The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Social Responsibility of Data Security

The Social Responsibility of Data Security

Data breaches have become a common occurrence in our modern world. Unfortunately, many companies and individuals still don't take data security seriously. While most people recognize that a data breach could lead to financial loss, the potential consequences go far beyond dollars and cents. Data breaches can affect real people, including friends, ...
Soczilla Roadshow Launches in Australia and New Zealand

Soczilla Roadshow Launches in Australia and New Zealand

Recently, Palo Alto Networks launched their Cortex XSIAM platform across Australia and New Zealand. I attended to learn first hand about their capability at the place of the launch event, Palace Central in Sydney. The event kicked off with some drinks and entertainment followed by the session which was in a theatre lead by various members of the ...
BeyondTrust Releases Cybersecurity Predictions for 2024 and Beyond

BeyondTrust Releases Cybersecurity Predictions for 2024 and Beyond

BeyondTrust experts forecast future threat vectors most likely to affect organizsations worldwide in the New Year. Top cybersecurity threats include the evolution of the AI threat, Exploit mapping for ransomware, and the death of dedicated apps.
The Security Threat Posed by ‘Zombie’ APIs

The Security Threat Posed by ‘Zombie’ APIs

Zombies have been a mainstay of the horror movie genre for many years, both delighting and terrifying loyal fans. However, while they might be appreciated on the big screen, they’re much less welcome when it comes to the security of application programming interfaces (APIs). The challenge of ‘zombie APIs’ was highlighted in the recent State of API ...
AUKUS: Transforming Security Through Technology Sharing and Cybersecurity

AUKUS: Transforming Security Through Technology Sharing and Cybersecurity

The realm of international security is constantly evolving, and strategic alliances play a crucial role in shaping the defence landscape. A notable addition to this landscape is the AUKUS partnership, an innovative trilateral security alliance between Australia, the United Kingdom, and the United States.
Critical Infrastructure and IoT

Critical Infrastructure and IoT

The term ‘critical infrastructure’ was first used to refer to public works such as transportation infrastructure and public utilities. The term includes sectors such as health care, energy & utilities, telecommunications, and most recently, an argument for various manufacturers – particularly germane is the example of Personal Protective Equipment ...
Data Centres and Digital Assets

Data Centres and Digital Assets

INTRODUCTION While the Internet of Things is rapidly gaining traction around the world, it's critical to remember one factor that is critical to the technology's existence and how, without it, the entire system could implode. Naturally, we’re referring to data. By 2025, it is anticipated that there will be over 65 billion active IoT devices ...
Navigating Unique Cybersecurity Challenges in North Africa

Navigating Unique Cybersecurity Challenges in North Africa

The realm of cybersecurity is constantly evolving, with new challenges emerging in various regions across the globe. North Africa, with its diverse political, economic, and cultural landscape, presents a set of unique cybersecurity challenges. In this article, we will explore these challenges, offering an in-depth analysis backed by reliable ...
No results found.

In The News

Trustwave Launches Managed Phishing for Microsoft Service to Strengthen Microsoft 365 Email Security

Trustwave Launches Managed Phishing for Microsoft Service to Strengthen Microsoft 365 Email Security

July 15, 2025 – Trustwave, a global cybersecurity and managed security services leader, has announced the launch of Managed Phishing for Microsoft, an advanced service designed to help organisations using Microsoft Office 365 and Defender for Office proactively defend against the evolving threat of phishing attacks. Phishing remains the most ...
Check Point Software Technologies Named a Leader in Zero Trust Platforms, Q3 2025 Evaluation

Check Point Software Technologies Named a Leader in Zero Trust Platforms, Q3 2025 Evaluation

Check Point’s Hybrid Mesh Security Platform recognised for plan to deliver AI-driven capabilities to automate network security functions
Kyndryl Partners with Microsoft to Launch the Kyndryl Microsoft Acceleration Hub to Drive Customer Innovation and Digital Transformation

Kyndryl Partners with Microsoft to Launch the Kyndryl Microsoft Acceleration Hub to Drive Customer Innovation and Digital Transformation

New Hub combines Kyndryl Consult expertise with Microsoft technologies to enable AI-first consulting capabilities and engagements
Semperis 2025 Purple Knight Report Reveals Persistent Security Gaps in Hybrid Active Directory and Entra ID Environments

Semperis 2025 Purple Knight Report Reveals Persistent Security Gaps in Hybrid Active Directory and Entra ID Environments

2025 Purple Knight Report Reveals Persistent Security Gaps in Hybrid Active Directory and Entra ID Environments The new report uncovers identity security risks, low initial assessment scores, and urgent need for remediation across Active Directory, Entra ID, and Okta—but substantial score improvements for users applying Purple Knight’s expert ...
Crypto Wallets Continue to be Drained in Elaborate Social Media Scam

Crypto Wallets Continue to be Drained in Elaborate Social Media Scam

Overview Continued research by Darktrace has revealed that cryptocurrency users are being targeted by threat actors in an elaborate social engineering scheme that continues to evolve. In December 2024, Cado Security Labs detailed a campaign targeting Web 3 employees in the Meeten campaign. The campaign included threat actors setting up meeting ...
Latest DigiCert Survey Finds Manual Processes Expose Organisations to Outages, Compliance Failures, and Six-Figure Losses as Certificate Volumes Climb

Latest DigiCert Survey Finds Manual Processes Expose Organisations to Outages, Compliance Failures, and Six-Figure Losses as Certificate Volumes Climb

Research highlights certificate mismanagement is draining enterprise resources and eroding digital trust
Operational Technology Cybersecurity Risk Elevates Within Executive Leadership Ranks

Operational Technology Cybersecurity Risk Elevates Within Executive Leadership Ranks

More than half (52 per cent) of organisations report that the chief information security officer/chief security officer is responsible for operational technology, up from 16 per cent in 2022, while 95 per cent of organisations report that the C-suite is responsible for operational technology, up from 41 per cent in 2022 
Bitdefender Forges Partnership With Creators Guild of America

Bitdefender Forges Partnership With Creators Guild of America

Bitdefender has announced a strategic partnership with the Creators Guild of America to provide digital security solutions tailored for online content creators. The partnership aims to raise awareness of the critical need for creators to protect their digital identities, content, and personal information from increasingly sophisticated and costly cyber ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This