The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How Quantum Random Number Generators Can Amplify the Power of Post Quantum Cryptography

How Quantum Random Number Generators Can Amplify the Power of Post Quantum Cryptography

The development of quantum computing is driving the need for new cryptographic methods that can resist future quantum-based attacks. Among the most promising techniques in post-quantum cryptography are Module Lattice-based Key Encapsulation Mechanisms (ML-KEM) and Module Lattice-based Digital Signature Algorithms (ML-DSA). These methods leverage the ...
What Do Gauss and Euler Handshakes Have to Do with “Infinite Microsegmentation Policy Impact Simulation”?

What Do Gauss and Euler Handshakes Have to Do with “Infinite Microsegmentation Policy Impact Simulation”?

Explore how math concepts from Gauss and Euler solve cybersecurity challenges, enabling scalable microsegmentation with infinite policy impact simulation.
NetApp Is Committed To Helping Entities Build Their Own AI Factories

NetApp Is Committed To Helping Entities Build Their Own AI Factories

So much is going on with NetApp according to Jeff Baxter, Vice President of Product Marketing at NetApp. Baxter provided details about the latest NetApp product announcements and the future trajectory of artificial intelligence (AI) and cybersecurity within the industry. Understanding ONTAP: The Foundation of Data Management The introduction to ...
Revolutionising Government with a Modular, AI-Driven Platform

Revolutionising Government with a Modular, AI-Driven Platform

Utilising low-code platforms with modular features more seamlessly allow government agencies to efficiently and effectively meet the ever-changing needs of their citizens. They are contributing to government at all levels to increase cost efficiency, become more agile, whilst remaining compliant and better prepared for the future.
Debunking Three Common Myths About Data Protection

Debunking Three Common Myths About Data Protection

Introduction Data protection is no longer an afterthought but a daily priority for businesses. While Australia's regulations like the Privacy Act and the Notifiable Data Breaches (NDB) scheme are crucial, the average cost of a data breach globally is now $4.45 million. For Australian enterprises, the financial hit can be devastating, especially if ...
Ensuring Secure Content in the Era of Digital Transformation

Ensuring Secure Content in the Era of Digital Transformation

Introduction In today’s digital landscape, safeguarding sensitive information, be it in transit, at rest, or in use, has become more crucial. As public and private organisations continue to embrace digital transformation, the risk of data breaches and unauthorised access has grown exponentially.   As creating and sharing documents from anywhere ...
Boosting Software Security With a Binary Approach

Boosting Software Security With a Binary Approach

Introduction The discovery of a leaked access token earlier this year that could have opened the door to malicious code being injected into one of the world’s most widespread programming languages has shone a light on why the method we use to search for security issues in software matters. The access token, discovered by the JFrog Security Research ...
The Goal Is To Alleviate The Administrative Burden In Healthcare

The Goal Is To Alleviate The Administrative Burden In Healthcare

Stephanie Trunzo, Senior Vice President and General Manager at Oracle Industry. Trunzo dives deep into the changes Oracle Industries is bringing to the healthcare sector with applied AI and an open healthcare platform and what this actually means. Trunzo led with Oracle Industries' approach, which integrates specific industry needs into general ...
No results found.

In The News

SentinelOne Recognised As The Best Performing Vendor In Frost Radar™ Endpoint Security, 2025

SentinelOne Recognised As The Best Performing Vendor In Frost Radar™ Endpoint Security, 2025

Company’s AI-powered endpoint security earns best-in-class status with top marks for performance, growth, and innovation MOUNTAIN VIEW, CA – April 14, 2025 – SentinelOne® (NYSE: S), a global leader in AI-powered security, today announced it has been named the best performing vendor on the Frost Radar™: Endpoint Security, 2025, and a leader on both the ...
Elasticsearch Now Available As A Native Grounding Engine On Google Cloud’s Vertex AI Platform

Elasticsearch Now Available As A Native Grounding Engine On Google Cloud’s Vertex AI Platform

Integration streamlines RAG application development and eliminates the need for unnecessary APIs and data orchestration
Elastic Wins Two 2025 Google Cloud Partner Of The Year Awards

Elastic Wins Two 2025 Google Cloud Partner Of The Year Awards

Elastic, the Search AI Company, announced today that it has received two 2025 Google Cloud Partner of the Year Awards in the Artificial Intelligence category for Data Management & AI and Tooling.    Elastic is being recognised for its achievements in the Google Cloud ecosystem, helping joint customers simplify the process of developing and ...
Elastic Delivers Performance Gains For Users Running Elasticsearch On Google Axion Processors

Elastic Delivers Performance Gains For Users Running Elasticsearch On Google Axion Processors

Benchmarking shows Elasticsearch runs up to 40% faster on Google Axion Processor C4A
Elastic Announces General Availability Of LLM Observability For Google Cloud’s Vertex AI

Elastic Announces General Availability Of LLM Observability For Google Cloud’s Vertex AI

SREs can now monitor, analyse and optimise the performance of AI deployments using models from Vertex AI
CyberArk Unveils First-Of-Its-Kind Machine Identity Security Solution To Secure Workloads Across Every Environment

CyberArk Unveils First-Of-Its-Kind Machine Identity Security Solution To Secure Workloads Across Every Environment

Platform delivers the industry's most comprehensive protection for all non-human identities that matter Combines the application of unique and universal identities to all workloads with secrets management, reducing machine identity complexity and risk New discovery capabilities to provide contextual understanding of workload identity risk
Ping Identity Doubles Down on Partner Strategy with New Partner Program and Advisory Board

Ping Identity Doubles Down on Partner Strategy with New Partner Program and Advisory Board

Ping’s partner-first investments reinforce commitment to delivering exceptional experiences for partners and customers
CyberArk Announces Identity Security Solution to Secure AI Agents At Scale

CyberArk Announces Identity Security Solution to Secure AI Agents At Scale

Millions of autonomous, unpredictable AI agents represent new, rapidly expanding identity security attack surface New CyberArk end-to-end solution will help secure AI agents' privileged access across entire environment Delivered through the CyberArk Identity Security Platform, securing all identities - human, machine, and AI - in one place.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This