The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Over Half Of Privacy Pros – 56 Percent In Oceania – Expecting Reduced Budgets In 2024, Sparking Concerns

Over Half Of Privacy Pros – 56 Percent In Oceania – Expecting Reduced Budgets In 2024, Sparking Concerns

Jo Stewart-Rattray: “It is paramount that organisations understand what is expected of them in order to devise an effective privacy policy and implement accordingly. Then will they be able to realise the benefits of embedding privacy practices in digital transformation from the outset, including customer loyalty, reputational and financial performance.”
People Are An Essential Element In Your Cybersecurity Incident Response Plan

People Are An Essential Element In Your Cybersecurity Incident Response Plan

Introduction While threat actors lean heavily on technology to execute cyber-attacks, much of their focus is on exploiting individuals. Focused on exfiltrating data and stealing money, criminals manipulate people through deception. Developing a security culture that helps people identify potential threats and encourages behaviours that decrease ...
Navigating Critical Infrastructure Cybersecurity: Your Business Imperative

Navigating Critical Infrastructure Cybersecurity: Your Business Imperative

The severe consequences of recent high-profile breaches, particularly among critical infrastructure industries, demonstrate the clear imperative for enterprises to fortify both their critical infrastructure systems and their cybersecurity posture. Today, almost every business deploys software, which means cyber risk is business risk.  However, many ...
Ransomware Attacks: No Sector is Safe

Ransomware Attacks: No Sector is Safe

Ransomware attacks have been spreading like wildfire, infiltrating various sectors and leaving devastation in their wake. While industries like finance, critical infrastructure, and healthcare have long been the prime targets, a recent study reveals that the arts, entertainment, and recreation industry is not immune to these cyber threats. In this ...
Prioritising Data Protection: A Conversation with Rad Kanapathipillai on KBKast

Prioritising Data Protection: A Conversation with Rad Kanapathipillai on KBKast

Introduction In a recent episode of KBKast, Host Karissa Breen engaged in an interview with Rad Kanapathipillai, who works in the field of data protection. The episode delved deep into the critical importance of safeguarding sensitive data across all stages of development, shedding light on the challenges organisations face and the strategies needed ...
Australia Sanctions Russian Hacker

Australia Sanctions Russian Hacker

Australia has boldly stepped into the cyber battlefield, wielding its autonomous cyber sanctions framework as a weapon against cybercrime. This decisive move came after a Russian individual, Aleksandr Ermakov, was implicated in the cyberattack on Medibank Private, one of the country's largest healthcare networks. The sanctions, a first of their kind to ...
AI for Cybersecurity: Use With Caution

AI for Cybersecurity: Use With Caution

This article discusses the challenges and opportunities that AI poses to cybersecurity, specifically looking into how companies can approach it with caution.
Why Humans Are No Longer The Weakest Link In The Cyber Chain

Why Humans Are No Longer The Weakest Link In The Cyber Chain

We’ve all heard the mantra that ‘humans are the weakest link’ in any organisation’s cybersecurity defences, but with generative AI technology making exploits such as phishing email campaigns more convincing and scalable, it’s no longer fair — or effective — to blame individuals for succumbing to attacks. It’s Andrew’s view that while cyber training ...
No results found.

In The News

Infoblox Supercharges Threat Defense to Deliver Enhanced Preemptive Protection Against Sophisticated, AI-Driven Attacks

Infoblox Supercharges Threat Defense to Deliver Enhanced Preemptive Protection Against Sophisticated, AI-Driven Attacks

Advancing preemptive security with powerful innovations designed to safeguard users, devices, IoT/OT, cloud workloads and shut down threats before they start Launching new and enhanced Protective DNS capabilities to help organisations predict threats, preempt AI-driven attacks and prevail over modern adversaries Introducing flexible token-based ...
Infoblox Unveils 2025 DNS Threat Landscape Report, Revealing Surge in AI-driven Threats and Malicious Adtech

Infoblox Unveils 2025 DNS Threat Landscape Report, Revealing Surge in AI-driven Threats and Malicious Adtech

Of the 100.8 million newly observed domains, 25.1 per cent were classified as malicious or suspicious. 82 per cent of environments contacted malicious adtech domains.
Palo Alto Networks Redefines Application Security with the Industry’s Most Comprehensive Prevention-First ASPM

Palo Alto Networks Redefines Application Security with the Industry’s Most Comprehensive Prevention-First ASPM

Cortex Cloud expands the platform with a prevention-first ASPM to automatically stop risks from reaching production. New open AppSec partner ecosystem unifies all data from industry-leading AppSec providers on a single platform for unprecedented cross-vendor visibility.
1 in 4 Australians fall for online scams, as confidence and convenience fuel cyber risks

1 in 4 Australians fall for online scams, as confidence and convenience fuel cyber risks

Trend Micro research reveals mobile usage and social platforms are driving growing scam culture in Australia
Claroty and Google Join Forces to Secure Mission-Critical Infrastructure

Claroty and Google Join Forces to Secure Mission-Critical Infrastructure

Integration of Claroty Platform with Google Security Operations Brings More Efficient, Intelligent Approach to Protecting Mission-Critical Infrastructure
Independent Research Firm Cites BeyondTrust as a Leader in Privileged Identity Management Report

Independent Research Firm Cites BeyondTrust as a Leader in Privileged Identity Management Report

Achieves top scores possible in 13 criteria, including innovation, vision, partner ecosystem, and identity threat detection and response. BeyondTrust recognised for “exceptional vision” that “centers on an identity-first security strategy.”
Ping Identity Named a Leader in Three 2025 KuppingerCole Reports

Ping Identity Named a Leader in Three 2025 KuppingerCole Reports

Ping Identity Leads Across Access Management, Identity Fabrics and Policy Based Access
CrowdStrike Extends AI Agent Security Across the SaaS Stack

CrowdStrike Extends AI Agent Security Across the SaaS Stack

Falcon Shield adds visibility and governance to OpenAI GPT-based agents – including those built with ChatGPT Enterprise and OpenAI Codex – expanding support for 175+ SaaS applications and the AI agent identities reshaping the modern attack surface
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This