The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Escalating Cyberattacks Puts Pressure On Marketers To Rethink Customer Data

Escalating Cyberattacks Puts Pressure On Marketers To Rethink Customer Data

With boards and organisations feeling the heat, is it time for marketers to analyse the customer information they really need and consider more innovative methods to connect with customers and prospects. One of the keys to building a successful sales funnel is understanding what your new and potential customers want. That means collecting and using ...
Softly, Softly: Why The Australian Cybersecurity Strategy Is A Missed Opportunity To Alter The Status Quo

Softly, Softly: Why The Australian Cybersecurity Strategy Is A Missed Opportunity To Alter The Status Quo

It’s fair to say that, for the past couple of years, we have seen regular changes to cybersecurity policy across most Western governments. The United States has been exceptionally proactive, spurred on by the fallout of large-scale cyber incidents like the Solar Winds supply chain attack, and the disruptive Colonial Pipeline cyberattack. And on our own ...
Separating Fact From Fiction: The Importance of Transparency in Cybersecurity

Separating Fact From Fiction: The Importance of Transparency in Cybersecurity

A closer look at our recent interview with Raj Samani, Senior Vice President, Chief Scientist from Rapid7.
The Unspoken Voice – CFOs Perspective On Security

The Unspoken Voice – CFOs Perspective On Security

The increasing and severe impact of cybersecurity risks on businesses. Short-term effects, like stock price declines after a cyberattack, are well-known, but the long-term consequences can be even more significant. Cyber incidents can lead to a loss of competitive advantage, reduced credit rating, and increased cyber insurance premiums. The financial ...
Cybersecurity Implications of Cryptocurrency and Blockchain Technology

Cybersecurity Implications of Cryptocurrency and Blockchain Technology

Introduction This essay explores the intricate relationship between cybersecurity and cryptocurrency, with a focus on the underlying blockchain technology. Cryptocurrencies, led by Bitcoin, have gained significant traction in recent years, revolutionising financial transactions. However, the decentralised and pseudonymous nature of cryptocurrencies, ...
Can Being “Compliant” Ever Top Being “Secure”?

Can Being “Compliant” Ever Top Being “Secure”?

My question is, who’s regularly assessing to make sure those locks aren’t being picked, that the alarms haven’t been disabled, and that the guards aren’t asleep?
A Look Inside a Cybercriminal Execution Chain

A Look Inside a Cybercriminal Execution Chain

During a cyber attack, the process of compromising a machine rarely involves a single step.
The Top Seven Tech and Cybersecurity Predictions To Watch Out For in 2024

The Top Seven Tech and Cybersecurity Predictions To Watch Out For in 2024

With the end of the year rapidly approaching, it’s time to make some educated predictions about what 2024 has in store when it comes to technology and cybersecurity.
No results found.

In The News

Elastic Recognised as a Leader in Security Analytics by Independent Research Firm

Elastic Recognised as a Leader in Security Analytics by Independent Research Firm

Sole participant among 17 vendors to achieve a perfect score in both the Real-World Protection and Malware Protection Tests
Fortinet Recognised As The Overall Leader For The Third Time In A Row In The Westlands Advisory IT/OT Network Protection Platform Navigator 2025™ report

Fortinet Recognised As The Overall Leader For The Third Time In A Row In The Westlands Advisory IT/OT Network Protection Platform Navigator 2025™ report

Fortinet earns top ranking in both strategic direction and capability 
AI on the Frontline: Australian Firms Back Innovation, Brace For New Cyber Threats

AI on the Frontline: Australian Firms Back Innovation, Brace For New Cyber Threats

New Trend Micro research reveals widespread AI adoption in cybersecurity strategies, but mounting concerns cyber risk exposure
Cloudflare Just Changed How AI Crawlers Scrape the Internet-at-Large; Permission-Based Approach Makes Way for A New Business Model 

Cloudflare Just Changed How AI Crawlers Scrape the Internet-at-Large; Permission-Based Approach Makes Way for A New Business Model 

Empowers leading publishers and AI companies to stop the scraping and use of original content without permission Sydney, July 2, 2025 – Cloudflare, Inc. (NYSE: NET), the leading connectivity cloud company, today announced it is now the first Internet infrastructure provider to block AI crawlers accessing content without permission or compensation, by ...
Exabeam Nova Delivers the First Cybersecurity Strategy Agent for SOC Leadership

Exabeam Nova Delivers the First Cybersecurity Strategy Agent for SOC Leadership

Agentic AI that breaks the cycle of reactive reporting by helping security leaders pinpoint gaps, tune their strategies, and justify investments
LevelBlue to Acquire Trustwave, Becoming Largest Pure-play Managed Security Services Provider

LevelBlue to Acquire Trustwave, Becoming Largest Pure-play Managed Security Services Provider

LevelBlue strengthens market-leading managed detection and response services with advanced artificial intelligence (AI) capabilities, while adding prestigious FedRAMP and StateRAMP authorisations 
F5 Introduces Post-Quantum Cryptography Solutions To Protect Customers From Emerging Threats

F5 Introduces Post-Quantum Cryptography Solutions To Protect Customers From Emerging Threats

Organisations require proactive PQC readiness strategies to safeguard assets, preserve customer trust, and uphold compliance mandates SYDNEY, Australia, July 1, 2025 – F5 (NASDAQ: FFIV), the global leader in delivering and securing every app and API, is helping customers prepare for the foundational cybersecurity shift presented by quantum computing. ...
Tenable Finds AI Workloads Driving New Cloud Security Challenges

Tenable Finds AI Workloads Driving New Cloud Security Challenges

Cloud AI workloads riskier than traditional with 70% containing critical vulnerabilities compared to 50% in non-AI workloads
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This