The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

How Organisations Can Achieve Secure-By-Design By 2030
Secure-by-design is no longer a futuristic ideal - it is an imperative for organisations aiming to fortify their cybersecurity defences by 2030. Achieving this transformation requires leadership commitment, developer education, and a shift in corporate culture.

Teachers Need to Focus on Teaching – AI’s Role in Classrooms
At the Microsoft AI Tour 2024, Leigh Williams, Chief Information Officer and IT Executive at Brisbane Catholic Education, shared her opinion on how Artificial Intelligence (AI) is reshaping the education arena. From reducing administrative burdens on teachers to enabling hyper-personalised learning, AI is assisting the way students engage with their ...

AI is No Longer an Option – It’s Essential According to the AFP
Introduction
The Australian Federal Police (AFP) shared at the Microsoft AI Tour 2024, how artificial intelligence (AI) is remoulding crime prevention, particularly in handling large amounts of data and countering cyber threats. Ben Lamont, Chief Data Officer at AFP, and Helen Schneider, leader of the Australian Centre to Counter Child Exploitation ...

The New Secure Communications Realities for Governments
With the security of messaging apps once again in question, find out everything you need to know about ensuring the highest levels of security for high-stakes government communications. Only one solution is certified to meet all the requirements for modern, government-grade communications security: BlackBerry® SecuSUITE® from BlackBerry Secure Communications.
RedCurl’s Ransomware Debut
Introduction
This research, conducted by Bitdefender Labs, presents the first documented analysis of a ransomware campaign attributed to the RedCurl group (also known as Earth Kapre or Red Wolf). RedCurl has historically maintained a low profile, relying heavily on Living-off-the-Land (LOTL) techniques for corporate cyberespionage and data ...

Countering Pockets of Resistance to Cybersecurity Action
The real issue today for cybersecurity leaders is understanding and navigating the complexity and broader challenges of user adoption and resistance, bringing some key strategies to limit resistance to bear. In this way, the rate of adoption versus resistance can become a measure of success of the project, not an inhibitor to it.

Securing AI Innovation: Why the Fundamentals of Cybersecurity Still Matter
Richard Seiersen argues that while AI continues to make waves in cybersecurity, the fundamentals of cybersecurity remain unchanged — and organisations shouldn’t be distracted by the noise, nor should the core security principles require a radical rethink. Quoting French writer Alphonse Karr, “The more things change, the more they stay the same”.

The Rise of AI-Powered Sectional and Differential Attacks: A Growing Threat to Symmetric Encryption
Artificial intelligence (AI) is revolutionizing cryptanalysis, making traditional symmetric key encryption increasingly vulnerable. AI-driven differential and sectional attacks can now exploit minor weaknesses in encryption schemes with unprecedented efficiency. Organizations must adopt crypto-resilient architectures like Quantum-Powered Encryption ...
No results found.
In The News
Fortinet Delivers Isolated Infrastructure Acceleration for the AI Factory with NVIDIA
Collaboration integrates firewalling, segmentation, and policy enforcement directly into NVIDIA BlueField-accelerated infrastructure for higher performance, stronger isolation, and simpler operations
Sophos XDR Delivers 100% Detection Coverage In the Latest MITRE ATT&CK Evaluation
Sophos today announced its best-ever results in the MITRE ATT&CK® Enterprise 2025 Evaluation. Sophos XDR detected 100% of adversary behaviours (sub-steps)1 across two complex attack scenarios: Scattered Spider, which Sophos X-Ops tracks as GOLD HARVEST, a financially motivated cybercriminal collective, and Mustang Panda, which Sophos X-Ops tracks ...
Macquarie Technology Announces Director Appointment and a New Group Executive
Macquarie Technology Group today announced the appointment of Luke Clifton as Director of Macquarie Technology Operations Pty Ltd as the company continues to scale across telecommunications, cloud, cybersecurity, and data centres.
Clifton, who after nearly 15 years in senior leadership, including more than a decade leading Macquarie Telecom, has ...
Kyndryl Unveils Quantum Safe Assessment Service to Enable Enterprise Readiness for the Quantum Era
New service helps organisations identify cryptographic vulnerabilities and build scalable post-quantum strategies
Cloudflare Publishes Top Internet Trends for 2025
Intensifying bot wars, a sharp rise in attacks on civil society organisations, and rapid progress in post-quantum encryption mark a pivotal year online.
GitHub: Australian Public Sector AI Adoption to Expand in 2026, ROI Takes Centre Stage
Sharryn Napier, VP, GitHub, shares her predictions for 2026 in the wake of 2 million+ developers in Australia now building on the platform and as the government announces its National AI Plan.
DroneShield Secures $49.6M European Military Contract
DroneShield Limited (ASX:DRO) has announced it has received a contract for $49.6 million from an in-region European reseller that is contractually required to distribute the products to a European military end-customer. The contract is for handheld counter-drone systems, associated accessories, and software updates. DroneShield has a large portion of ...
CrowdStrike Announces the General Availability of Falcon AI Detection and Response to Secure the New AI Attack Surface
With unified AI prompt-layer protection, CrowdStrike secures enterprise AI everywhere it happens – from development through workforce usage
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
