The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Australian Enterprises Need An Exit Strategy For Tier-One Applications In Virtualised Environments
Escalating threats targeting the hypervisor are driving more enterprises to reconsider how they host their tier-one applications.

Cybercrime Is Soaring: Is Your Business Ready To Respond?
Key questions every organisation should consider when assessing their cybersecurity readiness.

Are Aussie Networks Future-fit?
According to IDC’s recent Asia/Pacific Enterprise Connectivity and Telecom Services Survey, only 51% of ANZ companies believe their networks are equipped to handle the complex demands of today’s digital economy. Some might say that’s an alarming statistic. So what's stopping Aussie companies from getting their networks Future Fit?
Unmasking the SYS01 InfoStealer Threat: Bitdefender Labs Tracks Global Malvertising Campaign Targeting Meta Business Pages
In a digital world where advertising is king, businesses and organisations are not the only ones using this powerful tool. Cybercriminals have a knack for exploiting the engine that powers online platforms by corrupting the vast reach of advertising to distribute malware en masse.
While legitimate businesses rely on ads to reach new audiences, ...

Cybersecurity is Everyone’s Business: Navigating Our Digital Lives
As Cybersecurity Awareness Month draws to a close, the message "Cybersecurity is Everyone's Business" remains vital. Despite fewer high-profile breaches making headlines, cyber threats are still very much present. Just this month, Australian companies like Funlab, Perfection Fresh and Road Distribution Services were targeted by cyberattacks, ...

How NetApp’s Government Relations are Shaping Secure Tech
Kristen Verderame, Vice President of Global Government Relations at NetApp, shared the importance of government relations, public affairs, and cybersecurity in shaping the technology. Verderame shared a view on how companies like NetApp collaborate with various government bodies to support missions and develop cybersecurity frameworks.
Representing ...

How Quantum Random Number Generators Can Amplify the Power of Post Quantum Cryptography
The development of quantum computing is driving the need for new cryptographic methods that can resist future quantum-based attacks. Among the most promising techniques in post-quantum cryptography are Module Lattice-based Key Encapsulation Mechanisms (ML-KEM) and Module Lattice-based Digital Signature Algorithms (ML-DSA). These methods leverage the ...

What Do Gauss and Euler Handshakes Have to Do with “Infinite Microsegmentation Policy Impact Simulation”?
Explore how math concepts from Gauss and Euler solve cybersecurity challenges, enabling scalable microsegmentation with infinite policy impact simulation.
No results found.
In The News
CrowdStrike Unveils the Falcon Platform Fall Release to Lead Cybersecurity into the Agentic Era
Revolutionizing the Falcon platform with the industry’s richest AI-ready data layer – the foundation for unifying human and agent-based security
BeyondTrust Delivers Identity Security Controls for AI, Turning Agent Visibility into Action
BeyondTrust delivers three powerful capabilities to Identity Security Insights® and BeyondTrust Pathfinder Platform customers today: AI Agent Insights, secure Model Context Protocol (MCP) orchestration, and an omnipresent AI decision-support layer; the first production-ready identity security controls for the new era of agentic AI
Cyber Security Predictions for 2026
Among the key trends, Excite Cyber, CEO, Bryan Saba highlights new AI regulations, stronger governance over LLM development and predicts cyber risks will become encompassed in comprehensive enterprise-wide business risk registers and demand will surge for digital forensics training. Excite Cyber also anticipates that Australia will see rapid adoption ...
Exabeam and Cribl Partner to Power Scalable, High-Fidelity Threat Detection with Next-Gen Data Pipelines
Partnership advances an outcome-driven data strategy, decoupling security outcomes from data volume
Swift AI Innovation Creates Blueprint for Banks to Stop Fraud Faster Through Cross-Border Collaboration
Swift and 13 international banks doubled real time fraud detection in trials involving ten million test transactions Privacy-enhancing technologies enabled institutions to share transaction data while maintaining end-to-end privacy and security Used at scale, this technology could enable a joined-up fraud defence across global finance, lead to faster ...
Canalys Study Finds Every $1 of Falcon Platform Sales Leads Up to $7 in Partner Services Revenue
Independent research validates Falcon platform transformation as the leading engine of partner profitability, fueling growth and sustained returns
CrowdStrike and Meta Deliver New Benchmarks for the Evaluation of AI Performance in Cybersecurity
New benchmarks define how LLMs should be tested in the SOC – measuring real threats, workflows, and outcomes to help defenders
CrowdStrike Secures the Future of AI Across the Enterprise Ecosystem
Only CrowdStrike delivers unified protection across the entire AI stack – from compute to cloud, data to models, and agents to applications – in partnership with the world’s AI leaders
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
