The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Critical Infrastructure and IoT

Critical Infrastructure and IoT

The term ‘critical infrastructure’ was first used to refer to public works such as transportation infrastructure and public utilities. The term includes sectors such as health care, energy & utilities, telecommunications, and most recently, an argument for various manufacturers – particularly germane is the example of Personal Protective Equipment ...
Data Centres and Digital Assets

Data Centres and Digital Assets

INTRODUCTION While the Internet of Things is rapidly gaining traction around the world, it's critical to remember one factor that is critical to the technology's existence and how, without it, the entire system could implode. Naturally, we’re referring to data. By 2025, it is anticipated that there will be over 65 billion active IoT devices ...
Navigating Unique Cybersecurity Challenges in North Africa

Navigating Unique Cybersecurity Challenges in North Africa

The realm of cybersecurity is constantly evolving, with new challenges emerging in various regions across the globe. North Africa, with its diverse political, economic, and cultural landscape, presents a set of unique cybersecurity challenges. In this article, we will explore these challenges, offering an in-depth analysis backed by reliable ...
PAM May Be the InfoSec Pressure Relief Valve Australia’s Finance Sector Needs

PAM May Be the InfoSec Pressure Relief Valve Australia’s Finance Sector Needs

Information security is a journey, but calls of, ‘Are we there yet?’ are getting louder and more frequent.
Solving the Skills Shortage by Looking Within

Solving the Skills Shortage by Looking Within

Of all the challenges currently facing Chief Information Security Officers (CISOs), one of the most significant is attracting and retaining new talent. This is because demand is far outstripping supply.
DigiCert Study: Preparing for a Safe Post-Quantum Computing Future in APAC

DigiCert Study: Preparing for a Safe Post-Quantum Computing Future in APAC

IT leaders in APAC are sounding the alarm about the need to invest now in quantum-safe transition planning; lack of clear ownership, budget or executive support are obstacles in path to preparation.
Four Steps Organisations Can Take to Improve Cybersecurity Awareness

Four Steps Organisations Can Take to Improve Cybersecurity Awareness

October is Cybersecurity Awareness Month, and there’s no better time for businesses to review and strengthen their online defences. In just the second half of 2022, there was a significant 26 per cent rise in notifiable data breaches, with 497 reported incidents, according to the Office of the Australian Information Commissioner (OAIC).
Five Common Challenges With Securing Cloud-based Applications

Five Common Challenges With Securing Cloud-based Applications

The number of cloud applications has grown in parallel with the high rate of cloud adoption among Australian businesses over the past couple of years.
No results found.

In the News

Check Point Acquires Lakera to Deliver End-to-End AI Security for Enterprises

Check Point Acquires Lakera to Deliver End-to-End AI Security for Enterprises

Together, Check Point and Lakera deliver one of the most advanced AI-native security platform, built to protect the full lifecycle of AI 
CrowdStrike and Salesforce Partner to Secure the Future of AI-Powered Business

CrowdStrike and Salesforce Partner to Secure the Future of AI-Powered Business

Integration of Falcon Shield with Salesforce Security Center and Charlotte AI with Agentforce delivers enhanced protection, visibility, and faster response for mission-critical AI agents, applications, and workflows
CrowdStrike Teams With NVIDIA to Build, Power, and Secure the Agentic Ecosystem

CrowdStrike Teams With NVIDIA to Build, Power, and Secure the Agentic Ecosystem

With Charlotte AI AgentWorks integrated with NVIDIA Nemotron models, analysts can build custom, no-code security agents; Falcon protects security and non-security agents across the AI ecosystem
CrowdStrike Unleashes the Agentic Security Workforce to Transform Security Operations

CrowdStrike Unleashes the Agentic Security Workforce to Transform Security Operations

CrowdStrike introduces new, mission-ready agents out of the box to automate high-impact workflows; Unveils Charlotte AI AgentWorks, the first no-code security agent development platform that enables teams to build, orchestrate, and scale AI agents securely
CrowdStrike to Acquire Pangea to Secure Every Layer of Enterprise AI

CrowdStrike to Acquire Pangea to Secure Every Layer of Enterprise AI

With AI prompt-layer protection for secure enterprise AI development and workforce usage, CrowdStrike will deliver the industry’s first complete AI Detection and Response (AIDR)
CrowdStrike Unveils the Falcon Platform Fall Release to Lead Cybersecurity Into the Agentic Era

CrowdStrike Unveils the Falcon Platform Fall Release to Lead Cybersecurity Into the Agentic Era

Revolutionizing the Falcon platform with the industry’s richest AI-ready data layer – the foundation for unifying human and agent-based security 
BeyondTrust Delivers Identity Security Controls for AI, Turning Agent Visibility Into Action

BeyondTrust Delivers Identity Security Controls for AI, Turning Agent Visibility Into Action

BeyondTrust delivers three powerful capabilities to Identity Security Insights® and BeyondTrust Pathfinder Platform customers today: AI Agent Insights, secure Model Context Protocol (MCP) orchestration, and an omnipresent AI decision-support layer; the first production-ready identity security controls for the new era of agentic AI
Cyber Security Predictions for 2026

Cyber Security Predictions for 2026

Among the key trends, Excite Cyber, CEO, Bryan Saba highlights new AI regulations, stronger governance over LLM development and predicts cyber risks will become encompassed in comprehensive enterprise-wide business risk registers and demand will surge for digital forensics training. Excite Cyber also anticipates that Australia will see rapid adoption ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This