The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How CIAM Platforms Improve Customer Privacy and Security

How CIAM Platforms Improve Customer Privacy and Security

As consumers undertake a growing proportion of transactions online, awareness is increasing of the need to have both strong security and privacy protection-measures in place. Businesses that can tick these boxes will find it much easier to attract and retain customers.
Secure Code Warrior to Host 3rd Annual Devlympics Competition

Secure Code Warrior to Host 3rd Annual Devlympics Competition

Held during Cybersecurity Awareness Month, global tournament enables DevOps community to test their skills against vulnerabilities
Nozomi Networks Labs Discovers Flaws in Energy and Industrial Machinery Protection Systems

Nozomi Networks Labs Discovers Flaws in Energy and Industrial Machinery Protection Systems

Nozomi Networks has identified three vulnerabilities on the Bently Nevada 3500 rack model manufactured by Baker Hughes, a company that develops and deploys technology solutions for energy and industrial companies.
How Deep Is the Depth of the Deepfake?

How Deep Is the Depth of the Deepfake?

Use of deepfakes has risen dramatically over the last two years. We’ve witnessed celebrities push back over their likeness being used to mock or embarrass. But it doesn’t stop there.
It’s Been 12 Months Since the Optus Breach.  Now What?

It’s Been 12 Months Since the Optus Breach. Now What?

Optus, an Australian telecommunications company, experienced a cyberattack last year on September 22, 2022. One of the most prominent breaches in Australian history. As a result, customers had their personal information stolen and leaked on the dark web. Outrage from customers and businesses was rampant across social media, in the media and of course ...
Why a Supportive Security Culture Will Bolster Disaster Recovery Efforts During a Cyberattack

Why a Supportive Security Culture Will Bolster Disaster Recovery Efforts During a Cyberattack

In today's complex and fast-moving threat landscape, cybercriminals continuously adapt their tactics to breach systems and gain access to sensitive data.
How Purpose-built Database Security Solutions Ensure Vulnerabilities Aren’t Overlooked

How Purpose-built Database Security Solutions Ensure Vulnerabilities Aren’t Overlooked

The perimeters of technological defences are shifting, and—in some cases—disappearing altogether.
IT Trends Report 2023: Observability Advances Automation and Empowers Innovation, yet Adoption Still in Early Stages

IT Trends Report 2023: Observability Advances Automation and Empowers Innovation, yet Adoption Still in Early Stages

SolarWinds, the leading provider in software management solutions and observability serving 96% of the Fortune 500, has released its 10th annual IT Trends Report, detailing the impact observability solutions have on navigating challenges from digital transformation, moving to the cloud and remote work—both within the IT department and beyond.
No results found.

In the News

SailPoint and HCLTech Forge Partnership to Deliver Modern Identity Security at Enterprise Scale in the Age of AI

SailPoint and HCLTech Forge Partnership to Deliver Modern Identity Security at Enterprise Scale in the Age of AI

HCLTech named a SailPoint Global Delivery Admiral Partner for deep domain expertise, proven delivery methods, and commitment to governance, compliance and security excellence
Claroty Named to Forbes Cloud 100 for Fourth Consecutive Year

Claroty Named to Forbes Cloud 100 for Fourth Consecutive Year

Claroty, the world’s leading cybersecurity company for cyber-physical systems (CPS) protection, has been listed on the Forbes 2025 Cloud 100 for the fourth consecutive year.
Backing Local, Securing National: Minister Opens New Cube Cyber Cybersecurity Operations Centre in Queensland

Backing Local, Securing National: Minister Opens New Cube Cyber Cybersecurity Operations Centre in Queensland

Brisbane, 5 September 2025 - In a significant step forward for sovereign cyber defence, The Hon. Steven Minnikin MP, Minister for Customer Services and Open Data and Minister for Small and Family Business, has officially opened Queensland headquartered Cube Cyber’s new Security Operations Centre (SOC) in Brisbane. The Cube Cyber centre represents a ...
Boomi Enterprise Platform Delivered 347% ROI and $9.8M NPV, According to New Independent TEI Study

Boomi Enterprise Platform Delivered 347% ROI and $9.8M NPV, According to New Independent TEI Study

SYDNEY, AUSTRALIA – Sept. 5, 2025 – Boomi™, the leader in AI-driven automation, today announced the results of a new Total Economic Impact™ (TEI) study conducted by Forrester Consulting. The study found that organisations using the Boomi Enterprise Platform achieved a 347 per cent return on investment (ROI) and a net present value (NPV) of $9.8 million ...
Claroty Named a Leader in IoT Security by Leading Independent Research Firm

Claroty Named a Leader in IoT Security by Leading Independent Research Firm

New analyst report gives Claroty highest score possible across 10 current offering and strategy criteria
Check Point Software Technologies Appoints Brett Theiss as Chief Marketing Officer to Drive Global Brand and Growth Strategy

Check Point Software Technologies Appoints Brett Theiss as Chief Marketing Officer to Drive Global Brand and Growth Strategy

Redwood City, CA – September 2, 2025 – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced the appointment of Brett Theiss as Chief Marketing Officer (CMO). As CMO, Theiss will shape and accelerate Check Point’s global growth agenda, strengthening brand presence, fuelling ...
Threat Spotlight: Tycoon Phishing Kit Reveals New Techniques to Hide Malicious Links

Threat Spotlight: Tycoon Phishing Kit Reveals New Techniques to Hide Malicious Links

SYDNEY, Australia – 4 September 2025 – Barracuda threat analysts have published a report on the latest techniques being used by the Tycoon phishing-as-a-service (PhaaS) kit to hide malicious links in emails. The techniques are designed to obscure, muddle and disrupt the structure of links, or URLs, with the aim of confusing automated detection systems ...
Veeam Launches Its First Fully Preconfigured, Software-only Appliance

Veeam Launches Its First Fully Preconfigured, Software-only Appliance

Veeam® Software, the #1 global leader by market share in Data Resilience, today announced the availability of its first fully pre-built, pre-hardened software appliance: the new Veeam Software Appliance. Built to give IT teams instant protection without complexity, the appliance eliminates the friction of manual setup, OS patching, and Windows ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This