The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Navigating the Changing Landscape of Partnerships in the Cybersecurity Industry

Navigating the Changing Landscape of Partnerships in the Cybersecurity Industry

Partnerships play a vital role in meeting customer demands and driving success for organisations. In a recent episode of the KBKast podcast, host Karissa Breen sat down with Raj Sharma, from Palo Alto Networks, to discuss the importance of strategic partnerships and the changing dynamics of the reseller ecosystem. From the rise of direct ...
The Growing Need for Company Board Directors and Non-Executive Directors to Play a Proactive Role in Cybersecurity

The Growing Need for Company Board Directors and Non-Executive Directors to Play a Proactive Role in Cybersecurity

Following a spate of high-profile cyber-attacks, the Federal Government has set a target for Australia to become the most cyber secure nation by 2030. However, according to Apple, Australia is one of the top four countries for cyber-attacks - behind the US, the UK and Canada. With the government playing an increasingly proactive, and prominent role in ...
Robust Physical Security Includes Strong Data Privacy 

Robust Physical Security Includes Strong Data Privacy 

Physical security and data privacy used to co-exist in parallel. But now physical security has evolved away from analogue technologies, towards modern digital infrastructure. At the same time, governments and citizens have become increasingly concerned about privacy implications.
Mergers and Acquisitions in the Cybersecurity Industry – Strategies for Success

Mergers and Acquisitions in the Cybersecurity Industry – Strategies for Success

Introduction Mergers and Acquisitions (M&A) play a pivotal role in shaping the landscape of the cybersecurity industry. In this article, we will delve into the dynamics of M&A within the cybersecurity sector, exploring both successful and unsuccessful instances. Additionally, we will provide insights for start-up and mid-market businesses ...
The New Ransomware Threat Targeting Global Institutions

The New Ransomware Threat Targeting Global Institutions

The British Library falls victim to Rhysida, a ransomware group employing a "double extortion" tactic. With global ambitions and sophisticated techniques, Rhysida poses a significant threat to institutions worldwide. The rise of ransomware payments and cybercriminal sophistication is cause for concern. Stay tuned for more on Rhysida in our upcoming ...
Future of Work Predictions 2024

Future of Work Predictions 2024

With 2024 around the corner, Sunny Bedi, CIO and CDO at Snowflake, has developed his future of work predictions for next year. Prediction: AI Will Be Your Best Work Buddy One of the most exciting ideas for workplace productivity is the deployment of AI assistants that help employees become — and continue to be — efficient and effective. For example, ...
A Human Centric Tech Revolution in 2024

A Human Centric Tech Revolution in 2024

With 2024 around the corner, renowned tech visionary, Ben Canning, SVP of Product Experiences at Smartsheet, has developed his predictions for 2024 focusing on empowering individuals, fostering collaboration, and harnessing the untapped potential of artificial intelligence. Work Needs to Revolve Around Humans, Not the Other Way Around Productivity ...
Businesses Need to Rewrite Their Identity Security Playbook for 2024

Businesses Need to Rewrite Their Identity Security Playbook for 2024

With 9 in 10 businesses having suffered an identity-related breach, identity security remains a critical component to strengthening businesses’ cybersecurity posture in 2024. Yet, 44% of businesses are still at the beginning of their identity journeys, with 60% of Asia-Pacific businesses still in the first stage of identity maturity. Especially now, as ...
No results found.

In the News

CrowdStrike and Meta Deliver New Benchmarks for the Evaluation of AI Performance in Cybersecurity

CrowdStrike and Meta Deliver New Benchmarks for the Evaluation of AI Performance in Cybersecurity

New benchmarks define how LLMs should be tested in the SOC – measuring real threats, workflows, and outcomes to help defenders
CrowdStrike Secures the Future of AI Across the Enterprise Ecosystem

CrowdStrike Secures the Future of AI Across the Enterprise Ecosystem

Only CrowdStrike delivers unified protection across the entire AI stack – from compute to cloud, data to models, and agents to applications – in partnership with the world’s AI leaders
NinjaOne Now Available for Purchase on the CrowdStrike Marketplace

NinjaOne Now Available for Purchase on the CrowdStrike Marketplace

CrowdStrike customers gain simplified access to NinjaOne to streamline IT and boost productivity
F5 to Acquire CalypsoAI to Bring Advanced AI Guardrails to Large Enterprises

F5 to Acquire CalypsoAI to Bring Advanced AI Guardrails to Large Enterprises

CalypsoAI's adaptive AI inference security solutions will enable companies to deliver AI apps more securely
Widespread Failure in Cloud Security Fundamentals Leaves Organisations Exposed, New Tenable Data Shows

Widespread Failure in Cloud Security Fundamentals Leaves Organisations Exposed, New Tenable Data Shows

Despite years of warnings, organisations are failing to master the fundamentals of cloud security, creating significant cyber exposure gaps. As they overwhelmingly adopt complex cloud and hybrid environments, a critical failure to manage identity-based threats and bridge the internal expertise gap is among the risks, leaving them dangerously exposed to ...
Smartsheet Names Ravi Soin as Chief Information Security Officer

Smartsheet Names Ravi Soin as Chief Information Security Officer

Seattle CIO of the Year Winner to lead IT and security to fuel market growth
Bitdefender Report: New APT Framework Targeting a Philippine Military Company

Bitdefender Report: New APT Framework Targeting a Philippine Military Company

This report analyses a sophisticated cyber-attack targeting a military company based in the Philippines, which led to the discovery of a new and advanced malware toolset. Based on the target's strategic value and the geopolitical context of the South China Sea, the attackers' tactics, techniques, and procedures (TTPs) are consistent with those of ...
JFrog Launches AI Catalog to Secure and Govern AI Model Delivery

JFrog Launches AI Catalog to Secure and Govern AI Model Delivery

New AI Catalog Extends the JFrog Platform to Discover, Govern, and Deploy AI Models, including the Open-Source NVIDIA Nemotron Models, with Speed, Security, and Compliance
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This