The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
How to Build a Successful Data Security Strategy
Businesses once managed limited data, stored in physical formats or on local servers. Today, data has grown exponentially in volume, variety, and accessibility, seamlessly flowing through complex online networks and cloud platforms. This means securing that information is more important (and complicated) than ever before, and organisations must build a ...

Detecting Script-Based Attacks Against SAP
Cyberattacks against SAP systems have become more common with SAP customers generating 87% of total global commerce ($46 trillion), according to SAP.com. Attackers gain network access and then explore critical applications through port scanning and script-based exploration, and two two easy to identify attack examples are the password lock attack and ...
How AI Can Advance Your SAP Security Posture
This article explores AI’s role in SAP Security, highlighting some SAP security platform challenges and the importance of system hardening against exploit chains within SAP vulnerabilities.
QR Code Phishing Attacks (Quishing): What to Know and How to Stay Secure
Another new kind of phishing attack is on the rise and it’s coming from an unexpected source: QR codes. Like with other kinds of phishing, this kind of attack leverages trust—trust in the QR code itself as well as the brand attached to it. So what does a QR-based phishing attack look like and how can you protect yourself one? Josh Cigna from Yubico ...

How Generative AI Can Lend a Helping Hand to IT Security Teams
As security teams continue their constant battle against evolving threats and attackers, growing numbers are exploring the assistance that can be provided by new generative AI tools.
Why Taking a Customer-Centric Approach to Cybersecurity Incident Response Is Critical to Maintain Customer Trust
Introduction
Cybersecurity is no longer just an IT issue; it directly impacts customer trust and loyalty. Customers expect their data to be secure and any breach can lead to a significant loss of customer confidence that impacts a company’s reputation and profitability. The increasing importance of regulatory compliance and legal obligations (1) mean ...

Why Agile Learning Is Vital for Secure Software Development
Agile learning has emerged as a critical training methodology for high-impact upskilling of software development teams

Romantic Chatbots – to Be, or Not to Be
‘Digital companionship’ has transcended science fiction. It’s now in a fledgling state, driven by a flourishing, if somewhat opportunistic, zeitgeist of AI-driven everything.
Chatbots have been around for a long time, digitally speaking - nearly 60 years in fact since ELIZA was first created. And like most technologies, it eventually - and ...
No results found.
In the News
Fastly Recognised as a Gartner® Peer Insights™ Customer’s Choice for Seventh Consecutive Year, Trusted by Customers for Cloud Web Application and API Protection
Sydney, 3 October 2025 - Fastly, Inc. (NYSE: FSLY), a leader in global edge cloud platforms, has announced that it was named a 2025 Gartner® Peer Insights™ Customers’ Choice for Cloud Web Application and API Protection (WAAP). Fastly received overall high ratings and is the only vendor to earn this recognition for seven consecutive years.
The ...
New Infoblox Research Uncovers DNS TXT Abuse in Stealth Malware Campaign Infecting Thousands of Sites
New Infoblox Threat Intel research reveals that a long-running threat actor compromising websites, coined as “Detour Dog,” has evolved from scam redirects to deliver information stealing malware. This allows compromised sites to fetch and relay malicious execution output without any visible cues to the user, all using the domain name system (DNS) for ...
Genetec Continues to Expand Its Share of the Global Access Control Software Market, According to Latest Omdia Report
Company records strong organic market share gain worldwide, reflecting 20 years of access control innovation and rapid adoption of ACaaS solutions
Sophos Launches Advisory Services to Deliver Proactive Cybersecurity Resilience
Sophos today announced the launch of Sophos Advisory Services, a suite of security testing services designed to identify gaps in organisations’ security programs. These offerings – External Penetration Testing, Internal Penetration Testing, Wireless Network Penetration Testing, and Web Application Security Assessment – help fortify an organisation’s ...
Exabeam Delivers First Configurable Peer Benchmarking for CISO Decision-Making
New capabilities in the Exabeam Nova Advisor Agent and Outcomes Navigator operationalise benchmarking for proactive security operations
Ping Identity Survey Reveals Australian Consumer Trust Plummeting as Security Concerns SOAR
With only 20% confident in spotting scams, Australians demand stronger AI security and regulation
C-Suite’s Rush to AI Blinds Leadership to Critical Security Failures, Leaving Organisations Exposed
With 34% of organisations suffering an AI-related breach, new Tenable report shows leadership is misjudging risk by focusing on reactive metrics instead of preventable threats
KnowBe4 Is a Proud Participant in the Microsoft Security Store Partner Ecosystem
KnowBe4 customers can now streamline procurement and deployment processes to accelerate their security outcomes and simplify operations
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
