practices

Tenable CEO and Chairman calls out Microsoft for unacceptable cybersecurity practices

In a recent article, Amit Yoran, the Chairman and CEO of Tenable, criticised Microsoft for its cybersecurity practices. He mentioned that Senator Ron Wyden had written to various government agencies, urging them to hold Microsoft accountable for negligent cybersecurity practices that have allowed Chinese espionage against the US government. Data from ...
No results found.

In The News

Bitdefender Redefines Endpoint Security, Announces Global Launch of GravityZone PHASR

Bitdefender Redefines Endpoint Security, Announces Global Launch of GravityZone PHASR

Bitdefender has announced the worldwide availability of Bitdefender GravityZone Proactive Hardening and Attack Surface Reduction (PHASR), the industry’s first endpoint security solution to dynamically tailor hardening for each user—ensuring that security configurations align precisely with user-intended privileges and behaviours and continuously adapt ...
Datadog Makes Strategic Acquisition of Metaplane

Datadog Makes Strategic Acquisition of Metaplane

Datadog has announced it has acquired Metaplane, an end-to-end data observability platform that provides advanced machine learning-powered monitoring and column-level lineage to prevent, detect and resolve data quality issues across a company’s entire data stack. With the emergence of AI and widespread adoption of platforms like Snowflake and ...
Veeam Unveils Inaugural ESG Report Highlighting Sustainability, Social Impact, And Corporate Governance Initiatives

Veeam Unveils Inaugural ESG Report Highlighting Sustainability, Social Impact, And Corporate Governance Initiatives

Veeam announced the release of its first Environmental, Social, and Governance (ESG) Report, coinciding with the 55th anniversary of Earth Day. This landmark report showcases Veeam's commitment to inclusively creating a sustainable future while maintaining the highest standards of trust and governance. “Today at VeeamON, we are proud to launch our ...
CrowdStrike and Veeam Partner to Strengthen Data Resilience for Customers

CrowdStrike and Veeam Partner to Strengthen Data Resilience for Customers

Veeam announced a new partnership with CrowdStrike to deliver centralised visibility of critical data and advanced threat detection through integration with the Veeam Data Platform. The jointly developed product integration creates a more secure environment for shared customers, helping identify threats before, during and after an attack to enable ...
SecurityBridge Unveils AI-Powered Code Vulnerability Analyzer to Strengthen SAP Security

SecurityBridge Unveils AI-Powered Code Vulnerability Analyzer to Strengthen SAP Security

This innovative tool leverages artificial intelligence (AI) to identify and explain vulnerabilities in custom Advanced Business Application Programming (ABAP) code, empowering SAP developers and security teams to remediate risks faster and more efficiently.
NinjaOne Introduces New Capabilities to Strengthen Organisations’ Cyber Hygiene

NinjaOne Introduces New Capabilities to Strengthen Organisations’ Cyber Hygiene

NinjaOne today announced new capabilities that unify vulnerability management and patching workflows, ensuring a risk-based approach to patching and reducing time to remediate vulnerabilities. The new tools automate the import of vulnerability data, giving IT teams continuous visibility into vulnerabilities, so they can prioritise and verify the ...
CrowdStrike Unveils Falcon Privileged Access, Delivering the Only Platform that Unifies End-to-End Hybrid Identity Security

CrowdStrike Unveils Falcon Privileged Access, Delivering the Only Platform that Unifies End-to-End Hybrid Identity Security

CrowdStrike Unveils Falcon Privileged Access, Delivering the Only Platform that Unifies End-to-End Hybrid Identity Security Falcon platform secures the entire identity attack lifecycle – from initial access to privilege escalation and lateral movement – across hybrid environments; extends Charlotte AI Agentic Detection Triage to identity-based attacks
CrowdStrike Named a Leader and Fast Mover in the 2025 GigaOm Radar Report for XDR

CrowdStrike Named a Leader and Fast Mover in the 2025 GigaOm Radar Report for XDR

Earns high overall scores across Key and Emerging Features categories, with perfect marks in Threat Detection, Cloud Security Integration, Unified Telemetry and Scalability criteria
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This