The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

5 Reasons Why You Shouldn’t Just Build the Solution
For most teams, the default mode is execution mode: build and deliver as soon as possible. However, when we are building something new, this way of operating can potentially lead to wasted time and missed opportunities. It is essential to get into exploration mode first and understand the problem in-depth before building a new solution.

From fluff to facts: how you can measure innovation
Innovation is a term that gets thrown around a lot, but what does it really mean? For me, innovation is implementing new ideas that bring value to people. You don't have to be a creative genius to be innovative - It's all about the context. What might be ordinary for startups could be groundbreaking for established corporations. Implementing these ...

3 Subtle Indicators of Major Innovation Blockers
Throughout my career, I've had the incredible opportunity to dive headfirst into many innovation projects. They ranged from strategic innovation projects to customer experience improvements, and from exploring new ways of working to executing human-centred automation solutions.

3 Ways to Get Everyone Onboard the Innovation Train
When it comes to innovation and introducing change in an organisation, some people instantly embrace the journey while others resist it.

Is Australia set to follow the UK, for banking liabilities?
As the digital world continues to dominate the banking industry, concerns about data security and privacy are coming to the forefront. As algorithms become more advanced, building a profile based on users data, and identifying abnormal transactions that could indicate fraudulent activity. This has led to concerns about privacy, as individuals feel like ...

I Have Been Attacked by Ransomware. What Should I Do Now?
Retro Blockbuster Plot: Sometime in the 1980s – a filthy rich industrialist – his beautiful daughter – a constant target for kidnappers – always accompanied by bodyguards – one fateful day – kidnapping succeeds – hefty ransom asked – her big strong bloke comes to rescue – happy ending!Nah!! Kidnappers today have become very tech-savvy and, if I might ...

66% of Malware is Delivered Through PDFs, New Report from Palo Alto Networks Unit 42 Finds
Vulnerabilities continue to be a popular method for threat actors to infect victims, with exploit attempts of vulnerabilities increasing by 55% in the past year

How Safe are bit.ly (or Tiny URL) Links?
What are shortened or tiny URLs?In the world of shortcuts, how could URLs stay behind. With domain names getting stranger and web links getting obnoxiously longer, tiny URLs come to the rescue. These are like capsule covers that make medicines easy to digest. Usually web addresses are attached with a lot of information (called query string) that helps ...
No results found.
In The News
Google Cloud Expands Risk Protection Program to Australia Amid Rising Cyber Threats and Insurance Pressures
Google Cloud today announced the expansion of its Risk Protection Program (RPP) to the Australian market, providing local organisations with a streamlined path to cyber insurance that reflects their real-time security posture. The move comes as Australian companies face rising cyber risks, stricter regulatory standards, and mounting insurance ...
SecurityBridge Teams Up With Microsoft To Enhance SAP Security With Microsoft Sentinel
SAP systems are integral to many organizations, managing critical business processes and sensitive data. However, protecting these systems against cyber threats has traditionally been challenging due to their complexity and the specialized nature of SAP applications.
Elastic Brings Enterprise Data to NVIDIA AI Factories
Elasticsearch integrates with NVIDIA Enterprise AI Factory validated design to fuel AI agents and generative AI applications with real-time intelligence
SecurityBridge to Showcase AI-Powered CVA and Microsoft Sentinel Integration at SAP Sapphire 2025
SecurityBridge will be exhibiting at booth #414, demonstrating the latest innovations in SAP cybersecurity, including its newly released AI-powered Code Vulnerability Analyzer (CVA) and enhanced integration with Microsoft Sentinel.
Elastic Announces General Availability of Elastic Cloud Serverless on Google Cloud Marketplace
Developers building observability, security, and search applications benefit from uncompromised speed and scale
NVIDIA Enterprise AI Factory Integrates CrowdStrike’s Falcon Platform Into Validated Design Architecture
CrowdStrike delivers end-to-end protection for enterprise AI factories built with NVIDIA Enterprise AI Factory validated design architecture
Tenable Powers AI-Driven Exposure Management with Third-Party Data Connectors and Unified Dashboards
Tenable One bridges siloed security tools for faster, smarter, business-aligned security decisions
Cisco Study Reveals Alarming Deficiencies In Security Readiness
Cybersecurity readiness remains alarmingly low as only 3 percent of organisations in Australia have achieved a mature level of readiness.
Organisations continue to struggle with the complexities introduced by AI, with 82% having experienced AI-related security incidents in the last year.
The ongoing shortage of skilled cybersecurity professionals ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
