The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How to Build a Successful Data Security Strategy

How to Build a Successful Data Security Strategy

Businesses once managed limited data, stored in physical formats or on local servers. Today, data has grown exponentially in volume, variety, and accessibility, seamlessly flowing through complex online networks and cloud platforms. This means securing that information is more important (and complicated) than ever before, and organisations must build a ...
Detecting Script-Based Attacks Against SAP

Detecting Script-Based Attacks Against SAP

Cyberattacks against SAP systems have become more common with SAP customers generating 87% of total global commerce ($46 trillion), according to SAP.com. Attackers gain network access and then explore critical applications through port scanning and script-based exploration, and two two easy to identify attack examples are the password lock attack and ...

How AI Can Advance Your SAP Security Posture

This article explores AI’s role in SAP Security, highlighting some SAP security platform challenges and the importance of system hardening against exploit chains within SAP vulnerabilities.
QR Code Phishing Attacks (Quishing): What to Know and How to Stay Secure

QR Code Phishing Attacks (Quishing): What to Know and How to Stay Secure

Another new kind of phishing attack is on the rise and it’s coming from an unexpected source: QR codes. Like with other kinds of phishing, this kind of attack leverages trust—trust in the QR code itself as well as the brand attached to it. So what does a QR-based phishing attack look like and how can you protect yourself one? Josh Cigna from Yubico ...
How Generative AI Can Lend a Helping Hand to IT Security Teams

How Generative AI Can Lend a Helping Hand to IT Security Teams

As security teams continue their constant battle against evolving threats and attackers, growing numbers are exploring the assistance that can be provided by new generative AI tools.
Why Taking a Customer-Centric Approach to Cybersecurity Incident Response Is Critical to Maintain Customer Trust

Why Taking a Customer-Centric Approach to Cybersecurity Incident Response Is Critical to Maintain Customer Trust

Introduction Cybersecurity is no longer just an IT issue; it directly impacts customer trust and loyalty. Customers expect their data to be secure and any breach can lead to a significant loss of customer confidence that impacts a company’s reputation and profitability. The increasing importance of regulatory compliance and legal obligations (1) mean ...
Why Agile Learning Is Vital for Secure Software Development

Why Agile Learning Is Vital for Secure Software Development

Agile learning has emerged as a critical training methodology for high-impact upskilling of software development teams
Romantic Chatbots – to Be, or Not to Be

Romantic Chatbots – to Be, or Not to Be

‘Digital companionship’ has transcended science fiction. It’s now in a fledgling state, driven by a flourishing, if somewhat opportunistic, zeitgeist of AI-driven everything. Chatbots have been around for a long time, digitally speaking - nearly 60 years in fact since ELIZA was first created. And like most technologies, it eventually - and ...
No results found.

In the News

Cloudflare Helps Protect Independent Journalism and Non-Profits From AI Crawlers–For Free

Cloudflare Helps Protect Independent Journalism and Non-Profits From AI Crawlers–For Free

Cloudflare’s Project Galileo will now help empower journalists and non-profits to control how AI uses their original content 
Delinea Unveils Free Open Source MCP Server to Safeguard AI Agents

Delinea Unveils Free Open Source MCP Server to Safeguard AI Agents

New GitHub package enables organisations to connect AI agents with the Delinea Platform for secure credential access, policy enforcement, and compliance 
New Riverbed Survey Reveals AI Readiness Gaps in Australia: Despite Record Investments, Only One in 10 AI Projects Fully Deployed

New Riverbed Survey Reveals AI Readiness Gaps in Australia: Despite Record Investments, Only One in 10 AI Projects Fully Deployed

2025 State of AI Readiness in IT Operations survey highlights gaps in implementation, confidence, and data quality, with tools consolidation, OpenTelemetry adoption and resilient, cost-effective IT infrastructure emerging as critical enablers of AI success 
Latest Darktrace Investigations Uncover Novel & Emerging DDoS Botnet for Hire – ShadowV2

Latest Darktrace Investigations Uncover Novel & Emerging DDoS Botnet for Hire – ShadowV2

Darktrace's latest investigation uncovered a novel campaign that blends traditional malware with modern devops technology. At the center of this campaign is a Python-based command-and-control (C2) framework hosted on GitHub CodeSpaces. This campaign also utilizes a Python based spreader with a multi-stage Docker deployment as the initial access vector. ...
BeyondTrust Strengthens Innovation Leadership With Appointment of Felix Gaehtgens as VP of Product Strategy

BeyondTrust Strengthens Innovation Leadership With Appointment of Felix Gaehtgens as VP of Product Strategy

Strategic leadership addition accelerates BeyondTrust’s innovation in identity security, machine IAM, and privileged access management (PAM). Gaehtgens brings over a decade of Gartner expertise in identity security to BeyondTrust.
Dragos Platform 3.0 Delivers Industry’s Fastest Path to Effective OT Cyber Defence

Dragos Platform 3.0 Delivers Industry’s Fastest Path to Effective OT Cyber Defence

Dragos has launched Dragos Platform 3.0, which provides breakthrough capabilities that empower industrial defenders to act even faster and more confidently to protect against intensifying cyber threats.
Tenable Unites Top CISOs to Forge Exposure Management Framework for Proactive Risk Management

Tenable Unites Top CISOs to Forge Exposure Management Framework for Proactive Risk Management

Exposure Management Leadership Council created to mature exposure management into a proactive security discipline
Vection Technologies Secures $22.3m AI Defence Deal With NATO-approved Partner

Vection Technologies Secures $22.3m AI Defence Deal With NATO-approved Partner

INTEGRATEDXR company Vection Technologies Ltd (ASX:VR1) has announced has executed a $22.3m (scalable up to $29.5m at same conditions) multi-year master framework agreement with a repeat NATO-approved customer and partner operating within the European defence sector. Highlights $22.3m framework agreement executed with a repeat NATO-approved ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This