The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Haste Is Waste! Is Google’s Fear Of Missing Out Hurting The Holistic Development Of Artificial Intelligence (AI)

Haste Is Waste! Is Google’s Fear Of Missing Out Hurting The Holistic Development Of Artificial Intelligence (AI)

23 Feb 2023 6:00 AM   Dr Samar Fatima, Research Fellow, Enterprise AI and Data Analytics Hub  Topics: Google, Bard, AI, artificial intelligence, ChatGPT  “The race for search engine supremacy is getting fierce amongst tech giants with the release of Open AI’s ChatGPT instilling competitive fear in those bigger companies such as ...
How Businesses Are Faring With The Rise Of Cyber Threats: 15 Years In Review

How Businesses Are Faring With The Rise Of Cyber Threats: 15 Years In Review

The year 2022 has been dubbed the "year of the cyber plague" due to the occurrence of two of the worst breaches in Australian history happening within weeks of each other, with Optus and Medibank falling victim. These attacks are a testament to the severity of the havoc that cyber attacks can cause, which has been documented over the last 15 years by ...
Report: 2022 a breakthrough year in the development of malware targeting critical infrastructure

Report: 2022 a breakthrough year in the development of malware targeting critical infrastructure

Scaled ransomware attacks against manufacturing and geopolitical tensions brought increased attention to the industrial cyber threat landscape
The majority of business cyber security decisions are made without insight into the attacker, according to new Mandiant report

The majority of business cyber security decisions are made without insight into the attacker, according to new Mandiant report

Global survey of cyber security decision makers finds that while nearly all respondents are satisfied with the quality of their threat intelligence, nearly half struggle with effectively applying it
Qualys Expands Cloud Platform for Both Large Enterprises and Small/Medium Businesses Looking to Prioritise and Reduce Risk

Qualys Expands Cloud Platform for Both Large Enterprises and Small/Medium Businesses Looking to Prioritise and Reduce Risk

Introducing value-based, all-inclusive cybersecurity packages that include patch management and EDR to protect small and medium businesses from cyber threats
Why 2023 is the Year to Implement a Zero-Trust Strategy

Why 2023 is the Year to Implement a Zero-Trust Strategy

Ask a group of IT security professionals to give their opinion on zero trust and you’re likely to receive a range of different responses. Some see it as little more than the latest industry fad, while others consider it a ‘must have’ strategy that can aid the battle against cyberattacks.
How to establish a ‘security-aware’ business culture

How to establish a ‘security-aware’ business culture

When a business is seeking to improve its level of cybersecurity, attention tends to be placed on selecting the best possible tools and services. Comparative evaluations are conducted, and decisions made about what measures will deliver the best bang-for-buck.
ExtraHop Report Finds 79% of Australian IT Leaders Agree XDR is a Necessity Despite Confusion

ExtraHop Report Finds 79% of Australian IT Leaders Agree XDR is a Necessity Despite Confusion

New Research Highlights Uncertainty Around XDR Definition, Implementation and Resources Needed
No results found.

In The News

Elastic Delivers Performance Gains For Users Running Elasticsearch On Google Axion Processors

Elastic Delivers Performance Gains For Users Running Elasticsearch On Google Axion Processors

Benchmarking shows Elasticsearch runs up to 40% faster on Google Axion Processor C4A
Elastic Announces General Availability Of LLM Observability For Google Cloud’s Vertex AI

Elastic Announces General Availability Of LLM Observability For Google Cloud’s Vertex AI

SREs can now monitor, analyse and optimise the performance of AI deployments using models from Vertex AI
CyberArk Unveils First-Of-Its-Kind Machine Identity Security Solution To Secure Workloads Across Every Environment

CyberArk Unveils First-Of-Its-Kind Machine Identity Security Solution To Secure Workloads Across Every Environment

Platform delivers the industry's most comprehensive protection for all non-human identities that matter Combines the application of unique and universal identities to all workloads with secrets management, reducing machine identity complexity and risk New discovery capabilities to provide contextual understanding of workload identity risk
Ping Identity Doubles Down on Partner Strategy with New Partner Program and Advisory Board

Ping Identity Doubles Down on Partner Strategy with New Partner Program and Advisory Board

Ping’s partner-first investments reinforce commitment to delivering exceptional experiences for partners and customers
CyberArk Announces Identity Security Solution to Secure AI Agents At Scale

CyberArk Announces Identity Security Solution to Secure AI Agents At Scale

Millions of autonomous, unpredictable AI agents represent new, rapidly expanding identity security attack surface New CyberArk end-to-end solution will help secure AI agents' privileged access across entire environment Delivered through the CyberArk Identity Security Platform, securing all identities - human, machine, and AI - in one place.
Fastly Application Security Solutions Delivered 235% ROI Over Three Years

Fastly Application Security Solutions Delivered 235% ROI Over Three Years

Study shows Fastly provides enhanced security, improved user experiences, and significant cost savings
New WatchGuard Threat Lab Report Discovers 94% Increase in Network Malware as Cybercriminals Exploit Advanced, Encrypted Connections

New WatchGuard Threat Lab Report Discovers 94% Increase in Network Malware as Cybercriminals Exploit Advanced, Encrypted Connections

Other key findings show an increase in crypto miner detections, a spike in zero-day malware, a drop in endpoint malware, a rise in Linux-based threats, and more.
Akamai Announces App & API Protector Hybrid for Expanded WAF Defence

Akamai Announces App & API Protector Hybrid for Expanded WAF Defence

Hybrid solution delivers consistent, scalable security for applications and APIs across multicloud, on-premises, and CDN-agnostic infrastructures
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This