The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

What Do Gauss and Euler Handshakes Have to Do with “Infinite Microsegmentation Policy Impact Simulation”?
Explore how math concepts from Gauss and Euler solve cybersecurity challenges, enabling scalable microsegmentation with infinite policy impact simulation.

NetApp Is Committed To Helping Entities Build Their Own AI Factories
So much is going on with NetApp according to Jeff Baxter, Vice President of Product Marketing at NetApp. Baxter provided details about the latest NetApp product announcements and the future trajectory of artificial intelligence (AI) and cybersecurity within the industry.
Understanding ONTAP: The Foundation of Data Management
The introduction to ...

Revolutionising Government with a Modular, AI-Driven Platform
Utilising low-code platforms with modular features more seamlessly allow government agencies to efficiently and effectively meet the ever-changing needs of their citizens. They are contributing to government at all levels to increase cost efficiency, become more agile, whilst remaining compliant and better prepared for the future.

Debunking Three Common Myths About Data Protection
Introduction
Data protection is no longer an afterthought but a daily priority for businesses. While Australia's regulations like the Privacy Act and the Notifiable Data Breaches (NDB) scheme are crucial, the average cost of a data breach globally is now $4.45 million. For Australian enterprises, the financial hit can be devastating, especially if ...

Ensuring Secure Content in the Era of Digital Transformation
Introduction
In today’s digital landscape, safeguarding sensitive information, be it in transit, at rest, or in use, has become more crucial. As public and private organisations continue to embrace digital transformation, the risk of data breaches and unauthorised access has grown exponentially.
As creating and sharing documents from anywhere ...

Boosting Software Security With a Binary Approach
Introduction
The discovery of a leaked access token earlier this year that could have opened the door to malicious code being injected into one of the world’s most widespread programming languages has shone a light on why the method we use to search for security issues in software matters.
The access token, discovered by the JFrog Security Research ...

The Goal Is To Alleviate The Administrative Burden In Healthcare
Stephanie Trunzo, Senior Vice President and General Manager at Oracle Industry. Trunzo dives deep into the changes Oracle Industries is bringing to the healthcare sector with applied AI and an open healthcare platform and what this actually means.
Trunzo led with Oracle Industries' approach, which integrates specific industry needs into general ...

A Pledge to Secure Healthcare
Discover why hospitals and healthcare providers are prime targets for cyberattacks and how strategies like microsegmentation can ensure patient safety.
No results found.
In The News
AI-driven Cyber Attacks and Supply Chain Vulnerabilities Escalate Risk Landscape In Australia, Aon Report Finds
Aon plc (NYSE: AON), a leading global professional services firm, has released the Australia-specific findings from its 2025 Cyber Risk Report. The report highlights the growing impact of artificial intelligence (AI)-enabled cyber attacks and the increasing exposure created by third-party technology supply chains.
The report reveals that Australian ...
BioCatch Trust™ Wins Datos Insights Impact Award for Best Scam-prevention Solution
Trust Australia evaluates $320 billion in payments with exceptional scam-detection rates
Semperis Releases New ‘Service Account Protection Essential’ Platform to Secure Active Directory Service Accounts
The new edition of DSP, Semperis’ comprehensive identity threat detection and response platform, helps organisations understand and improve service account security posture with comprehensive visibility, continuous monitoring, and real-time alerting
HID Unveils Advanced Biometric Facial Recognition and New Passwordless Authentication Technology at the Security Exhibition & Conference in Sydney – HID to showcase innovative identity and access technologies
HID, a global leader in trusted identity and access control solutions will unveil HID Amico™ biometric facial recognition readers and the new portable OMNIKEY® SE Plug authentication reader at the 2025 Security Exhibition & Conference in Sydney on August 27. The newly launched FIDO-enabled cards and Mercury Intelligent controllers will also be ...
Darktrace and SB C&S Corp Enter Into Distributor Agreement
Darktrace Limited (hereinafter “Darktrace”) and SB C&S Corp. (hereinafter “SB C&S”) have entered into a distribution agreement to provide Darktrace's innovative AI-based “ActiveAI Security Platform” to companies in Japan and will begin handling the product on August 20, 2025.
In recent years, the frequency of cyber security incidents has ...
Rapid7 Launches Vector Command Advanced, Empowering Security Teams to Understand and Validate Exposures with Expertise of Elite Red Teamers
Rapid7 has launched Vector Command Advanced, expanding its continuous red teaming and exposure validation service.
LevelBlue Completes Acquisition of Trustwave to Form the World’s Largest Pure-Play Managed Security Services Provider
August 20, 2025 – LevelBlue, a global leader in cloud-based, artificial intelligence (AI)-driven managed security services (MSS), has completed its acquisition of Trustwave, a global provider of cybersecurity and managed detection and response (MDR) leader.
Today’s acquisition establishes LevelBlue as the world’s largest pure-play MSSP with the ...
New Fastly Threat Research Reveals AI Crawlers Make Up Almost 80% of AI Bot Traffic, Meta Leads AI Crawling As ChatGPT Dominates Real-Time Web Traffic
AI bots are driving increased content scraping, operational load, and high-frequency access patterns, revealing emerging risks from unverified automation traffic.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
