The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Unmasking the SYS01 InfoStealer Threat: Bitdefender Labs Tracks Global Malvertising Campaign Targeting Meta Business Pages

Unmasking the SYS01 InfoStealer Threat: Bitdefender Labs Tracks Global Malvertising Campaign Targeting Meta Business Pages

In a digital world where advertising is king, businesses and organisations are not the only ones using this powerful tool. Cybercriminals have a knack for exploiting the engine that powers online platforms by corrupting the vast reach of advertising to distribute malware en masse. While legitimate businesses rely on ads to reach new audiences, ...
Cybersecurity is Everyone’s Business: Navigating Our Digital Lives

Cybersecurity is Everyone’s Business: Navigating Our Digital Lives

As Cybersecurity Awareness Month draws to a close, the message "Cybersecurity is Everyone's Business" remains vital. Despite fewer high-profile breaches making headlines, cyber threats are still very much present. Just this month, Australian companies like Funlab, Perfection Fresh and Road Distribution Services were targeted by cyberattacks, ...
How NetApp’s Government Relations are Shaping Secure Tech

How NetApp’s Government Relations are Shaping Secure Tech

Kristen Verderame, Vice President of Global Government Relations at NetApp, shared the importance of government relations, public affairs, and cybersecurity in shaping the technology. Verderame shared a view on how companies like NetApp collaborate with various government bodies to support missions and develop cybersecurity frameworks. Representing ...
How Quantum Random Number Generators Can Amplify the Power of Post Quantum Cryptography

How Quantum Random Number Generators Can Amplify the Power of Post Quantum Cryptography

The development of quantum computing is driving the need for new cryptographic methods that can resist future quantum-based attacks. Among the most promising techniques in post-quantum cryptography are Module Lattice-based Key Encapsulation Mechanisms (ML-KEM) and Module Lattice-based Digital Signature Algorithms (ML-DSA). These methods leverage the ...
What Do Gauss and Euler Handshakes Have to Do with “Infinite Microsegmentation Policy Impact Simulation”?

What Do Gauss and Euler Handshakes Have to Do with “Infinite Microsegmentation Policy Impact Simulation”?

Explore how math concepts from Gauss and Euler solve cybersecurity challenges, enabling scalable microsegmentation with infinite policy impact simulation.
NetApp Is Committed To Helping Entities Build Their Own AI Factories

NetApp Is Committed To Helping Entities Build Their Own AI Factories

So much is going on with NetApp according to Jeff Baxter, Vice President of Product Marketing at NetApp. Baxter provided details about the latest NetApp product announcements and the future trajectory of artificial intelligence (AI) and cybersecurity within the industry. Understanding ONTAP: The Foundation of Data Management The introduction to ...
Revolutionising Government with a Modular, AI-Driven Platform

Revolutionising Government with a Modular, AI-Driven Platform

Utilising low-code platforms with modular features more seamlessly allow government agencies to efficiently and effectively meet the ever-changing needs of their citizens. They are contributing to government at all levels to increase cost efficiency, become more agile, whilst remaining compliant and better prepared for the future.
Debunking Three Common Myths About Data Protection

Debunking Three Common Myths About Data Protection

Introduction Data protection is no longer an afterthought but a daily priority for businesses. While Australia's regulations like the Privacy Act and the Notifiable Data Breaches (NDB) scheme are crucial, the average cost of a data breach globally is now $4.45 million. For Australian enterprises, the financial hit can be devastating, especially if ...
No results found.

In The News

Cisco and Splunk elevate the SOC with Agentic AI

Cisco and Splunk elevate the SOC with Agentic AI

Cisco today introduced Splunk Enterprise Security Essentials Edition and Splunk Enterprise Security Premier Edition, providing customers two agentic AI-powered SecOps options that unify security workflows across threat detection, investigation, and response (TDIR). Delivered within Splunk Enterprise Security 8.2 – a market-leading SIEM solution – these ...
Databricks Surpasses $4B Revenue Run-Rate, Exceeding $1B AI Revenue Run-Rate

Databricks Surpasses $4B Revenue Run-Rate, Exceeding $1B AI Revenue Run-Rate

SYDNEY, Australia — September 9, 2025 — Databricks, the Data and AI company, today announced it has crossed a $4 billion revenue run-rate during Q2, growing >50% year over year. Databricks’ AI products also recently crossed a $1 billion revenue run-rate. The company has also achieved positive free cash flow over the last 12 months. Finally, the ...
Singapore Tops Global AI Security Readiness, Yet Fears Shadow AI the Most

Singapore Tops Global AI Security Readiness, Yet Fears Shadow AI the Most

New Delinea research finds 62% of Singaporean firms grapple with Shadow AI at least monthly - fueling the highest global level of concern among business leaders 
The Machine Identity Gap: Only 28% of Australian Firms Ready for Secure AI

The Machine Identity Gap: Only 28% of Australian Firms Ready for Secure AI

Delinea research finds Australia ranks lowest in AI security readiness. Businesses are also worried about the high level of shadow AI.  
Quorum Cyber Reveals New Cybercriminal Tactics in Mid-Year Global Cyber Risk Outlook Report

Quorum Cyber Reveals New Cybercriminal Tactics in Mid-Year Global Cyber Risk Outlook Report

“What we’ve seen in H1 2025 is both striking and sobering. The sheer volume of new entrants, more than 70 new threat groups and MaaS offerings, highlights the unyielding pace of cybercriminal innovation,” says Paul Caiazzo, Quorum Cyber’s Chief Threat Officer. “As we move into the latter half of 2025, we anticipate further innovation in social ...
Nasdaq Verafin and BioCatch Form Strategic Partnership to Accelerate the Global Fight Against Financial Crime

Nasdaq Verafin and BioCatch Form Strategic Partnership to Accelerate the Global Fight Against Financial Crime

Partnership combines industry-leading consortium data and behavioral intelligence to bolster financial institutions’ defense against fraud
Check Point Expands Harmony SASE with Enterprise Browser, Delivering Zero Trust to Any Device

Check Point Expands Harmony SASE with Enterprise Browser, Delivering Zero Trust to Any Device

Enterprise Browser secures access on unmanaged devices without compromising compliance or productivity
Palo Alto Networks Unveils Protection for Highly Evasive Threats with Prisma Browser, Extending SASE Leadership

Palo Alto Networks Unveils Protection for Highly Evasive Threats with Prisma Browser, Extending SASE Leadership

Prisma SASE 4.0 protects against highly evasive threats that assemble inside the browser, offers AI-augmented data classification, and secures today's dynamic private applications. Scaling SASE beyond $1.3B in ARR,[1] providing best-in-class security to one-third of the Fortune 500.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This