The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

2025 Cybersecurity Predictions by CyberArk
The cybersecurity landscape is poised for transformative shifts in 2025 driven by technological innovation and evolving threats. As cybercriminals become more sophisticated, organisations must stay ahead by proactively adopting strategies that prioritise identity security and business resiliency. Thomas Fikentscher, CyberArk’s Area Vice President for ...

How Breach Readiness Will Shape Cyber Defense In 2025
Rajesh Khazanchi, co-founder and CEO of ColorTokens, writes how breach ready strategies and AI-powered cyber defense can drive cyber resilience and protect your business.

AI Domination and Quantum Computing on the Horizon
Over the last few years we all know there has been transformative changes in the workplace, the critical role of technology, and the ongoing debate between remote and in-office work. Enterprises are still pushing for staff to come into the office more frequently and are finding persuasive ways to entice their employees back into the building. I sat ...

Human-centric Cybersecurity: The First Line of Defence
Introduction
Australian organisations face an array of cybersecurity challenges that didn’t exist half a decade ago.
And yet the reliance on traditional security and legacy systems is largely the status quo – often falling short in addressing the nuanced interplay between human behaviour and technological vulnerabilities.
A New Approach
Enter ...
Keeping The Public Safe From Festive Scams
"While the festive season should be a period of joy and goodwill, hackers are particularly active in Australia and have the ability to employ new, sophisticated tactics on consumers.
One emerging trend we're seeing is the use of AI-powered tools, with deepfake technologies allowing hackers to create convincing face-swapped videos and the ability to ...

When Post-Quantum Cryptography Is No Longer Post-Quantum
As quantum computing advances, the standards for Post-Quantum Cryptography (PQC) are evolving rapidly, with governments like Australia phasing out even selected PQC algorithms like ML-KEM-768 and ML-DSA-65 to maintain robust security. This article explores the challenges businesses face in adapting to these shifting standards, from resource demands to ...

The Cisco Live 2024 Rundown Featuring Splunk
At the hustling and bustling Melbourne Convention and Exhibition Centre, the 2024 edition of Cisco Live commenced with discussions on the future of cybersecurity and data management. With industry heavyweights like Tom Gillis, AJ Shipley, and Tom Casey at the helm, the event promises to redefine the paradigms of network security, artificial ...

Modernising Privileged Access Management To Combat Advanced ID-Based Cyber Threats
While identity-related threats are increasingly challenging, a well-implemented PAM strategy can transform security postures. By securing paths to privilege, businesses reduce their attack surfaces, making it harder for cybercriminals to exploit identities.
No results found.
In The News
CrowdStrike to Acquire Pangea to Secure Every Layer of Enterprise AI
With AI prompt-layer protection for secure enterprise AI development and workforce usage, CrowdStrike will deliver the industry’s first complete AI Detection and Response (AIDR)
CrowdStrike Unveils the Falcon Platform Fall Release to Lead Cybersecurity into the Agentic Era
Revolutionizing the Falcon platform with the industry’s richest AI-ready data layer – the foundation for unifying human and agent-based security
BeyondTrust Delivers Identity Security Controls for AI, Turning Agent Visibility into Action
BeyondTrust delivers three powerful capabilities to Identity Security Insights® and BeyondTrust Pathfinder Platform customers today: AI Agent Insights, secure Model Context Protocol (MCP) orchestration, and an omnipresent AI decision-support layer; the first production-ready identity security controls for the new era of agentic AI
Cyber Security Predictions for 2026
Among the key trends, Excite Cyber, CEO, Bryan Saba highlights new AI regulations, stronger governance over LLM development and predicts cyber risks will become encompassed in comprehensive enterprise-wide business risk registers and demand will surge for digital forensics training. Excite Cyber also anticipates that Australia will see rapid adoption ...
Exabeam and Cribl Partner to Power Scalable, High-Fidelity Threat Detection with Next-Gen Data Pipelines
Partnership advances an outcome-driven data strategy, decoupling security outcomes from data volume
Swift AI Innovation Creates Blueprint for Banks to Stop Fraud Faster Through Cross-Border Collaboration
Swift and 13 international banks doubled real time fraud detection in trials involving ten million test transactions Privacy-enhancing technologies enabled institutions to share transaction data while maintaining end-to-end privacy and security Used at scale, this technology could enable a joined-up fraud defence across global finance, lead to faster ...
Canalys Study Finds Every $1 of Falcon Platform Sales Leads Up to $7 in Partner Services Revenue
Independent research validates Falcon platform transformation as the leading engine of partner profitability, fueling growth and sustained returns
CrowdStrike and Meta Deliver New Benchmarks for the Evaluation of AI Performance in Cybersecurity
New benchmarks define how LLMs should be tested in the SOC – measuring real threats, workflows, and outcomes to help defenders
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
