The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Are Aussie Networks Future-fit?

Are Aussie Networks Future-fit?

According to IDC’s recent Asia/Pacific Enterprise Connectivity and Telecom Services Survey, only 51% of ANZ companies believe their networks are equipped to handle the complex demands of today’s digital economy.  Some might say that’s an alarming statistic. So what's stopping Aussie companies from getting their networks Future Fit?
Unmasking the SYS01 InfoStealer Threat: Bitdefender Labs Tracks Global Malvertising Campaign Targeting Meta Business Pages

Unmasking the SYS01 InfoStealer Threat: Bitdefender Labs Tracks Global Malvertising Campaign Targeting Meta Business Pages

In a digital world where advertising is king, businesses and organisations are not the only ones using this powerful tool. Cybercriminals have a knack for exploiting the engine that powers online platforms by corrupting the vast reach of advertising to distribute malware en masse. While legitimate businesses rely on ads to reach new audiences, ...
Cybersecurity is Everyone’s Business: Navigating Our Digital Lives

Cybersecurity is Everyone’s Business: Navigating Our Digital Lives

As Cybersecurity Awareness Month draws to a close, the message "Cybersecurity is Everyone's Business" remains vital. Despite fewer high-profile breaches making headlines, cyber threats are still very much present. Just this month, Australian companies like Funlab, Perfection Fresh and Road Distribution Services were targeted by cyberattacks, ...
How NetApp’s Government Relations are Shaping Secure Tech

How NetApp’s Government Relations are Shaping Secure Tech

Kristen Verderame, Vice President of Global Government Relations at NetApp, shared the importance of government relations, public affairs, and cybersecurity in shaping the technology. Verderame shared a view on how companies like NetApp collaborate with various government bodies to support missions and develop cybersecurity frameworks. Representing ...
How Quantum Random Number Generators Can Amplify the Power of Post Quantum Cryptography

How Quantum Random Number Generators Can Amplify the Power of Post Quantum Cryptography

The development of quantum computing is driving the need for new cryptographic methods that can resist future quantum-based attacks. Among the most promising techniques in post-quantum cryptography are Module Lattice-based Key Encapsulation Mechanisms (ML-KEM) and Module Lattice-based Digital Signature Algorithms (ML-DSA). These methods leverage the ...
What Do Gauss and Euler Handshakes Have to Do with “Infinite Microsegmentation Policy Impact Simulation”?

What Do Gauss and Euler Handshakes Have to Do with “Infinite Microsegmentation Policy Impact Simulation”?

Explore how math concepts from Gauss and Euler solve cybersecurity challenges, enabling scalable microsegmentation with infinite policy impact simulation.
NetApp Is Committed To Helping Entities Build Their Own AI Factories

NetApp Is Committed To Helping Entities Build Their Own AI Factories

So much is going on with NetApp according to Jeff Baxter, Vice President of Product Marketing at NetApp. Baxter provided details about the latest NetApp product announcements and the future trajectory of artificial intelligence (AI) and cybersecurity within the industry. Understanding ONTAP: The Foundation of Data Management The introduction to ...
Revolutionising Government with a Modular, AI-Driven Platform

Revolutionising Government with a Modular, AI-Driven Platform

Utilising low-code platforms with modular features more seamlessly allow government agencies to efficiently and effectively meet the ever-changing needs of their citizens. They are contributing to government at all levels to increase cost efficiency, become more agile, whilst remaining compliant and better prepared for the future.
No results found.

In The News

Check Point Acquires Lakera to Deliver End-to-End AI Security for Enterprises

Check Point Acquires Lakera to Deliver End-to-End AI Security for Enterprises

Together, Check Point and Lakera deliver one of the most advanced AI-native security platform, built to protect the full lifecycle of AI 
CrowdStrike and Salesforce Partner to Secure the Future of AI-Powered Business

CrowdStrike and Salesforce Partner to Secure the Future of AI-Powered Business

Integration of Falcon Shield with Salesforce Security Center and Charlotte AI with Agentforce delivers enhanced protection, visibility, and faster response for mission-critical AI agents, applications, and workflows
CrowdStrike Teams with NVIDIA to Build, Power, and Secure the Agentic Ecosystem

CrowdStrike Teams with NVIDIA to Build, Power, and Secure the Agentic Ecosystem

With Charlotte AI AgentWorks integrated with NVIDIA Nemotron models, analysts can build custom, no-code security agents; Falcon protects security and non-security agents across the AI ecosystem
CrowdStrike Unleashes the Agentic Security Workforce to Transform Security Operations

CrowdStrike Unleashes the Agentic Security Workforce to Transform Security Operations

CrowdStrike introduces new, mission-ready agents out of the box to automate high-impact workflows; Unveils Charlotte AI AgentWorks, the first no-code security agent development platform that enables teams to build, orchestrate, and scale AI agents securely
CrowdStrike to Acquire Pangea to Secure Every Layer of Enterprise AI

CrowdStrike to Acquire Pangea to Secure Every Layer of Enterprise AI

With AI prompt-layer protection for secure enterprise AI development and workforce usage, CrowdStrike will deliver the industry’s first complete AI Detection and Response (AIDR)
CrowdStrike Unveils the Falcon Platform Fall Release to Lead Cybersecurity into the Agentic Era

CrowdStrike Unveils the Falcon Platform Fall Release to Lead Cybersecurity into the Agentic Era

Revolutionizing the Falcon platform with the industry’s richest AI-ready data layer – the foundation for unifying human and agent-based security 
BeyondTrust Delivers Identity Security Controls for AI, Turning Agent Visibility into Action

BeyondTrust Delivers Identity Security Controls for AI, Turning Agent Visibility into Action

BeyondTrust delivers three powerful capabilities to Identity Security Insights® and BeyondTrust Pathfinder Platform customers today: AI Agent Insights, secure Model Context Protocol (MCP) orchestration, and an omnipresent AI decision-support layer; the first production-ready identity security controls for the new era of agentic AI
Cyber Security Predictions for 2026

Cyber Security Predictions for 2026

Among the key trends, Excite Cyber, CEO, Bryan Saba highlights new AI regulations, stronger governance over LLM development and predicts cyber risks will become encompassed in comprehensive enterprise-wide business risk registers and demand will surge for digital forensics training. Excite Cyber also anticipates that Australia will see rapid adoption ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This