The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Unmasking the SYS01 InfoStealer Threat: Bitdefender Labs Tracks Global Malvertising Campaign Targeting Meta Business Pages

Unmasking the SYS01 InfoStealer Threat: Bitdefender Labs Tracks Global Malvertising Campaign Targeting Meta Business Pages

In a digital world where advertising is king, businesses and organisations are not the only ones using this powerful tool. Cybercriminals have a knack for exploiting the engine that powers online platforms by corrupting the vast reach of advertising to distribute malware en masse. While legitimate businesses rely on ads to reach new audiences, ...
Cybersecurity is Everyone’s Business: Navigating Our Digital Lives

Cybersecurity is Everyone’s Business: Navigating Our Digital Lives

As Cybersecurity Awareness Month draws to a close, the message "Cybersecurity is Everyone's Business" remains vital. Despite fewer high-profile breaches making headlines, cyber threats are still very much present. Just this month, Australian companies like Funlab, Perfection Fresh and Road Distribution Services were targeted by cyberattacks, ...
How NetApp’s Government Relations are Shaping Secure Tech

How NetApp’s Government Relations are Shaping Secure Tech

Kristen Verderame, Vice President of Global Government Relations at NetApp, shared the importance of government relations, public affairs, and cybersecurity in shaping the technology. Verderame shared a view on how companies like NetApp collaborate with various government bodies to support missions and develop cybersecurity frameworks. Representing ...
How Quantum Random Number Generators Can Amplify the Power of Post Quantum Cryptography

How Quantum Random Number Generators Can Amplify the Power of Post Quantum Cryptography

The development of quantum computing is driving the need for new cryptographic methods that can resist future quantum-based attacks. Among the most promising techniques in post-quantum cryptography are Module Lattice-based Key Encapsulation Mechanisms (ML-KEM) and Module Lattice-based Digital Signature Algorithms (ML-DSA). These methods leverage the ...
What Do Gauss and Euler Handshakes Have to Do with “Infinite Microsegmentation Policy Impact Simulation”?

What Do Gauss and Euler Handshakes Have to Do with “Infinite Microsegmentation Policy Impact Simulation”?

Explore how math concepts from Gauss and Euler solve cybersecurity challenges, enabling scalable microsegmentation with infinite policy impact simulation.
NetApp Is Committed To Helping Entities Build Their Own AI Factories

NetApp Is Committed To Helping Entities Build Their Own AI Factories

So much is going on with NetApp according to Jeff Baxter, Vice President of Product Marketing at NetApp. Baxter provided details about the latest NetApp product announcements and the future trajectory of artificial intelligence (AI) and cybersecurity within the industry. Understanding ONTAP: The Foundation of Data Management The introduction to ...
Revolutionising Government with a Modular, AI-Driven Platform

Revolutionising Government with a Modular, AI-Driven Platform

Utilising low-code platforms with modular features more seamlessly allow government agencies to efficiently and effectively meet the ever-changing needs of their citizens. They are contributing to government at all levels to increase cost efficiency, become more agile, whilst remaining compliant and better prepared for the future.
Debunking Three Common Myths About Data Protection

Debunking Three Common Myths About Data Protection

Introduction Data protection is no longer an afterthought but a daily priority for businesses. While Australia's regulations like the Privacy Act and the Notifiable Data Breaches (NDB) scheme are crucial, the average cost of a data breach globally is now $4.45 million. For Australian enterprises, the financial hit can be devastating, especially if ...

In The News

OpenText Partners with Secure Code Warrior to Deliver Comprehensive Application Security and Customised Developer Risk Management

OpenText Partners with Secure Code Warrior to Deliver Comprehensive Application Security and Customised Developer Risk Management

The new agreement empowers development teams with continuous upskilling to turn security into a strategic advantage, reduce risks, and elevate customer trust
Elastic Awarded A 2024 AWS Partner Award

Elastic Awarded A 2024 AWS Partner Award

Elastic recognised as the AWS Global Generative AI Infrastructure and Data Partner of the Year
New Research From NetApp Finds One In Five Companies Unable To Recover Data After Cyberattack

New Research From NetApp Finds One In Five Companies Unable To Recover Data After Cyberattack

NetAppยฎ (NASDAQ: NTAP), the intelligent data infrastructure company, today announced the release of its latest report analysing the state of cybersecurity and offering actionable insights to help organisations strengthen their cyber resiliency. The Futurum Group study, "Cloud, Complexity, AI: The Triple Threat Demanding New Cyber Resilience Strategies" ...
New 2025 Genetec State of Physical Industry Report Shows Australia And New Zealand Accelerating Hybrid Cloud Adoption And IT’s Growing Strategic Influence

New 2025 Genetec State of Physical Industry Report Shows Australia And New Zealand Accelerating Hybrid Cloud Adoption And IT’s Growing Strategic Influence

Report highlights a purpose-driven approach to cloud and AI adoption. SYDNEY/AUCKLAND, December 5, 2024 โ€” Genetec Inc. (โ€œGenetecโ€), the global leader in enterprise physical security software, today shared the results of its 2025 State of the Physical Security Report. Based on insights from over 5,600 physical security leaders worldwide, including more ...
Tenable Adds Patch Management To Rapidly Close Security Exposures – Autonomous Patching Streamlines Discovery To Remediation, With Customisable Controls That Prevent Problematic Updates

Tenable Adds Patch Management To Rapidly Close Security Exposures – Autonomous Patching Streamlines Discovery To Remediation, With Customisable Controls That Prevent Problematic Updates

Tenableยฎ, the exposure management company, today announced the release of Tenable Patch Management, an autonomous patch solution built to quickly and effectively close vulnerability exposures in a unified solution. A strategic partnership and integration withย Adaptiva, a global leader in autonomous endpoint management, provides the foundation of the ...
Cordant Partners with Cloud Security Leader Wiz to Enhance Pragmatic Cybersecurity Solutions in Australian Market

Cordant Partners with Cloud Security Leader Wiz to Enhance Pragmatic Cybersecurity Solutions in Australian Market

Melbourne, Australia 26th November 2024 - Cordant, Australia's leading pragmatic cybersecurity consultancy, today announced a partnership with Wiz, the rapidly-growing cloud security platform that has revolutionised how organisations protect their cloud infrastructure. This collaboration marks a significant milestone in bringing straightforward, ...
Fortinet Elevates Web Application Security and Performance with New Unified Platform

Fortinet Elevates Web Application Security and Performance with New Unified Platform

FortiAppSec Cloud consolidates key web application capabilities into a single offering, providing cutting-edge protection, seamless delivery, and centralised management across multi-cloud environmentsย 
Rapid7โ€™s Managed Extended Detection and Response (MXDR) Adds Coverage for Amazon Web Services (AWS) Environments

Rapid7โ€™s Managed Extended Detection and Response (MXDR) Adds Coverage for Amazon Web Services (AWS) Environments

Rapid7 has expanded its Managed Extended Detection and Response (MXDR) service to include enhanced support for AWS environments. This brings customers deeper cloud detection and response capabilities by combining cloud native telemetry, AWS security telemetry, and enhanced detections in the Rapid7 Command Platform.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This