The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Exploring the Intersection of AI and Cybersecurity Ethics

Exploring the Intersection of AI and Cybersecurity Ethics

The Recap In a recent episode of KBKast, Corien Vermaak, Head of cybersecurity from Cisco ANZ, joined host Karissa Breen to discuss the conversation of AI in and cybersecurity. The interview shed light on the opportunities and ethical considerations presented by AI in the cybersecurity domain, providing valuable insights for both professionals and ...
The Importance of Undertaking Cyber Risk Quantification

The Importance of Undertaking Cyber Risk Quantification

This article looks at the process of cyber risk quantification.
Australia’s FSIs Can Lead The Way In Secure AI-augmented Software Development

Australia’s FSIs Can Lead The Way In Secure AI-augmented Software Development

The early successes seen with pair programming will amount to nothing if the code output is of poor quality or is insecure.
Cyber Insurance Isn’t a Free Pass for Australian Businesses

Cyber Insurance Isn’t a Free Pass for Australian Businesses

As organisations increasingly look towards cyber insurance to strengthen their cyber security strategies, it’s imperative their houses are in order. The first line of defence is having a clear picture of all the data you hold and how you are handling and retaining it, to ensure you can get insurance, at the best price, and can get it actually paid out ...
Cybersecurity Startup Space: Investing in Early-Stage Companies

Cybersecurity Startup Space: Investing in Early-Stage Companies

In a recent interview, Sergey Gribov, a Partner at Flint Capital, shared his opinion on investing in early-stage cybersecurity startups. More capital is being spent on investing and growing cybersecurity companies which naturally means more competition to grow a successful start-up. The Competitive Advantage and Sustainability of Products With ...
Navigating the Australian Cybersecurity Market

Navigating the Australian Cybersecurity Market

In a recent interview, Marcus Thompson provided insights into the Australian cybersecurity industry, market consolidation, and the future of cybersecurity companies in the region. Thompson discussed the collaborative nature of the industry, market consolidation trends, challenges faced by startups, and the potential for new technologies to reshape the ...
Exclusive: Oracle Global CIO Discusses Cloud Innovation and Security

Exclusive: Oracle Global CIO Discusses Cloud Innovation and Security

I recently attended the Oracle CloudWorld Tour in Singapore and I sat down with Jae Evans, Chief Information Officer and Executive Vice President of Oracle and we discussed Oracle’s strategies for modernising its product and service suite. The discussion delved into Oracle’s journey towards providing a comprehensive and innovative cloud platform, as ...
Why Has Critical Infrastructure Become A Prime Target For Cyber Attacks?

Why Has Critical Infrastructure Become A Prime Target For Cyber Attacks?

From government and healthcare, energy and water networks, manufacturing and telecoms, transportation systems and financial networks, billions of people rely on critical infrastructure. Despite these industries differing in how they function, they are all increasingly relying on an internet connection to help them deliver their services. Critical ...
No results found.

In The News

NinjaOne Announces New Capabilities to Improve Digital Employee Experience and Productivity

NinjaOne Announces New Capabilities to Improve Digital Employee Experience and Productivity

NinjaOne has announced expanded capabilities to help IT teams improve users’ experiences with their devices. The new use cases include self-service workflows, end-user dashboards, and user-centric automations to make organisations and their employees more efficient and productive. IT leaders are increasingly focusing not only on improving how they ...
CrowdStrike Fuels Partner Growth and Profitability with Expanded Accelerate Partner Program

CrowdStrike Fuels Partner Growth and Profitability with Expanded Accelerate Partner Program

New incentives, tools, training and resources make it easier for partners to consolidate cybersecurity on the Falcon platform, driving larger deals and superior customer outcomes
ISACA Study: 1 in 3 Tech Pros Switched Jobs in Past Two Years, leaving 74% of Firms Worried About IT Talent Retention

ISACA Study: 1 in 3 Tech Pros Switched Jobs in Past Two Years, leaving 74% of Firms Worried About IT Talent Retention

Heavy workloads and long hours cited as the top stressors for IT professionals, according to new ISACA research
CyberArk and Device Authority, in Collaboration with Microsoft, Deliver Secure Device Authentication for Manufacturers

CyberArk and Device Authority, in Collaboration with Microsoft, Deliver Secure Device Authentication for Manufacturers

CyberArk (NASDAQ: CYBR) and Device Authority, in collaboration with Microsoft, have launched a solution that strengthens and scales connected device authentication to enterprise applications with Zero Trust principles. It helps manufacturers reduce cyber risk from connected devices in factory floors and edge environments with robust identity security, ...
Check Point Software Technologies Partners with Cardano to Deliver Real-Time Threat Prevention Security Solution for Web3 and Blockchain

Check Point Software Technologies Partners with Cardano to Deliver Real-Time Threat Prevention Security Solution for Web3 and Blockchain

Unlocking Web3: How Real-Time Security Can Drive Blockchain Adoption
Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

Latest State of Security and Identity Report reveals a shift toward software-driven solutions and artificial intelligence in 2025
Quorum Cyber Receives Microsoft Security Excellence Awards Trifecta

Quorum Cyber Receives Microsoft Security Excellence Awards Trifecta

All finalists are members of the Microsoft Intelligent Security Association (MISA), an ecosystem of independent software vendors (ISVs) and managed security service providers (MSSPs) that have integrated their security products and services with Microsoft’s security technology.
SecurityBridge Enhances SAP Security With Advanced SIEM And ITSM Integrations

SecurityBridge Enhances SAP Security With Advanced SIEM And ITSM Integrations

SecurityBridge integrates seamlessly with enterprise SIEM and ITSM solutions, offering built-in SAP security monitoring rules customized to fit organizational needs.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This
OSZAR »