The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How Breach Readiness Will Shape Cyber Defense In 2025

How Breach Readiness Will Shape Cyber Defense In 2025

Rajesh Khazanchi, co-founder and CEO of ColorTokens, writes how breach ready strategies and AI-powered cyber defense can drive cyber resilience and protect your business.
AI Domination and Quantum Computing on the Horizon

AI Domination and Quantum Computing on the Horizon

Over the last few years we all know there has been transformative changes in the workplace, the critical role of technology, and the ongoing debate between remote and in-office work. Enterprises are still pushing for staff to come into the office more frequently and are finding persuasive ways to entice their employees back into the building. I sat ...
Human-centric Cybersecurity: The First Line of Defence

Human-centric Cybersecurity: The First Line of Defence

Introduction Australian organisations face an array of cybersecurity challenges that didn’t exist half a decade ago. And yet the reliance on traditional security and legacy systems is largely the status quo – often falling short in addressing the nuanced interplay between human behaviour and technological vulnerabilities. A New Approach Enter ...
Keeping The Public Safe From Festive Scams

Keeping The Public Safe From Festive Scams

"While the festive season should be a period of joy and goodwill, hackers are particularly active in Australia and have the ability to employ new, sophisticated tactics on consumers. One emerging trend we're seeing is the use of AI-powered tools, with deepfake technologies allowing hackers to create convincing face-swapped videos and the ability to ...
When Post-Quantum Cryptography Is No Longer Post-Quantum

When Post-Quantum Cryptography Is No Longer Post-Quantum

As quantum computing advances, the standards for Post-Quantum Cryptography (PQC) are evolving rapidly, with governments like Australia phasing out even selected PQC algorithms like ML-KEM-768 and ML-DSA-65 to maintain robust security. This article explores the challenges businesses face in adapting to these shifting standards, from resource demands to ...
The Cisco Live 2024 Rundown Featuring Splunk

The Cisco Live 2024 Rundown Featuring Splunk

At the hustling and bustling Melbourne Convention and Exhibition Centre, the 2024 edition of Cisco Live commenced with discussions on the future of cybersecurity and data management. With industry heavyweights like Tom Gillis, AJ Shipley, and Tom Casey at the helm, the event promises to redefine the paradigms of network security, artificial ...
Modernising Privileged Access Management To Combat Advanced ID-Based Cyber Threats

Modernising Privileged Access Management To Combat Advanced ID-Based Cyber Threats

While identity-related threats are increasingly challenging, a well-implemented PAM strategy can transform security postures. By securing paths to privilege, businesses reduce their attack surfaces, making it harder for cybercriminals to exploit identities.
Proactive Measures for Businesses to Achieve Effective Cyber Hygiene Practices

Proactive Measures for Businesses to Achieve Effective Cyber Hygiene Practices

Cybercrime rates in Australia have surged, with online attacks averaging out to one every six minutes, according to the Australian Signals Directorate (ASD).(1) For organisations, one of the most common attacks is email compromise, which involves manipulating individuals into unauthorised financial transactions or the disclosure of sensitive company ...
No results found.

In The News

Quorum Cyber Strengthens Leadership Team with New Senior Appointments

Quorum Cyber Strengthens Leadership Team with New Senior Appointments

Quorum Cyber has grown from a specialized cybersecurity startup into one of the fastest-scaling cybersecurity providers in the market. As a preferred Microsoft security partner and a mission-driven defender for mid-market and enterprise organizations, Quorum Cyber continues to invest aggressively in senior leadership to support accelerating demand ...
Tanium Unveils AI Innovations to Power Autonomous IT and Unstoppable Business

Tanium Unveils AI Innovations to Power Autonomous IT and Unstoppable Business

Showcased at its Converge conference, new platform capabilities expand agentic AI, enhance continuous security and broaden support for OT and mobile endpoints
Infoblox Streamlines IP Address Management Across Hybrid Cloud Environments with AWS

Infoblox Streamlines IP Address Management Across Hybrid Cloud Environments with AWS

Infoblox, the leader in uniting networking, security and cloud with a protective DDI platform, today announced a new integration between Infoblox Universal IP Address Management™ (Universal IPAM) and Amazon Virtual Private Cloud IP Address Manager (Amazon VPC IPAM). The integration is designed to accelerate application rollouts and updates by ...
Rubrik Agent Cloud Enhances Trusted Agentic AI Deployments for Microsoft Copilot Studio

Rubrik Agent Cloud Enhances Trusted Agentic AI Deployments for Microsoft Copilot Studio

Rubrik (NYSE: RBRK), the Security and AI Operations company, today announced that Rubrik Agent Cloud will integrate with Microsoft Copilot Studio to accelerate trusted enterprise AI agent adoption. As AI transformation expands across organisations, Rubrik Agent Cloud helps them to adopt agents at scale with the ability to monitor, govern, and ...
Darktrace’s APJ Threat Report Shows North Korea and China-nexus Groups’ Advanced AI Capabilities to Hit Email, Cloud and Third-party Vendors

Darktrace’s APJ Threat Report Shows North Korea and China-nexus Groups’ Advanced AI Capabilities to Hit Email, Cloud and Third-party Vendors

Geopolitical tensions, rapid digital transformation, and deeper integration of generative AI have seen a sharp rise in the volume and sophistication of attacks across the region.
Fortinet and Crime Stoppers International Launch Global Cybercrime Bounty Program

Fortinet and Crime Stoppers International Launch Global Cybercrime Bounty Program

First-of-its-kind initiative incentivises deterrence and disruption of cybercrime through anonymous tips and rewards 
Claroty Releases New AI-powered CPS Library, Setting Revolutionary New Standards for Asset Visibility and Vulnerability Attribution

Claroty Releases New AI-powered CPS Library, Setting Revolutionary New Standards for Asset Visibility and Vulnerability Attribution

OEM partners including Rockwell Automation and Schneider Electric help drive the fundamental shift in asset identification
Exabeam and Recorded Future Partner to Power Intelligence-Led Threat Detection and Response

Exabeam and Recorded Future Partner to Power Intelligence-Led Threat Detection and Response

Strategic integration enables security teams to move from reactive to proactive with real-time threat context and automated response
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This