The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How to protect against double-extortion ransomware attacks

How to protect against double-extortion ransomware attacks

Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
Insikt Report – Deepfakes : I Have No Mouth, And I Must Do Crime

Insikt Report – Deepfakes : I Have No Mouth, And I Must Do Crime

Intelligence company Recorded Future today released the findings of its latest deepfakes research. Titled “I Have No Mouth, And I Must Do Crime”, the report looks at how the spread of deepfake technologies, specifically through advancements in AI-based voice cloning, is pushing scams to a new level.
Shadow API Usage Surges 900%, Revealing Alarming Lack of API Visibility Among Enterprise

Shadow API Usage Surges 900%, Revealing Alarming Lack of API Visibility Among Enterprise

New Research Highlights APIs are Now a Leading Attack Vector, Posing New and Significant Threats to Organisation
Rethinking how to engage Australian directors in security budget discussions

Rethinking how to engage Australian directors in security budget discussions

Boards are still fractured when it comes to cybersecurity capability, skills and buy-in, but there are ways for CISOs to navigate this to keep their programs funded.
Rethinking how to engage Australian directors in security budget discussions

Rethinking how to engage Australian directors in security budget discussions

Boards are still fractured when it comes to cybersecurity capability, skills and buy-in, but there are ways for CISOs to navigate this to keep their programs funded.
New Research: Digital Trust Is Integral to Innovation and Resilience,  But Major Gaps Threaten Business Operations and Reputations

New Research: Digital Trust Is Integral to Innovation and Resilience, But Major Gaps Threaten Business Operations and Reputations

99 percent of respondents in ANZ say digital trust is important and 84 percent say its importance will increase in five years; but a lack of training (52 percent) and leadership buy-in (52 percent) jeopardise the value it can deliver.
Three-quarters of Australian organisations concerned about threats to 5G network and security of data in motion

Three-quarters of Australian organisations concerned about threats to 5G network and security of data in motion

Thales today released the local findings of its annual Data Threat Report 2023 which shows that new techniques such as double extortion as well as the expansion of 5G networks are two drivers increasing cyber and data threats for Aussie organisations.
Recorded Future’s Monthly CVE Report Records 2,200 Cyber Vulnerabilities for April, Microsoft Still Topping the List

Recorded Future’s Monthly CVE Report Records 2,200 Cyber Vulnerabilities for April, Microsoft Still Topping the List

Australian organisations should pay attention to 15 high risk vulnerabilities across Microsoft, Apple and Google. Some of the vulnerabilities in Apple and Microsoft are being used by the Nokoya ransomware group and likely nation-state actors.
No results found.

In The News

Elastic Wins Two 2025 Google Cloud Partner Of The Year Awards

Elastic Wins Two 2025 Google Cloud Partner Of The Year Awards

Elastic, the Search AI Company, announced today that it has received two 2025 Google Cloud Partner of the Year Awards in the Artificial Intelligence category for Data Management & AI and Tooling.    Elastic is being recognised for its achievements in the Google Cloud ecosystem, helping joint customers simplify the process of developing and ...
Elastic Delivers Performance Gains For Users Running Elasticsearch On Google Axion Processors

Elastic Delivers Performance Gains For Users Running Elasticsearch On Google Axion Processors

Benchmarking shows Elasticsearch runs up to 40% faster on Google Axion Processor C4A
Elastic Announces General Availability Of LLM Observability For Google Cloud’s Vertex AI

Elastic Announces General Availability Of LLM Observability For Google Cloud’s Vertex AI

SREs can now monitor, analyse and optimise the performance of AI deployments using models from Vertex AI
CyberArk Unveils First-Of-Its-Kind Machine Identity Security Solution To Secure Workloads Across Every Environment

CyberArk Unveils First-Of-Its-Kind Machine Identity Security Solution To Secure Workloads Across Every Environment

Platform delivers the industry's most comprehensive protection for all non-human identities that matter Combines the application of unique and universal identities to all workloads with secrets management, reducing machine identity complexity and risk New discovery capabilities to provide contextual understanding of workload identity risk
Ping Identity Doubles Down on Partner Strategy with New Partner Program and Advisory Board

Ping Identity Doubles Down on Partner Strategy with New Partner Program and Advisory Board

Ping’s partner-first investments reinforce commitment to delivering exceptional experiences for partners and customers
CyberArk Announces Identity Security Solution to Secure AI Agents At Scale

CyberArk Announces Identity Security Solution to Secure AI Agents At Scale

Millions of autonomous, unpredictable AI agents represent new, rapidly expanding identity security attack surface New CyberArk end-to-end solution will help secure AI agents' privileged access across entire environment Delivered through the CyberArk Identity Security Platform, securing all identities - human, machine, and AI - in one place.
Fastly Application Security Solutions Delivered 235% ROI Over Three Years

Fastly Application Security Solutions Delivered 235% ROI Over Three Years

Study shows Fastly provides enhanced security, improved user experiences, and significant cost savings
New WatchGuard Threat Lab Report Discovers 94% Increase in Network Malware as Cybercriminals Exploit Advanced, Encrypted Connections

New WatchGuard Threat Lab Report Discovers 94% Increase in Network Malware as Cybercriminals Exploit Advanced, Encrypted Connections

Other key findings show an increase in crypto miner detections, a spike in zero-day malware, a drop in endpoint malware, a rise in Linux-based threats, and more.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This