The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Role of Secure Information Architecture in Transforming Modern Workspaces

The Role of Secure Information Architecture in Transforming Modern Workspaces

Best practice information architecture is essential for business leaders and IT decision-makers to secure data, streamline operations, and empower teams to work efficiently. According to the 2024 Konica Minolta Australian IT Trends: Driving Digital Transformation Report, nearly one-third of organisations are dissatisfied with their IT infrastructure.1 ...
Same, Same But Not Different.

Same, Same But Not Different.

The first few weeks of the year signals the back to work influx, in many cases now also a return to the office, from the suburbs to the city. For the vast majority, even in 2025, it means back to the same desk and view surrounded by the same people who most likely did the same things during the 2025 Summer as they did during 2024 or any other summer ...
Building ExeQuantum: The Challenges of Innovating in a Market That Doesn’t Know It’s at Risk Yet

Building ExeQuantum: The Challenges of Innovating in a Market That Doesn’t Know It’s at Risk Yet

As the CEO of ExeQuantum, I spend my days immersed in the world of post-quantum cryptography (PQC), a space that feels both ahead of its time and painfully urgent. The irony is clear, while the quantum threat is rapidly approaching, most industries still treat security as an afterthought, something to worry about later. The frustrating part? "Later" ...
Exploiting Medical Devices: Attack Vectors, Cyber Threats, and Advanced Defense Mechanisms

Exploiting Medical Devices: Attack Vectors, Cyber Threats, and Advanced Defense Mechanisms

Explore advanced strategies to protect medical devices from cyberattacks, ensuring patient safety and healthcare integrity.
What’s New in Microsegmentation in 2025

What’s New in Microsegmentation in 2025

Know what microsegmentation vendors are offering in 2025 to boost zero trust strategies and counter advanced cyber threats.
The Four Horsemen of Emerging Tech: How Quantum Computing, AI, Blockchain, and Cybersecurity Are Shaping the Future

The Four Horsemen of Emerging Tech: How Quantum Computing, AI, Blockchain, and Cybersecurity Are Shaping the Future

The convergence of Quantum Computing, AI, Blockchain, and Cybersecurity is redefining the technological landscape. These interconnected innovations are revolutionizing industries and reshaping digital trust, security, and efficiency. Understanding their relationships is crucial for future preparedness.
Bret Arsenault – CVP, Global Chief Security Advisor at Microsoft

Bret Arsenault – CVP, Global Chief Security Advisor at Microsoft

Watch The Interview  Biography Bret Arsenault is Microsoft's Chief Cybersecurity Advisor, responsible for advancing critical security initiatives and escalating impact across the entire Microsoft ecosystem: company, partners, customers, government agencies, and important communities. As Chief Information Security Officer for 14 years, Bret was ...
Under Attack: Exposing Upscale Hacktivist DDoS Tactics

Under Attack: Exposing Upscale Hacktivist DDoS Tactics

This article explores the motives of hacktivist web-DDoS attacks on Australian assets, including government websites.
No results found.

In The News

Macquarie Telecom and Netskope Partner to Strengthen and Simplify Network, Cloud, and AI Security for Australian Organisations

Macquarie Telecom and Netskope Partner to Strengthen and Simplify Network, Cloud, and AI Security for Australian Organisations

Macquarie Telecom and Netskope today announced a new partnership to simplify how Australian organisations secure and accelerate their use of data, cloud, and AI applications, improving their overall cybersecurity posture. By integrating Netskope’s industry-leading Security Service Edge (SSE) platform with Macquarie Telecom’s software-defined wide ...
SailPoint Ushers In New Era of Adaptive Identity With the SailPoint Platform

SailPoint Ushers In New Era of Adaptive Identity With the SailPoint Platform

With a wave of new capabilities, SailPoint sets the direction for unifying identity, data and security with design partners CVS, Equinix, NVIDIA, VSP, and more
Dynatrace Achieves the AWS Generative AI Competency

Dynatrace Achieves the AWS Generative AI Competency

New milestone affirms Dynatrace ability to deliver enterprise-grade observability for generative AI applications on AWS
CyberArk Is a Proud Participant in the Microsoft Security Store Partner Ecosystem

CyberArk Is a Proud Participant in the Microsoft Security Store Partner Ecosystem

Streamlined deployment and seamless integration of pre-validated solutions  Customers get accelerated access to CyberArk’s trusted, innovative identity security platform  CyberArk and Microsoft are collaborating to shape the future of cybersecurity 
SailPoint Advances Identity Security to Deliver Visibility, Control and Scale Across Every Enterprise Identity

SailPoint Advances Identity Security to Deliver Visibility, Control and Scale Across Every Enterprise Identity

Delivering new capabilities in cloud, non-employee risk management, machine identity, and connectivity to strengthen enterprise identity security
Databricks Announces Data Intelligence for Cybersecurity 

Databricks Announces Data Intelligence for Cybersecurity 

The only unified platform for AI agent systems, enabling more accurate, real-time response against AI-driven threats
Check Point Enters Next Level of Strategic Partnership with Wiz to Deliver Integrated CNAPP and Cloud Network Security Solution

Check Point Enters Next Level of Strategic Partnership with Wiz to Deliver Integrated CNAPP and Cloud Network Security Solution

Building on February’s partnership announcement, Check Point and Wiz unveil unified Cloud Security Solution with Real-Time Visibility and AI-Powered Prevention 
New ISACA Study: Fewer Australian Enterprises Are Training Staff For Security Roles Despite Understaffed Teams

New ISACA Study: Fewer Australian Enterprises Are Training Staff For Security Roles Despite Understaffed Teams

ISACA’s State of Cybersecurity 2025 survey report also finds that 70 percent of security professionals expect the demand for technical cybersecurity pros to rise in the next year
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This