The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Why Identity Management Is Critical for Effective IT Security
Organisations should follow several key steps to ensure that identity credentials are secure and user authorisations are appropriate.
CyRC Vulnerability Advisory: CVE-2023-7060 Missing Security Control in Zephyr OS IP Packet Handling
IP address spoofing involves creating Internet Protocol (IP) packets with a fake source IP address. This is typically done with the intention of deceiving the recipient into believing that the packet is coming from a legitimate source. When the recipient sends a response back to the source IP address, it is sent to the fake source IP address ...
AI Skills Could Boost Australia Workers’ Salaries by More Than 29% and Accelerate Career Growth as AI Adoption Ramps up, Finds New Research
Hiring AI-skilled talent is a priority for nearly two out of three employers in Australia but 75% struggle to find the AI talent they need, highlighting a looming AI skills gap in the country.

Protecting the Digital Realm Knows No Gender
Identity management and security are crucial aspects of the modern digital landscape, responsible for protecting the information and access points that link us globally. Thankfully, these areas, filled with complexities and chances for growth, are becoming more appealing to women, many of whom are making significant contributions to development. It’s ...

Reputational Risk, Ransomware and the ‘Operational Resilience’ Imperative
When organisations are hit by ransomware attacks and business operations go down, there’s often a rush to blame. Who’s responsible? Who should resign? Less often is the question: What can we learn from it? As cyber incidents become more a matter of inevitability, it’s increasingly critical that businesses also invest in their operational resilience – ...

AI-generated Code: The Fourth Component of Software
There is enormous attention on generative AI (GenAI) and its potential to change software development. While the full impact of GenAI is yet to be known, organisations are eagerly vetting the technology and separating the hype from the real, pragmatic benefits. In parallel, software security professionals are closely watching the practical impact of ...
Using Annual Loss Expectancy (ALE) for Cybersecurity Tech Investment Planning and Building a Business Case
Using Annual Loss Expectancy (ALE) to build a business case for purchasing cybersecurity solutions

Transforming Tomorrow: How Women in Science, Technology, Engineering, and Mathematics (STEM) Are Shaping a Better Future
Across STEM women remain underrepresented despite the wide-ranging benefits we know they bring to the field, especially in areas like Cyber Security. So, how do we close this gap? In this article John Penn, Senior Security Propositions Manager and Lucy Mentoring Program Lead at BT, discusses how mentorship is a powerful tool to support more women in ...
No results found.
In the News
Trend Micro Awards Over USD$1,000,000 to Ethical Hackers
Participants at Pwn2Own Ireland discovered scores of zero-day vulnerabilities
Organisations That Delay Responding to Email Breaches Are 79% More Likely to Suffer a Ransomware Hit
· New research shows 76% of Australian respondents experienced an email security breach in the previous 12 months · The average cost of recovering from a single email security breach in Australia exceeds $280,000 USD (approx. $430,000 AUD). · Smaller companies are hit hardest with recovery costs of nearly $2,000 USD per employee
Nozomi Networks Innovates to Automate Cybersecurity Defences for Critical Infrastructure
Nozomi Networks Inc., the leader in OT, IoT and CPS security today announced the industry’s first cybersecurity solution to safely automate threat responses in operational environments. With the latest release of Nozomi Arc, users gain robust, automated threat prevention capabilities for OT endpoints.
First launched in 2023, Nozomi Arc is the ...
Trend Micro Launches End-to-End Protection for Agentic AI Systems With NVIDIA
Extends Agentic AI Safety from infrastructure to application with agentless EDR and integrated guardrails to secure next-generation AI factories
Check Point Redefines AI Security for Enterprises With AI Cloud Protect Powered by NVIDIA BlueField
Redwood City, CA – October 28, 2025 – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced it is working with NVIDIA to deliver an integrated security solution built for AI factories. AI Cloud Protect is now available for on-premises enterprise deployments to secure AI model ...
CrowdStrike and NVIDIA Redefine Cybersecurity With Always-On AI Agents Protecting the Nation’s Digital Infrastructure
Always-on agents built with CrowdStrike Charlotte AI AgentWorks and integrated with NVIDIA Nemotron and NVIDIA NIM microservices will enable real-time threat detection and response across cloud, data center, and edge environments
Palo Alto Networks and Cyberlite Partner to Launch AI Safety in the Classroom Toolkit, a Landmark Resource to Equip Students With Critical Generative AI Skills
New modular resource empowers non-experts, educators, parents, and instructors to teach students critical thinking for safe and ethical AI use
DigiCert Launches Inaugural RADAR Brief
New Cyber Intelligence Reveals ‘Internet Tsunami’ Attacks and Rising Automation in Global Attacks
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
- 353
- 354
- 355
- 356
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
