The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

2025 Cybersecurity Predictions by CyberArk

2025 Cybersecurity Predictions by CyberArk

The cybersecurity landscape is poised for transformative shifts in 2025 driven by technological innovation and evolving threats. As cybercriminals become more sophisticated, organisations must stay ahead by proactively adopting strategies that prioritise identity security and business resiliency. Thomas Fikentscher, CyberArk’s Area Vice President for ...
How Breach Readiness Will Shape Cyber Defense In 2025

How Breach Readiness Will Shape Cyber Defense In 2025

Rajesh Khazanchi, co-founder and CEO of ColorTokens, writes how breach ready strategies and AI-powered cyber defense can drive cyber resilience and protect your business.
AI Domination and Quantum Computing on the Horizon

AI Domination and Quantum Computing on the Horizon

Over the last few years we all know there has been transformative changes in the workplace, the critical role of technology, and the ongoing debate between remote and in-office work. Enterprises are still pushing for staff to come into the office more frequently and are finding persuasive ways to entice their employees back into the building. I sat ...
Human-centric Cybersecurity: The First Line of Defence

Human-centric Cybersecurity: The First Line of Defence

Introduction Australian organisations face an array of cybersecurity challenges that didn’t exist half a decade ago. And yet the reliance on traditional security and legacy systems is largely the status quo – often falling short in addressing the nuanced interplay between human behaviour and technological vulnerabilities. A New Approach Enter ...
Keeping The Public Safe From Festive Scams

Keeping The Public Safe From Festive Scams

"While the festive season should be a period of joy and goodwill, hackers are particularly active in Australia and have the ability to employ new, sophisticated tactics on consumers. One emerging trend we're seeing is the use of AI-powered tools, with deepfake technologies allowing hackers to create convincing face-swapped videos and the ability to ...
When Post-Quantum Cryptography Is No Longer Post-Quantum

When Post-Quantum Cryptography Is No Longer Post-Quantum

As quantum computing advances, the standards for Post-Quantum Cryptography (PQC) are evolving rapidly, with governments like Australia phasing out even selected PQC algorithms like ML-KEM-768 and ML-DSA-65 to maintain robust security. This article explores the challenges businesses face in adapting to these shifting standards, from resource demands to ...
The Cisco Live 2024 Rundown Featuring Splunk

The Cisco Live 2024 Rundown Featuring Splunk

At the hustling and bustling Melbourne Convention and Exhibition Centre, the 2024 edition of Cisco Live commenced with discussions on the future of cybersecurity and data management. With industry heavyweights like Tom Gillis, AJ Shipley, and Tom Casey at the helm, the event promises to redefine the paradigms of network security, artificial ...
Modernising Privileged Access Management To Combat Advanced ID-Based Cyber Threats

Modernising Privileged Access Management To Combat Advanced ID-Based Cyber Threats

While identity-related threats are increasingly challenging, a well-implemented PAM strategy can transform security postures. By securing paths to privilege, businesses reduce their attack surfaces, making it harder for cybercriminals to exploit identities.
No results found.

In The News

GitHub Announces Agent Mode and MCP Support Rolling Out To All VS Code Users

GitHub Announces Agent Mode and MCP Support Rolling Out To All VS Code Users

GitHub Copilot is getting a whole lot more agentic with increased context of tools and services, powered by the world’s leading models, starting today.
Self-Inflicted Cloud Wounds Still The Top Risk In Cloud Security, New Report Finds

Self-Inflicted Cloud Wounds Still The Top Risk In Cloud Security, New Report Finds

New research by Dark Reading commissioned by Qualys, The State of Cloud & SaaS Security Report, reveals top cloud and SaaS security threats facing enterprises today.
Check Point Software Emerges As A Leader In Attack Surface Management After Acquiring Cyberint, According To Latest GigaOm Radar Report

Check Point Software Emerges As A Leader In Attack Surface Management After Acquiring Cyberint, According To Latest GigaOm Radar Report

Cyberint, rebranded as Check Point External Risk Management, offers a comprehensive view of an organization's cyber threats across the open, deep, and dark web Sydney, 4 April 2025 – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, has emerged as a leading player in Attack Surface ...
AI-Driven Attacks To Become Faster, More Sophisticated, And Harder To Detect By 2026, New Delinea Report Shows

AI-Driven Attacks To Become Faster, More Sophisticated, And Harder To Detect By 2026, New Delinea Report Shows

SYDNEY – April 4, 2025 – Delinea, a leading provider of solutions for securing human and machine identities through centralised authorisation, today released its inaugural Cybersecurity and the AI Threat Landscape report. The report, based on exclusive Delinea Labs research and an analysis of several third-party studies and real-world cyber incidents, ...
Thoughtworks Technology Radar Highlights GenAI’s Impact And Key Factors Shaping Today’s Software Development And Delivery

Thoughtworks Technology Radar Highlights GenAI’s Impact And Key Factors Shaping Today’s Software Development And Delivery

Thoughtworks, a global technology consultancy that integrates strategy, design and engineering to drive digital innovation, today presents the 32nd edition of the Technology Radar. The biannual report is built on Thoughtworks’ frontline experiences solving its clients’ most complex business challenges. The latest edition of the Thoughtworks ...
SolarWinds Unveils Next-Generation Solutions To Tackle Modern IT Operational Resiliency Challenges

SolarWinds Unveils Next-Generation Solutions To Tackle Modern IT Operational Resiliency Challenges

SolarWinds (NYSE:SWI), a leading provider of simple, powerful, and secure observability and IT management solutions, today announced a major step forward in helping businesses achieve IT operational resilience. The latest enhancements across the SolarWinds portfolio integrate expanded capabilities across observability, incident response, service ...
CyberArk Secure Browser Achieves SOC 2 Type 2 Compliance

CyberArk Secure Browser Achieves SOC 2 Type 2 Compliance

CyberArk (NASDAQ: CYBR), the global leader in identity security, today announced that CyberArk Secure Browser has achieved SOC 2 Type 2 Compliance, underscoring CyberArk’s commitment to apply the right level of privilege controls to secure every user’s action, from endpoint to application. This certification confirms that CyberArk Secure Browser uses ...
New Research: Gen AI Scraper Bots Clogging Websites with Half a Million Fake Requests Per Day

New Research: Gen AI Scraper Bots Clogging Websites with Half a Million Fake Requests Per Day

Generative AI ‘gray bots’ pound websites up to half a million times a day Generative AI scraper bots target websites 24 hours a day with up to half a million requests for information, according to the latest Barracuda detection data. In a new report, Barracuda threat analysts highlight the relentless behaviour of generative AI (Gen AI) bots, which ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This