The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

AI Domination and Quantum Computing on the Horizon
Over the last few years we all know there has been transformative changes in the workplace, the critical role of technology, and the ongoing debate between remote and in-office work. Enterprises are still pushing for staff to come into the office more frequently and are finding persuasive ways to entice their employees back into the building. I sat ...

Human-centric Cybersecurity: The First Line of Defence
Introduction
Australian organisations face an array of cybersecurity challenges that didn’t exist half a decade ago.
And yet the reliance on traditional security and legacy systems is largely the status quo – often falling short in addressing the nuanced interplay between human behaviour and technological vulnerabilities.
A New Approach
Enter ...
Keeping The Public Safe From Festive Scams
"While the festive season should be a period of joy and goodwill, hackers are particularly active in Australia and have the ability to employ new, sophisticated tactics on consumers.
One emerging trend we're seeing is the use of AI-powered tools, with deepfake technologies allowing hackers to create convincing face-swapped videos and the ability to ...

When Post-Quantum Cryptography Is No Longer Post-Quantum
As quantum computing advances, the standards for Post-Quantum Cryptography (PQC) are evolving rapidly, with governments like Australia phasing out even selected PQC algorithms like ML-KEM-768 and ML-DSA-65 to maintain robust security. This article explores the challenges businesses face in adapting to these shifting standards, from resource demands to ...

The Cisco Live 2024 Rundown Featuring Splunk
At the hustling and bustling Melbourne Convention and Exhibition Centre, the 2024 edition of Cisco Live commenced with discussions on the future of cybersecurity and data management. With industry heavyweights like Tom Gillis, AJ Shipley, and Tom Casey at the helm, the event promises to redefine the paradigms of network security, artificial ...

Modernising Privileged Access Management To Combat Advanced ID-Based Cyber Threats
While identity-related threats are increasingly challenging, a well-implemented PAM strategy can transform security postures. By securing paths to privilege, businesses reduce their attack surfaces, making it harder for cybercriminals to exploit identities.
Proactive Measures for Businesses to Achieve Effective Cyber Hygiene Practices
Cybercrime rates in Australia have surged, with online attacks averaging out to one every six minutes, according to the Australian Signals Directorate (ASD).(1) For organisations, one of the most common attacks is email compromise, which involves manipulating individuals into unauthorised financial transactions or the disclosure of sensitive company ...

Antifragility – The Essential Strategy for Modern Cyber Defense
Agnidipta Sarkar, VP CISO Advisory, explores how Nassim Taleb's concept of antifragility enhances cyber defense strategies.
No results found.
In The News
NAB Strengthens Digital Banking Protections In Fight Against Scammers
· Simple and secure facial identification check introduced
· Check to be used when new customers open accounts in digital channels
· Initiative part of bank-wide scam strategy to protect customers
Cisco Australia & New Zealand Announces New Vice President Stefan Leitl
Stefan Leitl will lead all aspects of Cisco’s Australia and New Zealand business and returns to Melbourne after six years in Silicon Valley with Cisco.
Leitl brings over a decade of Cisco experience, most recently as Global Vice President for Industrial IoT Sales in which he helped global customers securely connect and manage critical infrastructure ...
Macquarie Bank Joins BioCatch Trust™
Network now protects more than 85% of Australians from fraud and scams
ISACA Introduces First And Only AI-Centric Security Management Certification
Ninety-five percent of digital trust professionals are worried that generative AI will be exploited by bad actors, according to the latest AI Pulse Poll from ISACA, the leading global professional association advancing digital trust. With AI heightening cyber threats and increasing the demand for skilled security professionals who can effectively ...
Tenable Names Matthew Brown as Chief Financial Officer
Tenable® (NASDAQ: TENB), the exposure management company, today announced the appointment of Matthew Brown as Chief Financial Officer, effective immediately. Brown succeeds Steve Vintz, who recently was appointed as a Co-Chief Executive Officer of the Company alongside Mark Thurmond.
Brown is an accomplished public company finance leader with more ...
Tecton is Joining Databricks to Power Real-Time Data for Personalised AI Agents
Databricks, the Data and AI company, announced that Tecton will soon be joining Databricks. Tecton is the leading real-time enterprise feature store that helps enterprises leverage their mission-critical data to power AI agents for use cases like fraud detection, risk scoring, and personalisation. By preparing, curating and serving critical AI context ...
KnowBe4 Report Reveals Global Financial Sector Faces Unprecedented Cyber Threat Surge
Research shows financial institutions experience up to 300 times more cyberattacks than other sectors, with large banks reporting 45% of employees susceptible to phishing attacks
Claroty Appoints Former Ford Data & AI Chief to Lead Product and R&D Organisation
Gil Gur Arie joins as Chief Product Officer to oversee product strategy and development for company’s cyber-physical systems protection platform
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
