The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

AI Domination and Quantum Computing on the Horizon

AI Domination and Quantum Computing on the Horizon

Over the last few years we all know there has been transformative changes in the workplace, the critical role of technology, and the ongoing debate between remote and in-office work. Enterprises are still pushing for staff to come into the office more frequently and are finding persuasive ways to entice their employees back into the building. I sat ...
Human-centric Cybersecurity: The First Line of Defence

Human-centric Cybersecurity: The First Line of Defence

Introduction Australian organisations face an array of cybersecurity challenges that didn’t exist half a decade ago. And yet the reliance on traditional security and legacy systems is largely the status quo – often falling short in addressing the nuanced interplay between human behaviour and technological vulnerabilities. A New Approach Enter ...
Keeping The Public Safe From Festive Scams

Keeping The Public Safe From Festive Scams

"While the festive season should be a period of joy and goodwill, hackers are particularly active in Australia and have the ability to employ new, sophisticated tactics on consumers. One emerging trend we're seeing is the use of AI-powered tools, with deepfake technologies allowing hackers to create convincing face-swapped videos and the ability to ...
When Post-Quantum Cryptography Is No Longer Post-Quantum

When Post-Quantum Cryptography Is No Longer Post-Quantum

As quantum computing advances, the standards for Post-Quantum Cryptography (PQC) are evolving rapidly, with governments like Australia phasing out even selected PQC algorithms like ML-KEM-768 and ML-DSA-65 to maintain robust security. This article explores the challenges businesses face in adapting to these shifting standards, from resource demands to ...
The Cisco Live 2024 Rundown Featuring Splunk

The Cisco Live 2024 Rundown Featuring Splunk

At the hustling and bustling Melbourne Convention and Exhibition Centre, the 2024 edition of Cisco Live commenced with discussions on the future of cybersecurity and data management. With industry heavyweights like Tom Gillis, AJ Shipley, and Tom Casey at the helm, the event promises to redefine the paradigms of network security, artificial ...
Modernising Privileged Access Management To Combat Advanced ID-Based Cyber Threats

Modernising Privileged Access Management To Combat Advanced ID-Based Cyber Threats

While identity-related threats are increasingly challenging, a well-implemented PAM strategy can transform security postures. By securing paths to privilege, businesses reduce their attack surfaces, making it harder for cybercriminals to exploit identities.
Proactive Measures for Businesses to Achieve Effective Cyber Hygiene Practices

Proactive Measures for Businesses to Achieve Effective Cyber Hygiene Practices

Cybercrime rates in Australia have surged, with online attacks averaging out to one every six minutes, according to the Australian Signals Directorate (ASD).(1) For organisations, one of the most common attacks is email compromise, which involves manipulating individuals into unauthorised financial transactions or the disclosure of sensitive company ...
Antifragility – The Essential Strategy for Modern Cyber Defense

Antifragility – The Essential Strategy for Modern Cyber Defense

Agnidipta Sarkar, VP CISO Advisory, explores how Nassim Taleb's concept of antifragility enhances cyber defense strategies.
No results found.

In The News

SecurityBridge Enhances SAP Security With Advanced SIEM And ITSM Integrations

SecurityBridge Enhances SAP Security With Advanced SIEM And ITSM Integrations

SecurityBridge integrates seamlessly with enterprise SIEM and ITSM solutions, offering built-in SAP security monitoring rules customized to fit organizational needs.
Proofpoint: Nearly One in Four Australian Top Hospitals Still Vulnerable to Email Fraud

Proofpoint: Nearly One in Four Australian Top Hospitals Still Vulnerable to Email Fraud

Proofpoint, Inc., a leading cybersecurity and compliance company, has today released new research showing almost one in four (23%) of Australia’s top-ranked hospitals is still lagging behind on basic cybersecurity measures, subjecting patients, healthcare professionals, and stakeholders to a higher risk of email fraud. While the data shows some ...
ExeQuantum and CyberWaze Announce Strategic Partnership to Bring Post-Quantum Cryptography to Global Cybersecurity

ExeQuantum and CyberWaze Announce Strategic Partnership to Bring Post-Quantum Cryptography to Global Cybersecurity

Melbourne, Australia & Dubai, UAE – March 2025 – ExeQuantum, a leader in Post-Quantum Cryptography (PQC) solutions, has officially partnered with CyberWaze, a global cybersecurity consulting and managed security services provider. This collaboration marks a significant milestone in the adoption of quantum-resistant security, ensuring businesses ...
Cybersecurity Needs Diversity: ESET’s 2025 Scholarship to Empower Women Leaders

Cybersecurity Needs Diversity: ESET’s 2025 Scholarship to Empower Women Leaders

Since its launch in 2016, the ESET Women in Cybersecurity Scholarship has supported over 28 women worldwide in pursuing careers in technology. Now expanding to Singapore and India in 2025, alongside the U.S., Canada, Australia, and the U.K., the initiative continues to build a more inclusive and diverse cybersecurity workforce globally.
Sovereign Australian Prime Alliance Welcomes Much Needed Reforms to Commonwealth Procurement Rules

Sovereign Australian Prime Alliance Welcomes Much Needed Reforms to Commonwealth Procurement Rules

The Sovereign Australian Prime Alliance (SAPA) congratulates the Albanese Government on its announcement today of much needed reforms to the Commonwealth Procurement Rules to define an Australian business, in the context of the Commonwealth procurement framework as: “a business, including any parent business, that: has 50% or more Australian ...
Bitdefender Joins the AWS ISV Accelerate Program

Bitdefender Joins the AWS ISV Accelerate Program

Bitdefender today announced it has joined the Amazon Web Services (AWS) Independent Software Vendor (ISV) Accelerate Program, a global co-sell initiative designed for AWS partners offering software solutions that run on or integrate with AWS and are sold through the AWS Marketplace. The program fosters deep collaboration between Bitdefender and AWS, ...
Western Australia Police Force Bolsters Officer and Community Safety With New Number Plate Recognition Capabilities

Western Australia Police Force Bolsters Officer and Community Safety With New Number Plate Recognition Capabilities

Western Australia Police Force (WA Police Force) is conducting faster and better-informed investigations and road policing throughout the state through the addition of automatic number plate recognition (ANPR) capability within Motorola Solutions’ PSCore mobile application. The expanded app has been deployed in more than 80 police vehicles and ...
Wavelink Signs Distribution Agreement With N-able, Strengthening Data Protection and Security Offerings In Australia and New Zealand

Wavelink Signs Distribution Agreement With N-able, Strengthening Data Protection and Security Offerings In Australia and New Zealand

March 06, 2025 — Wavelink, an Infinigate Group company and Australian and New Zealand (ANZ) leader in technology distribution, channel services, and business development, has signed a distribution agreement with N-able, a global leader in comprehensive, scalable IT service management solutions. This agreement expands N-able’s reach into the Australian ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This