The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Investigating Worldwide SMS Scams, and Tens of Millions of Dollars in Fraud

Investigating Worldwide SMS Scams, and Tens of Millions of Dollars in Fraud

SMS services remain a critical part of telecommunications; they don't require Internet access, and companies use them to inform their customers. This combination of features makes them incredibly useful for criminals who use the technology as a stepping stone in their never-ending campaigns. And if you think that the new RCS messaging standard will ...
Data Privacy Week – Taking Control of Data

Data Privacy Week – Taking Control of Data

Jason du Preez, Vice President of Privacy and Security at Informatica, comments on why the companies that collect our data have the power and the responsibility to take control of data and use it for the common good.
Over Half Of Privacy Pros – 56 Percent In Oceania – Expecting Reduced Budgets In 2024, Sparking Concerns

Over Half Of Privacy Pros – 56 Percent In Oceania – Expecting Reduced Budgets In 2024, Sparking Concerns

Jo Stewart-Rattray: “It is paramount that organisations understand what is expected of them in order to devise an effective privacy policy and implement accordingly. Then will they be able to realise the benefits of embedding privacy practices in digital transformation from the outset, including customer loyalty, reputational and financial performance.”
People Are An Essential Element In Your Cybersecurity Incident Response Plan

People Are An Essential Element In Your Cybersecurity Incident Response Plan

Introduction While threat actors lean heavily on technology to execute cyber-attacks, much of their focus is on exploiting individuals. Focused on exfiltrating data and stealing money, criminals manipulate people through deception. Developing a security culture that helps people identify potential threats and encourages behaviours that decrease ...
Navigating Critical Infrastructure Cybersecurity: Your Business Imperative

Navigating Critical Infrastructure Cybersecurity: Your Business Imperative

The severe consequences of recent high-profile breaches, particularly among critical infrastructure industries, demonstrate the clear imperative for enterprises to fortify both their critical infrastructure systems and their cybersecurity posture. Today, almost every business deploys software, which means cyber risk is business risk.  However, many ...
Ransomware Attacks: No Sector is Safe

Ransomware Attacks: No Sector is Safe

Ransomware attacks have been spreading like wildfire, infiltrating various sectors and leaving devastation in their wake. While industries like finance, critical infrastructure, and healthcare have long been the prime targets, a recent study reveals that the arts, entertainment, and recreation industry is not immune to these cyber threats. In this ...
Prioritising Data Protection: A Conversation with Rad Kanapathipillai on KBKast

Prioritising Data Protection: A Conversation with Rad Kanapathipillai on KBKast

Introduction In a recent episode of KBKast, Host Karissa Breen engaged in an interview with Rad Kanapathipillai, who works in the field of data protection. The episode delved deep into the critical importance of safeguarding sensitive data across all stages of development, shedding light on the challenges organisations face and the strategies needed ...
Australia Sanctions Russian Hacker

Australia Sanctions Russian Hacker

Australia has boldly stepped into the cyber battlefield, wielding its autonomous cyber sanctions framework as a weapon against cybercrime. This decisive move came after a Russian individual, Aleksandr Ermakov, was implicated in the cyberattack on Medibank Private, one of the country's largest healthcare networks. The sanctions, a first of their kind to ...
No results found.

In The News

KnowBe4 Defines a Holistic Approach to Human Risk Management

KnowBe4 Defines a Holistic Approach to Human Risk Management

KnowBe’s new HRM framework guides organisations to transform employees into an active layer of defence through data-driven insights, cultural understanding and targeted interventions
Cohesity Appoints Greg Statton as Chief Technology Officer, Asia Pacific and Japan

Cohesity Appoints Greg Statton as Chief Technology Officer, Asia Pacific and Japan

SYDNEY – September 10 2025 – Cohesity, a leader in AI-powered data security, today announced the appointment of Greg Statton as Chief Technology Officer for the Asia Pacific and Japan (APJ) region. In this newly created role, Statton will lead technology strategy and innovation initiatives across APJ, supporting Cohesity’s mission to deliver ...
Secure Code Warrior Expands Commitment to Secure by Design Best Practices with Free Secure Code Video Series for Developers

Secure Code Warrior Expands Commitment to Secure by Design Best Practices with Free Secure Code Video Series for Developers

Launch of new 12-week video series on AI/LLM security empowers developers to safely adopt AI coding and mitigate emerging security risks 
Exabeam Extends Proven Insider Threat Detection to AI Agents with Google Cloud

Exabeam Extends Proven Insider Threat Detection to AI Agents with Google Cloud

Exabeam unlocks visibility into AI agent behaviour to detect intent, drift, and compromise where legacy tools fail
Tenable Patch Tuesday Commentary

Tenable Patch Tuesday Commentary

This month’s Patch Tuesday release highlights an emerging trend. For the third time this year, Microsoft patched more elevation of privilege vulnerabilities than remote code execution flaws. Nearly 50% (47.5%) of all bugs this month are privilege escalation vulnerabilities. One of the more interesting vulnerabilities patched this month is ...
Cisco and Splunk elevate the SOC with Agentic AI

Cisco and Splunk elevate the SOC with Agentic AI

Cisco today introduced Splunk Enterprise Security Essentials Edition and Splunk Enterprise Security Premier Edition, providing customers two agentic AI-powered SecOps options that unify security workflows across threat detection, investigation, and response (TDIR). Delivered within Splunk Enterprise Security 8.2 – a market-leading SIEM solution – these ...
Databricks Surpasses $4B Revenue Run-Rate, Exceeding $1B AI Revenue Run-Rate

Databricks Surpasses $4B Revenue Run-Rate, Exceeding $1B AI Revenue Run-Rate

SYDNEY, Australia — September 9, 2025 — Databricks, the Data and AI company, today announced it has crossed a $4 billion revenue run-rate during Q2, growing >50% year over year. Databricks’ AI products also recently crossed a $1 billion revenue run-rate. The company has also achieved positive free cash flow over the last 12 months. Finally, the ...
Singapore Tops Global AI Security Readiness, Yet Fears Shadow AI the Most

Singapore Tops Global AI Security Readiness, Yet Fears Shadow AI the Most

New Delinea research finds 62% of Singaporean firms grapple with Shadow AI at least monthly - fueling the highest global level of concern among business leaders 
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This