The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

The overlap between physical and digital security – how to get smart with compliance
Government reforms, such as the recent review of the Privacy Act that proposes significant changes to data is collected, stored, used and disposed of has put all organisations on notice. And while the focus often falls on personal identifiable information (PII), the scope of the current legislation and proposed changes impacts the collection of ...

Espionage Fuels Global Cyberattacks
In the past year cyberattacks have touched 120 countries, fueled by government-sponsored spying and with influence operations (IO) also rising.
Cybersecurity Incidents Are Now Full-Scale Crisis Management
Cybersecurity incidents have typically been viewed through a technical lens.

Research: A Deep Dive into Stream-Jacking Attacks on YouTube
Bitdefender has released new research highlighting a rapid increase in YouTube stream-jacking attacks.

Quality over Quantity: Algorithmic Transparency, accountability and Intellectual Property- A Call for Explainable AI
Our society is populated by artificial entities known as the programmable race. While their presence is often apparent, comprehension sometimes takes a back seat. They serve us in customer service roles, engage with us in video games, and inundate our personalised social media feeds. Today, they have even infiltrated our financial lives, using AI tools ...

How CIAM Platforms Improve Customer Privacy and Security
As consumers undertake a growing proportion of transactions online, awareness is increasing of the need to have both strong security and privacy protection-measures in place. Businesses that can tick these boxes will find it much easier to attract and retain customers.

Secure Code Warrior to Host 3rd Annual Devlympics Competition
Held during Cybersecurity Awareness Month, global tournament enables DevOps community to test their skills against vulnerabilities
Nozomi Networks Labs Discovers Flaws in Energy and Industrial Machinery Protection Systems
Nozomi Networks has identified three vulnerabilities on the Bently Nevada 3500 rack model manufactured by Baker Hughes, a company that develops and deploys technology solutions for energy and industrial companies.
No results found.
In The News
Nearly Half of Australian Companies Opt to Pay the Ransom, Sophos Report Finds
Australian median ransom demand is US$217,000; yet 52% of Australian companies negotiated a lower amount than the initial demand
Infoblox Recognised As A Great Place To Work In Australia
Infoblox recognised as a great place to work, where employees are treated fairly regardless of gender or sexual orientation by Great Place to Work.
BeyondTrust Signs Strategic Collaboration Agreement With AWS To Drive Secure Identities Across AWS Cloud
A deeper collaboration empowers joint customers to quickly accelerate secure cloud adoption and scale identity security across hybrid environments
BeyondTrust’s Pathfinder allows unified identity security and AI-driven protection aligned with AWS security best practices
Atlanta, GA – June 24, 2025 – BeyondTrust, the global leader in identity ...
Teradata Delivers Private AI Innovation In New Offering: Teradata AI Factory – Purpose-Built, On-Premises Product With NVIDIA Comes Ready-To-Run And Delivers Trustworthy AI With Predictable Pricing, Security, Governance, And Compliance
Teradata (NYSE: TDC) today announced the launch of Teradata AI Factory, an integrated solution that brings Teradata’s cloud-based AI/ML capabilities - including predictive, generative, and agentic AI – to secure, on-premises deployments.
AI Factory unifies critical components like data pipelines, algorithm execution, and software infrastructure into ...
Rapid7 Puts Agentic AI To Work In The SOC, Empowering Analysts To Investigate Smarter And Faster
Rapid7 has announced the integration of agentic AI workflows into its MDR services to support threat investigation processes within Security Operations Centres (SOCs). These AI-driven workflows autonomously handle foundational investigative tasks, enabling analysts to focus on more complex threats and strategic decision-making.
Palo Alto Networks’ State Of Generative AI Report Finds 890% Surge In Generative AI Traffic, Raising New Security Challenges For Asia-Pacific And Japan Enterprises
Palo Alto Networks, the world's leading AI cybersecurity company, released its State of Generative AI 2025 report, which reveals a staggering 890% surge in Generative AI (GenAI) traffic in 2024 driven by the rapid adoption of GenAI tools in enterprise environments. While AI growth offers significant productivity benefits, the report warns that ...
Excite Announces Contract Win With DOHA For $676,000
Excite Technology Services Limited has secured contracts with the Department of Home Affairs (DOHA) via its wholly owned subsidiary CBIT Pty Limited to deliver advanced IT software solutions that will enhance DOHA's national digital forensics and investigative capabilities.
Artificial Intelligence Is Making Cybercrime Quieter And Quicker: Fortinet Survey Reveals Up To Three Times Surge In Artificial Intelligence-Powered Threats Across Australia
Detection gaps widen as artificial intelligence-fuelled attacks reshape cybersecurity in the region
June 24, 2025 – Fortinet®, the global cybersecurity leader driving the convergence of networking and security, has announced the findings of a new IDC survey that reveals a sharp escalation in both the volume and sophistication of cyber threats ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
