The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Australian Enterprises Need An Exit Strategy For Tier-One Applications In Virtualised Environments

Australian Enterprises Need An Exit Strategy For Tier-One Applications In Virtualised Environments

Escalating threats targeting the hypervisor are driving more enterprises to reconsider how they host their tier-one applications.
Cybercrime Is Soaring: Is Your Business Ready To Respond?

Cybercrime Is Soaring: Is Your Business Ready To Respond?

Key questions every organisation should consider when assessing their cybersecurity readiness.
Are Aussie Networks Future-fit?

Are Aussie Networks Future-fit?

According to IDC’s recent Asia/Pacific Enterprise Connectivity and Telecom Services Survey, only 51% of ANZ companies believe their networks are equipped to handle the complex demands of today’s digital economy.  Some might say that’s an alarming statistic. So what's stopping Aussie companies from getting their networks Future Fit?
Unmasking the SYS01 InfoStealer Threat: Bitdefender Labs Tracks Global Malvertising Campaign Targeting Meta Business Pages

Unmasking the SYS01 InfoStealer Threat: Bitdefender Labs Tracks Global Malvertising Campaign Targeting Meta Business Pages

In a digital world where advertising is king, businesses and organisations are not the only ones using this powerful tool. Cybercriminals have a knack for exploiting the engine that powers online platforms by corrupting the vast reach of advertising to distribute malware en masse. While legitimate businesses rely on ads to reach new audiences, ...
Cybersecurity is Everyone’s Business: Navigating Our Digital Lives

Cybersecurity is Everyone’s Business: Navigating Our Digital Lives

As Cybersecurity Awareness Month draws to a close, the message "Cybersecurity is Everyone's Business" remains vital. Despite fewer high-profile breaches making headlines, cyber threats are still very much present. Just this month, Australian companies like Funlab, Perfection Fresh and Road Distribution Services were targeted by cyberattacks, ...
How NetApp’s Government Relations are Shaping Secure Tech

How NetApp’s Government Relations are Shaping Secure Tech

Kristen Verderame, Vice President of Global Government Relations at NetApp, shared the importance of government relations, public affairs, and cybersecurity in shaping the technology. Verderame shared a view on how companies like NetApp collaborate with various government bodies to support missions and develop cybersecurity frameworks. Representing ...
How Quantum Random Number Generators Can Amplify the Power of Post Quantum Cryptography

How Quantum Random Number Generators Can Amplify the Power of Post Quantum Cryptography

The development of quantum computing is driving the need for new cryptographic methods that can resist future quantum-based attacks. Among the most promising techniques in post-quantum cryptography are Module Lattice-based Key Encapsulation Mechanisms (ML-KEM) and Module Lattice-based Digital Signature Algorithms (ML-DSA). These methods leverage the ...
What Do Gauss and Euler Handshakes Have to Do with “Infinite Microsegmentation Policy Impact Simulation”?

What Do Gauss and Euler Handshakes Have to Do with “Infinite Microsegmentation Policy Impact Simulation”?

Explore how math concepts from Gauss and Euler solve cybersecurity challenges, enabling scalable microsegmentation with infinite policy impact simulation.

In The News

Palo Alto Networks Introduces Cortex Cloud, the Future of Real-Time Cloud Security

Palo Alto Networks Introduces Cortex Cloud, the Future of Real-Time Cloud Security

Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, is doubling down on cloud security with the introduction of Cortex® Cloud, the next version of Prisma Cloud, that natively brings together new releases of its best-in-class cloud detection and response (CDR) and industry-leading cloud native application protection platform (CNAPP) ...
CyberArk Acquires Zilla Security to Reshape Identity Governance and Administration for the Modern Enterprise

CyberArk Acquires Zilla Security to Reshape Identity Governance and Administration for the Modern Enterprise

Industry-leading identity security combined with modern IGA sets a new paradigm for compliance and identity lifecycle management
Bitdefender Acquires BitShield Division to Expand Presence in Asia-Pacific

Bitdefender Acquires BitShield Division to Expand Presence in Asia-Pacific

Bitdefender has announced the acquisition of a key division of BitShield, responsible for distributing Bitdefender solutions in Malaysia and Brunei as a trusted Country Partner. The acquisition underscores Bitdefender’s continued investment in the Asia-Pacific (APAC) region, one of cybersecurity’s fastest-growing markets. This acquisition aligns ...
Victorian Government Extends Investment in Resilient Land Mobile Radio Communications with Motorola Solutions

Victorian Government Extends Investment in Resilient Land Mobile Radio Communications with Motorola Solutions

The Victorian government has signed a 10-year, AUD $500 million (USD ~$330 million) contract with Motorola Solutions to maintain and enhance the Metropolitan Mobile Radio network (MMR) relied upon by the state’s emergency services. The contract with the Department of Justice and Community Safety will extend MMR’s operation until 2035, providing ...
Confluent and Databricks Expand Partnership to Usher In New Age of Real-time AI

Confluent and Databricks Expand Partnership to Usher In New Age of Real-time AI

Data streaming company Confluent has unveiled a major expansion of its partnership with Databricks, bringing together Confluent’s complete Data Streaming Platform and Databricks’ Data Intelligence Platform to empower enterprises with real-time data for AI-driven decision-making. New integrations between Confluent's Tableflow and Databricks Unity ...
LLMjacking Targets DeepSeek: A Growing Security Threat

LLMjacking Targets DeepSeek: A Growing Security Threat

Since its initial discovery in May 2024 by the Sysdig Threat Research Team (TRT), LLMjacking has rapidly evolved, posing a significant risk to organizations relying on large language models (LLMs). The latest wave of attacks has set its sights on DeepSeek, a fast-growing AI model that cybercriminals exploited within days of its release. Understanding ...
JFrog Signs Agreement with AWS to Help Enterprises Unlock Business Value from Their Software Supply Chains

JFrog Signs Agreement with AWS to Help Enterprises Unlock Business Value from Their Software Supply Chains

The new strategic collaboration agreement (SCA) allows enterprise customers to cost-effectively scale their DevSecOps and AI-driven software solutions in the cloud
Check Point and Wiz Enter Strategic Partnership to Deliver End-to-End Cloud Security

Check Point and Wiz Enter Strategic Partnership to Deliver End-to-End Cloud Security

The partnership integrates some of the best-in-class cloud network and CNAPP security through seamless technology integration and a strategic business alliance, setting a new standard for enterprise protection

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This