The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Cisco Live 2024 Rundown Featuring Splunk

The Cisco Live 2024 Rundown Featuring Splunk

At the hustling and bustling Melbourne Convention and Exhibition Centre, the 2024 edition of Cisco Live commenced with discussions on the future of cybersecurity and data management. With industry heavyweights like Tom Gillis, AJ Shipley, and Tom Casey at the helm, the event promises to redefine the paradigms of network security, artificial ...
Modernising Privileged Access Management To Combat Advanced ID-Based Cyber Threats

Modernising Privileged Access Management To Combat Advanced ID-Based Cyber Threats

While identity-related threats are increasingly challenging, a well-implemented PAM strategy can transform security postures. By securing paths to privilege, businesses reduce their attack surfaces, making it harder for cybercriminals to exploit identities.
Proactive Measures for Businesses to Achieve Effective Cyber Hygiene Practices

Proactive Measures for Businesses to Achieve Effective Cyber Hygiene Practices

Cybercrime rates in Australia have surged, with online attacks averaging out to one every six minutes, according to the Australian Signals Directorate (ASD).(1) For organisations, one of the most common attacks is email compromise, which involves manipulating individuals into unauthorised financial transactions or the disclosure of sensitive company ...
Antifragility – The Essential Strategy for Modern Cyber Defense

Antifragility – The Essential Strategy for Modern Cyber Defense

Agnidipta Sarkar, VP CISO Advisory, explores how Nassim Taleb's concept of antifragility enhances cyber defense strategies.
The Five Step Journey To Securing Australia’s Most Important Data Assets

The Five Step Journey To Securing Australia’s Most Important Data Assets

Securing information assets to be resilient against a broad spectrum of threats is a journey many Australian organisations find themselves on. A steady stream of data breach disclosures - and a desire not to join that list - is keeping them motivated to stay the course. For banks and other financial entities, there’s additional motivation in the form ...
AI’s Transformative Role In Corporate Governance

AI’s Transformative Role In Corporate Governance

Corporate governance is on the brink of a major transformation driven by artificial intelligence (AI), which is already reshaping the way organisations operate. As we move deeper into the Fifth Industrial Revolution, AI is no longer a distant concept, but a central force that has fundamentally altered how companies are making strategic decisions, ...
Secure-By-Design Is A Significant Exercise, But The Rewards Are Significant, Too

Secure-By-Design Is A Significant Exercise, But The Rewards Are Significant, Too

Concerted multilateral efforts are underway to influence and change developer behaviour when it comes to secure software creation.
Cloud-Based Post-Quantum Cryptography (PQC) vs Local PQC: Not as Straightforward as You’d Think

Cloud-Based Post-Quantum Cryptography (PQC) vs Local PQC: Not as Straightforward as You’d Think

As quantum computing advances, organisations face a critical choice in adopting Post-Quantum Cryptography (PQC): cloud-based or local deployment. This article explores the benefits of cloud-based PQC, including improved performance by offloading heavy computations, enhanced security managed by specialised providers, seamless scalability, and simplified ...
No results found.

In The News

Falcon Next-Gen Identity Security Innovations Expand Unified Protection for Every Identity, Closing the Gaps Legacy Solutions Create

Falcon Next-Gen Identity Security Innovations Expand Unified Protection for Every Identity, Closing the Gaps Legacy Solutions Create

Phishing-resistant MFA, enhanced privileged access, and identity-driven case management strengthen unified initial access, privilege control, and SOC response across human and agent identities
CrowdStrike Delivers Unified Data Protection for the AI Era

CrowdStrike Delivers Unified Data Protection for the AI Era

Falcon Data Protection expands GenAI data protection to local apps and runtime cloud environments; unveils new innovations to replace legacy data loss and posture management tools with real-time, unified protection across endpoint, cloud, SaaS, and GenAI
Palo Alto Networks Recognises Leading Asia-Pacific and Japan Partners at 2025 Partner Executive Kick-Off

Palo Alto Networks Recognises Leading Asia-Pacific and Japan Partners at 2025 Partner Executive Kick-Off

Palo Alto Networks® (NASDAQ: PANW), the global cybersecurity leader, today announced the winners of its 2025 Asia-Pacific and Japan Partner Awards at the Palo Alto Networks Partner Executive Kick-Off (PEKO). The annual awards recognise and celebrate the top partners of the year, those who have showcased outstanding contributions and unwavering ...
New Report Finds 49% of Security Professionals Say Global Economic Policies and Geopolitical Tensions Increase Risk to Cyber-physical Environments

New Report Finds 49% of Security Professionals Say Global Economic Policies and Geopolitical Tensions Increase Risk to Cyber-physical Environments

Global survey by Claroty uncovers how organisations are navigating an uncertain economic landscape to secure mission-critical infrastructure
Cohesity and Semperis Announce Groundbreaking Offering That Unifies Data and Identity Resilience

Cohesity and Semperis Announce Groundbreaking Offering That Unifies Data and Identity Resilience

Cohesity and Semperis today announced a new product, Cohesity Identity Resilience, powered by Semperis, to defend enterprises’ critical Identity infrastructure, including Microsoft Active Directory assets, from cyberattacks.
ManageEngine Strengthens Its Unified Security Platform With Reengineered Detection, Reducing Alert Fatigue for SOC Teams

ManageEngine Strengthens Its Unified Security Platform With Reengineered Detection, Reducing Alert Fatigue for SOC Teams

New Capabilities in Log360 Tackle False Positives, Keep Threat Coverage Current, and Enable Scaling With Enterprise Demand
Cohesity Extends Cyber Resilience Leadership with New Security Innovations and Partnerships

Cohesity Extends Cyber Resilience Leadership with New Security Innovations and Partnerships

Cohesity today announced multiple cyber resilience breakthroughs at the company’s Catalyst 1 Data Security Summit, extending its pioneering Five-Step Cyber Resilience Framework to companies and governments. These innovations include unmatched protection for compute, container, storage, and database workloads across the three leading hyperscale clouds, ...
New Relic Study Reveals Australian and New Zealand Businesses Face Hourly Costs of up to $3 Million from High-Impact IT Outages

New Relic Study Reveals Australian and New Zealand Businesses Face Hourly Costs of up to $3 Million from High-Impact IT Outages

“To stay ahead of the curve, businesses across Australia and New Zealand need to prioritise reducing tool sprawl and data siloes so engineers can detect and resolve critical issues fast. With high-business impact outages costing up to $3 million per hour in lost revenue, organisations can no longer ignore the costs associated with maintaining the status quo.”
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This