The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

How Breach Readiness Will Shape Cyber Defense In 2025
Rajesh Khazanchi, co-founder and CEO of ColorTokens, writes how breach ready strategies and AI-powered cyber defense can drive cyber resilience and protect your business.

AI Domination and Quantum Computing on the Horizon
Over the last few years we all know there has been transformative changes in the workplace, the critical role of technology, and the ongoing debate between remote and in-office work. Enterprises are still pushing for staff to come into the office more frequently and are finding persuasive ways to entice their employees back into the building. I sat ...

Human-centric Cybersecurity: The First Line of Defence
Introduction
Australian organisations face an array of cybersecurity challenges that didn’t exist half a decade ago.
And yet the reliance on traditional security and legacy systems is largely the status quo – often falling short in addressing the nuanced interplay between human behaviour and technological vulnerabilities.
A New Approach
Enter ...
Keeping The Public Safe From Festive Scams
"While the festive season should be a period of joy and goodwill, hackers are particularly active in Australia and have the ability to employ new, sophisticated tactics on consumers.
One emerging trend we're seeing is the use of AI-powered tools, with deepfake technologies allowing hackers to create convincing face-swapped videos and the ability to ...

When Post-Quantum Cryptography Is No Longer Post-Quantum
As quantum computing advances, the standards for Post-Quantum Cryptography (PQC) are evolving rapidly, with governments like Australia phasing out even selected PQC algorithms like ML-KEM-768 and ML-DSA-65 to maintain robust security. This article explores the challenges businesses face in adapting to these shifting standards, from resource demands to ...

The Cisco Live 2024 Rundown Featuring Splunk
At the hustling and bustling Melbourne Convention and Exhibition Centre, the 2024 edition of Cisco Live commenced with discussions on the future of cybersecurity and data management. With industry heavyweights like Tom Gillis, AJ Shipley, and Tom Casey at the helm, the event promises to redefine the paradigms of network security, artificial ...

Modernising Privileged Access Management To Combat Advanced ID-Based Cyber Threats
While identity-related threats are increasingly challenging, a well-implemented PAM strategy can transform security postures. By securing paths to privilege, businesses reduce their attack surfaces, making it harder for cybercriminals to exploit identities.
Proactive Measures for Businesses to Achieve Effective Cyber Hygiene Practices
Cybercrime rates in Australia have surged, with online attacks averaging out to one every six minutes, according to the Australian Signals Directorate (ASD).(1) For organisations, one of the most common attacks is email compromise, which involves manipulating individuals into unauthorised financial transactions or the disclosure of sensitive company ...
No results found.
In The News
Kumail Nanjiani Featured Speaker at Datadog’s DASH Conference in New York
SYDNEY, AUSTRALIA -- Datadog, Inc. (NASDAQ: DDOG), the monitoring and security platform for cloud applications, recently unveiled new speakers for its annual DASH conference, taking place June 10-11, 2025 at North Javits Center in New York City. Kumail Nanjiani, the Oscar- and Emmy-nominated actor, writer and comedian known for The Big Sick, Silicon ...
Macquarie Cloud Services Collaborates with CAUDIT to Advance IT In Education
Macquarie Cloud Services has announced the launch of CAUDIT Cloud, a purpose-built cloud solution for research and education, designed in collaboration with CAUDIT, the peak body for ICT in the higher education and research sectors across Australasia, to support the full spectrum of university ICT needs.
Burdened by the growing pressure of budget ...
Yadi Narayana Returns to Datadog As CTO for Asia-Pacific and Japan
Datadog, Inc. (NASDAQ: DDOG), the monitoring and security platform for cloud applications, has appointed Yadi Narayana as Field CTO for Asia-Pacific and Japan (APJ).
In this newly-created role, Narayana will leverage his more than 20 years of global experience in business development, product development and solutions engineering to advise on and ...
Commvault and Deloitte Join Forces to Boost Cyber Resilience and Incident Response
Commvault, a global leader in cyber resilience and data protection for hybrid cloud environments, has announced a strategic alliance with Deloitte aimed at enhancing enterprise cyber resilience and incident response capabilities.
The partnership comes as organisations face growing pressure to adapt to a fast-evolving threat landscape. According to ...
Cyber Frontlines: Hacktivist Surge Mirrors Escalating India-Pakistan Border Tensions
As geopolitical tensions flare between India and Pakistan following Operation Sindoor—the largest Indian cross-border strike since 1971—a parallel conflict is intensifying in cyberspace. Hacktivist groups aligned along political, religious, and nationalist lines are launching a wave of distributed denial-of-service (DDoS) attacks and cyber disruption ...
Sophos Accelerates Business Growth and Profitability for MSPs with the Launch of MSP Elevate Program
Sophos recently launched MSP Elevate, a new business-accelerating program for managed service providers (MSPs). With the new program, Sophos enables MSPs to expand their business with high-value, differentiated cybersecurity offerings that elevate their customers’ cyber defenses and rewards growth with additional investment to fuel further ...
Motorola Solutions Offers Assist Chat to all U.S. Public Safety Agencies Cost-Free and Expands AI Across Portfolio to Deliver Priority Intelligence to More Roles
Motorola Solutions today kicked off Summit 2025, its premier technology users conference, by announcing it is extending the capabilities of Assist, its public safety AI, to more people in more roles – from dispatch to investigations – to help prioritise what’s most important. The company will enable all public safety agencies with a complimentary ...
May Patch Tuesday Commentary from Tenable
Microsoft patched 71 CVEs in its May 2025 Patch Tuesday release, with five rated critical and 66 rated as important. Remote code execution (RCE) vulnerabilities accounted for 39.4% of the vulnerabilities patched this month, followed by elevation of privilege (EoP) vulnerabilities at 25.4%.
“For May 2025, Microsoft patched seven zero-day ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..