The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

IT-OT Convergence: What Happens When Two Worlds Collide?
Most people thought that cybersecurity is all about data breaches, suspicious links, or adversaries trying to get access to your accounts. But in recent years, the space has gone beyond computers and firewalls. Today, cybersecurity also means keeping the power on, the water safe, and hospitals operational.
Recently on the DevSecOops podcast, hosts ...

Hygiene is Hard: Why Even Security-Conscious Organisations Still Fall at the First Hurdle
Simply put, organisations need to move beyond reactive threat hunt engagements to proactive identity security and zero trust and statistics show this is one of the biggest gaps in our environments today that need attention

The Next Scammer’s Paradise
The email looks real. It sounds like your boss. Thinking it might be urgent, you click the link included therein. And just like that, it’s over.
This is the new face of cybercrime. Powered by AI, cybercrime no longer requires technical prowess nor heavy coding. All you need is the right tool and the appropriate prompt; something that can scrape ...

The PIN That Wasn’t Yours
Fintech gift card system flaw may have allowed quiet cashouts. Signs point to possible exploitation months before it was discovered.

It’s Time to Hack the Hackers
Introduction
Cybercrime in Australia is rising rapidly. From the major breachers that held headlines hostage for months, to government agencies and critical infrastructure being targeted, cyberattacks continue to hit hard and fast.
In the last few months alone, a major Australian university appears to have fallen victim to a ransomware attack, a ...

Resilience Comes from Knowing What to Prioritise
As cyber threats and disruptions grow, organisations must make data resilience a core component of their IT strategy to ensure business continuity and safeguard critical data.

Shadow AI Is The Blind Spot No Australian Board Can Ignore
Australia’s corporate leaders are sleepwalking into a technology blind spot that will cost them dearly. Shadow AI is already entrenched in workplaces, and boards that treat it as a side issue are making the same mistake they made a decade ago with shadow IT and cloud adoption. Back then, companies allowed employees to use unapproved cloud apps because ...

Scam Awareness Week Shines a Light On the Collective Effort Needed to Fight Scams
Collaborative action from individuals, businesses and the government is more important than ever, as scams become more sophisticated.
No results found.
In The News
VAST Data Partners with Google Cloud to Enable Enterprise AI at Scale Across Hybrid Cloud Environments
VAST Data today announced an expanded partnership with Google Cloud, enabling customers to deploy the VAST AI Operating System (AI OS) as a fully managed service and extend a unified global namespace across hybrid environments. Powered by the VAST DataSpace, enterprises can seamlessly connect clusters running in Google Cloud and on-premises locations, ...
Datadog Launches Storage Management to Help Teams Eliminate Unnecessary Cloud Object Storage
New product delivers granular visibility, proactive anomaly detection and targeted recommendations to optimise cloud object storage costs
Cybertify Secures Arni Hardarson as Head of Offensive Security Bolstering Elite Cyber Squad
Fast-growth elite cyber squad Cybertify has announced the appointment of Mr Arni Hardarson, one of Australia's most senior cybersecurity leaders and an internationally recognised industry icon, as Head of Offensive Security.
Bitdefender Launches GravityZone Security Data Lake Transforming How Security Telemetry Is Collected, Analysed, and Applied in Modern Businesses
Bitdefender has announced Bitdefender GravityZone Security Data Lake and Data Lake for Managed Detection and Response (MDR), solutions that help organisations cut through alert overload and complexity by unifying security telemetry from multiple tools into a single, intelligent platform. The new offering simplifies security operations with advanced ...
AI’s Risk vs Reward: Cisco & Governance Institute Urge Risk Leaders to Help Unlock Australia’s AI Potential
AI’s Risk vs Reward: Cisco & Governance Institute Urge Risk Leaders to Help Unlock Australia’s AI Potential | A new Cisco and Governance Institute report highlights Chief Risk Officers as catalysts for unlocking AI’s potential through safe, secure and strategic adoption | Reveals four critical roadblocks stalling AI adoption: ethical and reputational, ...
Fortinet Launches Secure AI Data Centre Solution to Protect Models, Data, and Infrastructure at Scale
Featuring new ASIC-powered FortiGate 3800G and enhanced data and threat protection for large language models, Fortinet delivers the industry’s first end-to-end security framework for AI data centres
Ping Identity Launches ‘Identity for AI’ Solution to Power Innovation and Trust in the Agent Economy
Helping enterprises close the AI trust gap through identity-first accountability.
VAST Data Secures Commercial Partnership Deal with CoreWeave for US$1.17 Billion to Power the Next Generation of AI
VAST Data today announced it has signed a commercial agreement valued at US$1.17 billion with CoreWeave. The expanded partnership reinforces CoreWeave’s long-standing commitment to the VAST AI OS as its primary data foundation, solidifying VAST as a key component of CoreWeave’s AI cloud.
Powered by the VAST AI OS, CoreWeave’s infrastructure delivers ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
