The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Human-centric Cybersecurity: The First Line of Defence
Introduction
Australian organisations face an array of cybersecurity challenges that didn’t exist half a decade ago.
And yet the reliance on traditional security and legacy systems is largely the status quo – often falling short in addressing the nuanced interplay between human behaviour and technological vulnerabilities.
A New Approach
Enter ...
Keeping The Public Safe From Festive Scams
"While the festive season should be a period of joy and goodwill, hackers are particularly active in Australia and have the ability to employ new, sophisticated tactics on consumers.
One emerging trend we're seeing is the use of AI-powered tools, with deepfake technologies allowing hackers to create convincing face-swapped videos and the ability to ...
When Post-Quantum Cryptography Is No Longer Post-Quantum
As quantum computing advances, the standards for Post-Quantum Cryptography (PQC) are evolving rapidly, with governments like Australia phasing out even selected PQC algorithms like ML-KEM-768 and ML-DSA-65 to maintain robust security. This article explores the challenges businesses face in adapting to these shifting standards, from resource demands to ...
The Cisco Live 2024 Rundown Featuring Splunk
At the hustling and bustling Melbourne Convention and Exhibition Centre, the 2024 edition of Cisco Live commenced with discussions on the future of cybersecurity and data management. With industry heavyweights like Tom Gillis, AJ Shipley, and Tom Casey at the helm, the event promises to redefine the paradigms of network security, artificial ...
Modernising Privileged Access Management To Combat Advanced ID-Based Cyber Threats
While identity-related threats are increasingly challenging, a well-implemented PAM strategy can transform security postures. By securing paths to privilege, businesses reduce their attack surfaces, making it harder for cybercriminals to exploit identities.
Proactive Measures for Businesses to Achieve Effective Cyber Hygiene Practices
Cybercrime rates in Australia have surged, with online attacks averaging out to one every six minutes, according to the Australian Signals Directorate (ASD).(1) For organisations, one of the most common attacks is email compromise, which involves manipulating individuals into unauthorised financial transactions or the disclosure of sensitive company ...
Antifragility – The Essential Strategy for Modern Cyber Defense
Agnidipta Sarkar, VP CISO Advisory, explores how Nassim Taleb's concept of antifragility enhances cyber defense strategies.
The Five Step Journey To Securing Australia’s Most Important Data Assets
Securing information assets to be resilient against a broad spectrum of threats is a journey many Australian organisations find themselves on. A steady stream of data breach disclosures - and a desire not to join that list - is keeping them motivated to stay the course. For banks and other financial entities, there’s additional motivation in the form ...
In The News
State Of Global Authentic(age)ion: A Look At Cybersecurity Habits By Generations
No generations were left untouched when it came to the threat of hackers in 2024: from the impact of political shakeups, to increasingly sophisticated cyber attacks targeting consumers, critical industries and infrastructures, the world was on high alert. Fueled by a dramatic increase in phishing attacks circumventing certain forms of legacy ...
Logicalis Australia achieves Elite MSP Partner status with Commvault MSP Partner Program
14 January 2024: Logicalis Australia, a leading provider of global IT solutions and managed services, has announced that it has attained Elite MSP Partner status within the Commvault Managed Service Provider (MSP) Partner Program. Elite MSP Partner is the highest designation within the program, recognising exceptional performance, technical expertise, ...
KBI.Media Launches KBI.FM Network
KBI.Media has announced the launch of KBI.FM, a new podcast network designed to deliver high-quality cybersecurity content. The platform will feature expert discussions and insights on various cyber-related topics, catering to industry professionals seeking to stay informed. This initiative underscores the growing importance of podcasts in professional ...
Award-Winning, Channel Veteran Craig Patterson Joins Exabeam as Global Channel Chief
Patterson will oversee the integration of the LogRhythm and Exabeam partner programs, lead Exabeam global partner strategy and drive ecosystem growth
Motorola Solutions to Acquire Theatro, Maker of AI and Voice-powered Communication and Digital Workflow Software for Frontline Workers
Motorola Solutions has entered into a definitive agreement to acquire Theatro Labs, Inc. (“Theatro”), maker of AI and voice-powered communication and digital workflow software for frontline workers, based in Richardson, Texas.
Theatro’s software-as-a-service platform, purposefully designed for frontline workers, provides a suite of collaboration ...
2025 Cyber Predictions and Trends from Rubrik, Snowflake, Obsidian, SUSE, Bitdefender, F5, and ManageEngine
Arvind Nithrakashyap, Co-Founder and CTO Rubrik
“The emerging agentic AI market shows endless potential, especially for organisations that use the cloud to scale computing power and storage capacity to train and deploy complex AI models. CISOs focusing on cloud-first architectures will reap the benefits of increased productivity, better customer ...
New Body Camera by Motorola Solutions Boosts Safety for Frontline Workers
Motorola Solutions today unveiled the V200, a body camera designed specifically to help protect frontline workers in stores, hospitals, hotels, schools and stadiums. Workers in these settings regularly face safety concerns – from unwelcome behaviour to theft and medical emergencies – and the V200, with its GoLive Audio safety feature, offers a direct ...
Infoblox Threat Intel Research Sheds Light On The Use Of Spoofed Domains In Malicious Spam Campaigns
Infoblox Threat Intel researchers have discovered new insights into the use of spoofed domains in modern malicious spam (malspam) campaigns, sending unsolicited emails that contain harmful attachments or links designed to infect the recipient's computer with malware or to steal sensitive information. This reveals how threat actors exploit domain ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..