The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Benefits of AI-Tools for Software Developers Tempered by Security Shortcomings
Since it first appeared late last year, ChatGPT has quickly built an extensive user base keen to put the evolving tool through its paces.

Why Banks are Increasingly Turning to External IT Security Resources
Thwarting cyberattacks is a key task for any CIO in the banking industry, however it’s not the only security-related challenge keeping them awake at night.

Flashpoint Report Shows Australia Among Most Targeted Countries for Ransomware Attacks in July
Flashpoint has published its July Cyber Threat Intelligence Index which shows Australia was in the top 10 countries for ransomware attacks last month.

Cloudflare Harnesses the Power of its Global Network to Identify Top Exploited Phishing Methods and Most Impersonated Brands in Inaugural Report
Report underscores that email is the most exploited threat vector, Phishing remains borderless and attackers are increasingly impersonating trusted name brands

Achieving a Robust Zero Trust Environment
The concept of a Zero Trust infrastructure is now broadly understood across most industry sectors, but what’s less clear is the path organisations need to follow to get there.

How Businesses Today can Prevent Advanced Cyber Threats
In recent years workforces have become increasingly mobile, with employees using laptops at home, airports, cafes etc. Then, with the onset of COVID-19, the number of people accessing corporate resources from devices outside the corporate network increased enormously.

Tenable CEO and Chairman calls out Microsoft for unacceptable cybersecurity practices
In a recent article, Amit Yoran, the Chairman and CEO of Tenable, criticised Microsoft for its cybersecurity practices. He mentioned that Senator Ron Wyden had written to various government agencies, urging them to hold Microsoft accountable for negligent cybersecurity practices that have allowed Chinese espionage against the US government. Data from ...

Doing more with less: the three key focus areas for cybersecurity
In an ever-evolving cybersecurity landscape, organisations face the daunting challenge of effectively managing their security initiatives. This responsibility falls not only on the IT teams, but also on the board of directors, who play a critical role in overseeing the organisation's cybersecurity strategy.
No results found.
In The News
BeyondTrust Signs Strategic Collaboration Agreement With AWS To Drive Secure Identities Across AWS Cloud
A deeper collaboration empowers joint customers to quickly accelerate secure cloud adoption and scale identity security across hybrid environments
BeyondTrust’s Pathfinder allows unified identity security and AI-driven protection aligned with AWS security best practices
Atlanta, GA – June 24, 2025 – BeyondTrust, the global leader in identity ...
Teradata Delivers Private AI Innovation In New Offering: Teradata AI Factory – Purpose-Built, On-Premises Product With NVIDIA Comes Ready-To-Run And Delivers Trustworthy AI With Predictable Pricing, Security, Governance, And Compliance
Teradata (NYSE: TDC) today announced the launch of Teradata AI Factory, an integrated solution that brings Teradata’s cloud-based AI/ML capabilities - including predictive, generative, and agentic AI – to secure, on-premises deployments.
AI Factory unifies critical components like data pipelines, algorithm execution, and software infrastructure into ...
Rapid7 Puts Agentic AI To Work In The SOC, Empowering Analysts To Investigate Smarter And Faster
Rapid7 has announced the integration of agentic AI workflows into its MDR services to support threat investigation processes within Security Operations Centres (SOCs). These AI-driven workflows autonomously handle foundational investigative tasks, enabling analysts to focus on more complex threats and strategic decision-making.
Palo Alto Networks’ State Of Generative AI Report Finds 890% Surge In Generative AI Traffic, Raising New Security Challenges For Asia-Pacific And Japan Enterprises
Palo Alto Networks, the world's leading AI cybersecurity company, released its State of Generative AI 2025 report, which reveals a staggering 890% surge in Generative AI (GenAI) traffic in 2024 driven by the rapid adoption of GenAI tools in enterprise environments. While AI growth offers significant productivity benefits, the report warns that ...
Excite Announces Contract Win With DOHA For $676,000
Excite Technology Services Limited has secured contracts with the Department of Home Affairs (DOHA) via its wholly owned subsidiary CBIT Pty Limited to deliver advanced IT software solutions that will enhance DOHA's national digital forensics and investigative capabilities.
Artificial Intelligence Is Making Cybercrime Quieter And Quicker: Fortinet Survey Reveals Up To Three Times Surge In Artificial Intelligence-Powered Threats Across Australia
Detection gaps widen as artificial intelligence-fuelled attacks reshape cybersecurity in the region
June 24, 2025 – Fortinet®, the global cybersecurity leader driving the convergence of networking and security, has announced the findings of a new IDC survey that reveals a sharp escalation in both the volume and sophistication of cyber threats ...
Darktrace Bolsters APJ Senior Leadership Team With Promotion Of Abhi Abhyankar To Head Of Partnerships, Alliances & Channel
Darktrace, a global leader in AI for cybersecurity, is pleased to announce the promotion of Abhi Abhyankar (Abhi) to Head of Partnerships, Alliances & Channels for the Asia-Pacific and Japan region (APJ).
Based in Sydney, Australia, Abhi will spearhead the expansion of Darktrace’s partner ecosystem to grow lasting relationships with its partners ...
New Research Finds 51% Of Spam Emails Are Now Generated Through AI, Not Humans
Half the spam in your inbox is generated by AI – its use in advanced attacks is at an earlier stage
Cyber attackers are leveraging the power of AI to boost their chances of success in email-based attacks. AI tools can help them to develop and launch more attacks, more frequently, and to make these attacks more evasive, convincing and targeted. But to ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
