The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Why Taking A Customer-Centric Approach To Cybersecurity Incident Response Is Critical To Maintain Customer Trust

Why Taking A Customer-Centric Approach To Cybersecurity Incident Response Is Critical To Maintain Customer Trust

Introduction Cybersecurity is no longer just an IT issue; it directly impacts customer trust and loyalty. Customers expect their data to be secure and any breach can lead to a significant loss of customer confidence that impacts a company’s reputation and profitability. The increasing importance of regulatory compliance and legal obligations (1) mean ...
Why Agile Learning is Vital for Secure Software Development

Why Agile Learning is Vital for Secure Software Development

Agile learning has emerged as a critical training methodology for high-impact upskilling of software development teams
Romantic Chatbots – To Be, or Not To Be

Romantic Chatbots – To Be, or Not To Be

‘Digital companionship’ has transcended science fiction. It’s now in a fledgling state, driven by a flourishing, if somewhat opportunistic, zeitgeist of AI-driven everything. Chatbots have been around for a long time, digitally speaking - nearly 60 years in fact since ELIZA was first created. And like most technologies, it eventually - and ...
Modern Threats Need Modern Defences – Why We Need To Modernise Cybersecurity

Modern Threats Need Modern Defences – Why We Need To Modernise Cybersecurity

With the benefit of hindsight, we can now look back and understand some of the cyber security missteps of 2023 to understand what we’re missing and how we can learn from our mistakes. We see artificial intelligence adding real tangible value in our efforts to increase defences around risk scoring and create efficiencies in threat hunting – meaning ...
How Organisations Can Combat the Surge in Phishing Attacks

How Organisations Can Combat the Surge in Phishing Attacks

As we rapidly progress into the digital era, Australia aims to become a world leader in cyber security by 2030. However, the threat of cybercrime continues to grow at an alarming rate. Australia has continued to see high-profile breaches leaving Australians’ sensitive data vulnerable and exploited, with some impacted falling victim to several breaches ...
Why Human-Based and Identity Security is Becoming Increasingly Important

Why Human-Based and Identity Security is Becoming Increasingly Important

By adopting a strategy of implementing identity-based security measures, organisations can proactively improve their security posture by establishing defensive practices that help manage threats arising from unpredictable human behaviour. However, for this to work, user actions need to be taken into account.
Upholding the Principles of “Responsible Tech” in a Rapidly-Changing World

Upholding the Principles of “Responsible Tech” in a Rapidly-Changing World

It’s no surprise that with the rapidly evolving landscape of tech, scepticism and concerns - from customers and shareholders is growing. As business leaders, it’s our responsibility to ensure that responsible tech principles are built into the very fibre of what we do. Ensuring that people and the planet are taken care of along the value chain. At BT ...
Is Using Generative AI at Work Cheating? A Quarter of Aussie Office Workers Say “Yes”

Is Using Generative AI at Work Cheating? A Quarter of Aussie Office Workers Say “Yes”

A lack of guidance on generative AI tools in the Australian workplace is creating rifts and increasing risks.
No results found.

In The News

Qualys Honored with Dual Win at Prestigious Pwnie Awards for Groundbreaking Cybersecurity Research

Qualys Honored with Dual Win at Prestigious Pwnie Awards for Groundbreaking Cybersecurity Research

Wins for Epic Achievement and Best RCE spotlight Qualys’ industry-leading research into critical OpenSSH vulnerabilities, reinforcing its leadership in global cybersecurity innovation
Tenable Jailbreaks OpenAI’s GPT-5 Within 24 Hours, Bypassing New Safety Features

Tenable Jailbreaks OpenAI’s GPT-5 Within 24 Hours, Bypassing New Safety Features

Just 24 hours after OpenAI launched its highly anticipated GPT−5 model with promises of “significantly more sophisticated” prompt safety, exposure management company Tenable has successfully jailbroken the platform, compelling it to provide detailed instructions on how to build a Molotov cocktail. On August 7, 2025, OpenAI unveiled GPT−5, touting its ...
Fortinet Enhances FortiRecon to Align With Continuous Threat Exposure Management Framework to Help Organisations Stay Ahead of Threats

Fortinet Enhances FortiRecon to Align With Continuous Threat Exposure Management Framework to Help Organisations Stay Ahead of Threats

New features integrate attack surface management, threat intelligence, and security orchestration to help security teams reduce risk faster and more proactively
Genetec Continues To Dominate Video Surveillance Software Market, According To Latest Analyst Reports

Genetec Continues To Dominate Video Surveillance Software Market, According To Latest Analyst Reports

Growing SaaS adoption and customer demand for flexible, open solutions strengthen company’s continued market leadership.
Trend Micro Launches Agentic SIEM to Herald New Era of Proactive Security

Trend Micro Launches Agentic SIEM to Herald New Era of Proactive Security

SYDNEY, August 13, 2025 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced new agentic AI technology designed to solve the traditional pain points associated with Security Information and Event Management (SIEM). When combined with Trend’s digital twin capabilities it will help to transform security ...
Elastic Introduces Logs Essentials: Serverless Log Analytics, in a New Low-priced Tier

Elastic Introduces Logs Essentials: Serverless Log Analytics, in a New Low-priced Tier

Site reliability engineers and developers gain access to powerful log analytics without the overhead of managing Elastic Stack
New Dragos Report Estimates Over $300 Billion in Potential Global OT Cyber Risk Exposure

New Dragos Report Estimates Over $300 Billion in Potential Global OT Cyber Risk Exposure

A new industry study has quantified the potential global financial impact of operational technology (OT) cyber incidents at up to US $329.5 billion in a severe but plausible scenario, with business interruption losses accounting for more than half that amount.
Rapid7 Access Brokers Report: New Research Reveals Depth of Compromise in Access Broker Deals, with 71% Offering Privileged Access

Rapid7 Access Brokers Report: New Research Reveals Depth of Compromise in Access Broker Deals, with 71% Offering Privileged Access

New research into underground cybercrime markets has revealed that “initial” access sold by brokers often represents a deep compromise, with 71% of listings offering privileged credentials and, in some cases, multiple access vectors bundled together.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This