The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

3 Subtle Indicators of Major Innovation Blockers

3 Subtle Indicators of Major Innovation Blockers

Throughout my career, I've had the incredible opportunity to dive headfirst into many innovation projects. They ranged from strategic innovation projects to customer experience improvements, and from exploring new ways of working to executing human-centred automation solutions.
3 Ways to Get Everyone Onboard the Innovation Train

3 Ways to Get Everyone Onboard the Innovation Train

When it comes to innovation and introducing change in an organisation, some people instantly embrace the journey while others resist it.
Is Australia set to follow the UK, for banking liabilities?

Is Australia set to follow the UK, for banking liabilities?

As the digital world continues to dominate the banking industry, concerns about data security and privacy are coming to the forefront. As algorithms become more advanced, building a profile based on users data, and identifying abnormal transactions that could indicate fraudulent activity. This has led to concerns about privacy, as individuals feel like ...
I Have Been Attacked by Ransomware. What Should I Do Now?

I Have Been Attacked by Ransomware. What Should I Do Now?

Retro Blockbuster Plot: Sometime in the 1980s – a filthy rich industrialist – his beautiful daughter – a constant target for kidnappers – always accompanied by bodyguards – one fateful day – kidnapping succeeds – hefty ransom asked – her big strong bloke comes to rescue – happy ending!Nah!! Kidnappers today have become very tech-savvy and, if I might ...
66% of Malware is Delivered Through PDFs, New Report from Palo Alto Networks Unit 42 Finds

66% of Malware is Delivered Through PDFs, New Report from Palo Alto Networks Unit 42 Finds

Vulnerabilities continue to be a popular method for threat actors to infect victims, with exploit attempts of vulnerabilities increasing by 55% in the past year
How Safe are bit.ly (or Tiny URL) Links?

How Safe are bit.ly (or Tiny URL) Links?

What are shortened or tiny URLs?In the world of shortcuts, how could URLs stay behind. With domain names getting stranger and web links getting obnoxiously longer, tiny URLs come to the rescue. These are like capsule covers that make medicines easy to digest. Usually web addresses are attached with a lot of information (called query string) that helps ...
How to remove the roadblocks to going passwordless

How to remove the roadblocks to going passwordless

The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity
How to remove the roadblocks to going passwordless

How to remove the roadblocks to going passwordless

The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity
No results found.

In The News

Fortinet Recognised As The Overall Leader For The Third Time In A Row In The Westlands Advisory IT/OT Network Protection Platform Navigator 2025™ report

Fortinet Recognised As The Overall Leader For The Third Time In A Row In The Westlands Advisory IT/OT Network Protection Platform Navigator 2025™ report

Fortinet earns top ranking in both strategic direction and capability 
AI on the Frontline: Australian Firms Back Innovation, Brace For New Cyber Threats

AI on the Frontline: Australian Firms Back Innovation, Brace For New Cyber Threats

New Trend Micro research reveals widespread AI adoption in cybersecurity strategies, but mounting concerns cyber risk exposure
Cloudflare Just Changed How AI Crawlers Scrape the Internet-at-Large; Permission-Based Approach Makes Way for A New Business Model 

Cloudflare Just Changed How AI Crawlers Scrape the Internet-at-Large; Permission-Based Approach Makes Way for A New Business Model 

Empowers leading publishers and AI companies to stop the scraping and use of original content without permission Sydney, July 2, 2025 – Cloudflare, Inc. (NYSE: NET), the leading connectivity cloud company, today announced it is now the first Internet infrastructure provider to block AI crawlers accessing content without permission or compensation, by ...
Exabeam Nova Delivers the First Cybersecurity Strategy Agent for SOC Leadership

Exabeam Nova Delivers the First Cybersecurity Strategy Agent for SOC Leadership

Agentic AI that breaks the cycle of reactive reporting by helping security leaders pinpoint gaps, tune their strategies, and justify investments
LevelBlue to Acquire Trustwave, Becoming Largest Pure-play Managed Security Services Provider

LevelBlue to Acquire Trustwave, Becoming Largest Pure-play Managed Security Services Provider

LevelBlue strengthens market-leading managed detection and response services with advanced artificial intelligence (AI) capabilities, while adding prestigious FedRAMP and StateRAMP authorisations 
F5 Introduces Post-Quantum Cryptography Solutions To Protect Customers From Emerging Threats

F5 Introduces Post-Quantum Cryptography Solutions To Protect Customers From Emerging Threats

Organisations require proactive PQC readiness strategies to safeguard assets, preserve customer trust, and uphold compliance mandates SYDNEY, Australia, July 1, 2025 – F5 (NASDAQ: FFIV), the global leader in delivering and securing every app and API, is helping customers prepare for the foundational cybersecurity shift presented by quantum computing. ...
Tenable Finds AI Workloads Driving New Cloud Security Challenges

Tenable Finds AI Workloads Driving New Cloud Security Challenges

Cloud AI workloads riskier than traditional with 70% containing critical vulnerabilities compared to 50% in non-AI workloads
Excite Cyber Provides Essential Tips to Medical Specialists to Bolster Their Cybersecurity Defences Following Leaking of Patient Data On the Dark Web

Excite Cyber Provides Essential Tips to Medical Specialists to Bolster Their Cybersecurity Defences Following Leaking of Patient Data On the Dark Web

“Hospitals may have stronger defences, but attackers know the weak link often lies in the smaller, less protected third-party medical providers. Medical professionals running small or private clinics should urgently review their cybersecurity protections and enhance them.  
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This