The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Cooperate or Collapse: The Prisoner’s Dilemma in Cybersecurity Strategy

Cooperate or Collapse: The Prisoner’s Dilemma in Cybersecurity Strategy

Introduction In the interconnected world of cybersecurity, organisations, nations, and individuals constantly confront strategic decisions regarding resource allocation, information sharing, and defence against cyber threats. One of the most compelling frameworks for analysing these challenges is the Prisoner’s Dilemma, a foundational game theory ...
Generative AI: Striking a Balance between Innovation and Overreliance

Generative AI: Striking a Balance between Innovation and Overreliance

The threats posed by AI are distinct in many ways from those that target user identity, software code, or business data. While traditional cybersecurity risks often focus on protecting specific assets, AI introduces new challenges - such as hallucinations, deepfakes, and ethical concerns - that can impact decision-making and public trust. The key for ...
Bridging AI Readiness in Australia

Bridging AI Readiness in Australia

With AI reshaping industries at unprecedented rates, findings from the 2024 CISCO Live Report suggest Australian companies are trailing, with only four percent ready to leverage the technology, a decline from the previous year. Here's how we bridge the gap to AI readiness for Australian companies.
Private Satellites, Public Dangers: Be Alarmed!

Private Satellites, Public Dangers: Be Alarmed!

Introduction Can governments and large businesses rely on private Starlink-type networks? In pursuing global connectivity and broader reach, many may overlook the risks associated with private satellite networks. The emergence of private satellite internet networks, led by Starlink and its expanding roster of competitors, has sparked debate about ...
How To Foster An Inclusive and Empowering Workplace This International Women’s Day 2025

How To Foster An Inclusive and Empowering Workplace This International Women’s Day 2025

Ruma Balasubramanian at Check Point Software Technologies provides advice on fostering an inclusive workplace this International Women's Day 2025.
Compliance In Healthcare is Not a Security Strategy

Compliance In Healthcare is Not a Security Strategy

Australia’s healthcare sector is failing at cybersecurity. The latest MediSecure breach, compromising the data of 12.9 million Australians, isn’t an isolated incident—it’s a symptom of a much larger, systemic problem. The industry’s outdated, compliance-driven approach to security is not working. Without a fundamental shift towards data-centric ...
A Supercharged Security Culture is Needed to Navigate Australia’s Cybersecurity Rules

A Supercharged Security Culture is Needed to Navigate Australia’s Cybersecurity Rules

By focusing on an organisation-wide security culture, CISOs can best prepare to meet burgeoning security requirements. Being able to prove the effectiveness of their program with easy-to-understand scoring is also invaluable in maintaining trust, ongoing budget and funding.
The Feminine Firewall: Securing Cyberspace with Heart and Smarts

The Feminine Firewall: Securing Cyberspace with Heart and Smarts

Introduction Diversity is the art of thinking independently together. In ancient times, women played vital roles far beyond their local communities. From the powerful priestesses of Delphi in ancient Greece to strong leaders like Hatshepsut in Egypt, women were not just keepers of cultural heritage but also catalysts for meaningful change. Their ...
No results found.

In The News

Cyber Frontlines: Hacktivist Surge Mirrors Escalating India-Pakistan Border Tensions

Cyber Frontlines: Hacktivist Surge Mirrors Escalating India-Pakistan Border Tensions

As geopolitical tensions flare between India and Pakistan following Operation Sindoor—the largest Indian cross-border strike since 1971—a parallel conflict is intensifying in cyberspace. Hacktivist groups aligned along political, religious, and nationalist lines are launching a wave of distributed denial-of-service (DDoS) attacks and cyber disruption ...
Sophos Accelerates Business Growth and Profitability for MSPs with the Launch of MSP Elevate Program

Sophos Accelerates Business Growth and Profitability for MSPs with the Launch of MSP Elevate Program

Sophos recently launched MSP Elevate, a new business-accelerating program for managed service providers (MSPs). With the new program, Sophos enables MSPs to expand their business with high-value, differentiated cybersecurity offerings that elevate their customers’ cyber defenses and rewards growth with additional investment to fuel further ...
Motorola Solutions Offers Assist Chat to all U.S. Public Safety Agencies Cost-Free and Expands AI Across Portfolio to Deliver Priority Intelligence to More Roles

Motorola Solutions Offers Assist Chat to all U.S. Public Safety Agencies Cost-Free and Expands AI Across Portfolio to Deliver Priority Intelligence to More Roles

Motorola Solutions today kicked off Summit 2025, its premier technology users conference, by announcing it is extending the capabilities of Assist, its public safety AI, to more people in more roles – from dispatch to investigations – to help prioritise what’s most important. The company will enable all public safety agencies with a complimentary ...
May Patch Tuesday Commentary from Tenable

May Patch Tuesday Commentary from Tenable

Microsoft patched 71 CVEs in its May 2025 Patch Tuesday release, with five rated critical and 66 rated as important. Remote code execution (RCE) vulnerabilities accounted for 39.4% of the vulnerabilities patched this month, followed by elevation of privilege (EoP) vulnerabilities at 25.4%. “For May 2025, Microsoft patched seven zero-day ...
First-Party Fraud Surpasses Scams to Become the Leading Form of Global Attacks

First-Party Fraud Surpasses Scams to Become the Leading Form of Global Attacks

Periods of inflation and rising living costs likely contribute to an increase in opportunistic fraud against financial services, ecommerce and other sectors AI-powered fraud expected to increase in 2025
JFrog Redefines Universal Artifact Management with Industry’s Widest Native Support for Software Packages, ML Models and AI Artifacts 

JFrog Redefines Universal Artifact Management with Industry’s Widest Native Support for Software Packages, ML Models and AI Artifacts 

Report Shows JFrog SaaS Customers Added 7M+ New Software Packages to their Enterprise Environments 
Fortinet Expands Hybrid Mesh Firewall Portfolio With FortiGate 700G

Fortinet Expands Hybrid Mesh Firewall Portfolio With FortiGate 700G

New FortiGate series delivers scalable, high-performance security for the modern campus, now enhanced with FortiOS post-quantum capabilities and FortiAI-Protect for advanced threat detection and generative artificial intelligence risk mitigation 
ColorTokens and Nozomi Networks Join Forces to Deliver Unmatched OT and IoT Security Through Zero Trust Microsegmentation

ColorTokens and Nozomi Networks Join Forces to Deliver Unmatched OT and IoT Security Through Zero Trust Microsegmentation

SAN JOSE, Calif., May 8, 2025 – ColorTokens Inc., a leader in zero trust microsegmentation, today announced a powerful new integration with Nozomi Networks, the leader in OT and IoT cybersecurity. This collaboration delivers unparalleled visibility and protection across operational environments - seamlessly uniting Nozomi Networks’ AI-powered threat ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This