The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

What Do Gauss and Euler Handshakes Have to Do with “Infinite Microsegmentation Policy Impact Simulation”?

What Do Gauss and Euler Handshakes Have to Do with “Infinite Microsegmentation Policy Impact Simulation”?

Explore how math concepts from Gauss and Euler solve cybersecurity challenges, enabling scalable microsegmentation with infinite policy impact simulation.
NetApp Is Committed To Helping Entities Build Their Own AI Factories

NetApp Is Committed To Helping Entities Build Their Own AI Factories

So much is going on with NetApp according to Jeff Baxter, Vice President of Product Marketing at NetApp. Baxter provided details about the latest NetApp product announcements and the future trajectory of artificial intelligence (AI) and cybersecurity within the industry. Understanding ONTAP: The Foundation of Data Management The introduction to ...
Revolutionising Government with a Modular, AI-Driven Platform

Revolutionising Government with a Modular, AI-Driven Platform

Utilising low-code platforms with modular features more seamlessly allow government agencies to efficiently and effectively meet the ever-changing needs of their citizens. They are contributing to government at all levels to increase cost efficiency, become more agile, whilst remaining compliant and better prepared for the future.
Debunking Three Common Myths About Data Protection

Debunking Three Common Myths About Data Protection

Introduction Data protection is no longer an afterthought but a daily priority for businesses. While Australia's regulations like the Privacy Act and the Notifiable Data Breaches (NDB) scheme are crucial, the average cost of a data breach globally is now $4.45 million. For Australian enterprises, the financial hit can be devastating, especially if ...
Ensuring Secure Content in the Era of Digital Transformation

Ensuring Secure Content in the Era of Digital Transformation

Introduction In today’s digital landscape, safeguarding sensitive information, be it in transit, at rest, or in use, has become more crucial. As public and private organisations continue to embrace digital transformation, the risk of data breaches and unauthorised access has grown exponentially.   As creating and sharing documents from anywhere ...
Boosting Software Security With a Binary Approach

Boosting Software Security With a Binary Approach

Introduction The discovery of a leaked access token earlier this year that could have opened the door to malicious code being injected into one of the world’s most widespread programming languages has shone a light on why the method we use to search for security issues in software matters. The access token, discovered by the JFrog Security Research ...
The Goal Is To Alleviate The Administrative Burden In Healthcare

The Goal Is To Alleviate The Administrative Burden In Healthcare

Stephanie Trunzo, Senior Vice President and General Manager at Oracle Industry. Trunzo dives deep into the changes Oracle Industries is bringing to the healthcare sector with applied AI and an open healthcare platform and what this actually means. Trunzo led with Oracle Industries' approach, which integrates specific industry needs into general ...
A Pledge to Secure Healthcare

A Pledge to Secure Healthcare

Discover why hospitals and healthcare providers are prime targets for cyberattacks and how strategies like microsegmentation can ensure patient safety.
No results found.

In The News

Elastic Expands Partnership with Tines to Simplify Security and Observability Workflow Automation

Elastic Expands Partnership with Tines to Simplify Security and Observability Workflow Automation

Integrated offering for Tines Workflow Automation and Elastic Search AI Platform helps increase operational efficiency, minimise security risk, and reduce downtime
A Million Phishing-as-a-Service Attacks In Two Months Highlight A Fast-evolving Threat – Barracuda Report

A Million Phishing-as-a-Service Attacks In Two Months Highlight A Fast-evolving Threat – Barracuda Report

The first few months of 2025 saw a massive spike in phishing-as-a-service (PhaaS) attacks targeting organizations around the world, with more than a million attacks detected by Barracuda systems in January and February. The attacks were powered by several leading PhaaS platforms, including Tycoon 2FA, EvilProxy, and Sneaky 2FA.  Between them, these ...
Tenable Research Reveals Popular AI Tools Used in Cloud Environments are Highly Vulnerable 

Tenable Research Reveals Popular AI Tools Used in Cloud Environments are Highly Vulnerable 

Tenable Cloud AI Risk Report finds 70% of cloud workloads using AI services contain unresolved vulnerabilities
Palo Alto Networks Deepens Commitment in Asia-Pacific and Japan with New Cloud Infrastructure Investment

Palo Alto Networks Deepens Commitment in Asia-Pacific and Japan with New Cloud Infrastructure Investment

Prisma Access Browser to integrate into existing infrastructure across strategic locations in Asia-Pacific and Japan, to support customer’s data residency needs
Wavelink Launches 5thWave to Revolutionise Asset and Customer Lifecycle Management

Wavelink Launches 5thWave to Revolutionise Asset and Customer Lifecycle Management

March 20, 2025 — Wavelink, an Infinigate Group company and a leader in technology distribution, services, and business development in Australia and New Zealand (ANZ), has launched 5thWave, a powerful asset and customer lifecycle management service designed to help partners optimise renewals, upgrades, and technology refresh cycles. 5thWave automates ...
Rubrik and Deloitte Team Up to Deliver Cyber Resilience

Rubrik and Deloitte Team Up to Deliver Cyber Resilience

PALO ALTO, Calif., March 18, 2025— As the threat landscape continuously evolves, the call for robust data security solutions has never been more urgent. Today, Rubrik (NYSE: RBRK), a leading cyber security company, is proud to announce a strategic alliance with Deloitte. Together, the companies will collaborate to deliver advanced data security and ...
Hundreds of Malicious Google Play-Hosted Apps Bypassed Android 13 Security With Ease

Hundreds of Malicious Google Play-Hosted Apps Bypassed Android 13 Security With Ease

Bitdefender's security researchers have identified a large-scale ad fraud campaign that deployed hundreds of malicious apps in the Google Play Store, resulting in more than 60 million downloads total. The apps display out-of-context ads and even try to persuade victims to give away credentials and credit card information in phishing attacks. The ...
CrowdStrike Collaborates with NVIDIA to Advance Agentic AI in Cybersecurity, Pioneer Testing of NVIDIA Reasoning Models

CrowdStrike Collaborates with NVIDIA to Advance Agentic AI in Cybersecurity, Pioneer Testing of NVIDIA Reasoning Models

Powered by NVIDIA NIM microservices—with reasoning models in testing—CrowdStrike's Charlotte AI delivers 2x faster detection triage with 50% less compute, maximizing SOC efficiency
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This