The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

AI Domination and Quantum Computing on the Horizon

AI Domination and Quantum Computing on the Horizon

Over the last few years we all know there has been transformative changes in the workplace, the critical role of technology, and the ongoing debate between remote and in-office work. Enterprises are still pushing for staff to come into the office more frequently and are finding persuasive ways to entice their employees back into the building. I sat ...
Human-centric Cybersecurity: The First Line of Defence

Human-centric Cybersecurity: The First Line of Defence

Introduction Australian organisations face an array of cybersecurity challenges that didn’t exist half a decade ago. And yet the reliance on traditional security and legacy systems is largely the status quo – often falling short in addressing the nuanced interplay between human behaviour and technological vulnerabilities. A New Approach Enter ...
Keeping The Public Safe From Festive Scams

Keeping The Public Safe From Festive Scams

"While the festive season should be a period of joy and goodwill, hackers are particularly active in Australia and have the ability to employ new, sophisticated tactics on consumers. One emerging trend we're seeing is the use of AI-powered tools, with deepfake technologies allowing hackers to create convincing face-swapped videos and the ability to ...
When Post-Quantum Cryptography Is No Longer Post-Quantum

When Post-Quantum Cryptography Is No Longer Post-Quantum

As quantum computing advances, the standards for Post-Quantum Cryptography (PQC) are evolving rapidly, with governments like Australia phasing out even selected PQC algorithms like ML-KEM-768 and ML-DSA-65 to maintain robust security. This article explores the challenges businesses face in adapting to these shifting standards, from resource demands to ...
The Cisco Live 2024 Rundown Featuring Splunk

The Cisco Live 2024 Rundown Featuring Splunk

At the hustling and bustling Melbourne Convention and Exhibition Centre, the 2024 edition of Cisco Live commenced with discussions on the future of cybersecurity and data management. With industry heavyweights like Tom Gillis, AJ Shipley, and Tom Casey at the helm, the event promises to redefine the paradigms of network security, artificial ...
Modernising Privileged Access Management To Combat Advanced ID-Based Cyber Threats

Modernising Privileged Access Management To Combat Advanced ID-Based Cyber Threats

While identity-related threats are increasingly challenging, a well-implemented PAM strategy can transform security postures. By securing paths to privilege, businesses reduce their attack surfaces, making it harder for cybercriminals to exploit identities.
Proactive Measures for Businesses to Achieve Effective Cyber Hygiene Practices

Proactive Measures for Businesses to Achieve Effective Cyber Hygiene Practices

Cybercrime rates in Australia have surged, with online attacks averaging out to one every six minutes, according to the Australian Signals Directorate (ASD).(1) For organisations, one of the most common attacks is email compromise, which involves manipulating individuals into unauthorised financial transactions or the disclosure of sensitive company ...
Antifragility – The Essential Strategy for Modern Cyber Defense

Antifragility – The Essential Strategy for Modern Cyber Defense

Agnidipta Sarkar, VP CISO Advisory, explores how Nassim Taleb's concept of antifragility enhances cyber defense strategies.
No results found.

In The News

Rubrik Agent Cloud Enhances Trusted Agentic AI Deployments for Microsoft Copilot Studio

Rubrik Agent Cloud Enhances Trusted Agentic AI Deployments for Microsoft Copilot Studio

Rubrik (NYSE: RBRK), the Security and AI Operations company, today announced that Rubrik Agent Cloud will integrate with Microsoft Copilot Studio to accelerate trusted enterprise AI agent adoption. As AI transformation expands across organisations, Rubrik Agent Cloud helps them to adopt agents at scale with the ability to monitor, govern, and ...
Darktrace’s APJ Threat Report Shows North Korea and China-nexus Groups’ Advanced AI Capabilities to Hit Email, Cloud and Third-party Vendors

Darktrace’s APJ Threat Report Shows North Korea and China-nexus Groups’ Advanced AI Capabilities to Hit Email, Cloud and Third-party Vendors

Geopolitical tensions, rapid digital transformation, and deeper integration of generative AI have seen a sharp rise in the volume and sophistication of attacks across the region.
Fortinet and Crime Stoppers International Launch Global Cybercrime Bounty Program

Fortinet and Crime Stoppers International Launch Global Cybercrime Bounty Program

First-of-its-kind initiative incentivises deterrence and disruption of cybercrime through anonymous tips and rewards 
Claroty Releases New AI-powered CPS Library, Setting Revolutionary New Standards for Asset Visibility and Vulnerability Attribution

Claroty Releases New AI-powered CPS Library, Setting Revolutionary New Standards for Asset Visibility and Vulnerability Attribution

OEM partners including Rockwell Automation and Schneider Electric help drive the fundamental shift in asset identification
Exabeam and Recorded Future Partner to Power Intelligence-Led Threat Detection and Response

Exabeam and Recorded Future Partner to Power Intelligence-Led Threat Detection and Response

Strategic integration enables security teams to move from reactive to proactive with real-time threat context and automated response
Check Point Software Technologies Completes Australian Information Security Registered Assessors Program Assessment

Check Point Software Technologies Completes Australian Information Security Registered Assessors Program Assessment

Sydney, 19 November 2025 — Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced the successful completion and delivery of an Australian Government Information Security Registered Assessors Program (IRAP) assessment Report for its Check Point Cloud Infinity products, at the ...
Sophos Integrates Advanced Cyber Intelligence into Microsoft Security Copilot and Microsoft 365 Copilot

Sophos Integrates Advanced Cyber Intelligence into Microsoft Security Copilot and Microsoft 365 Copilot

Sophos has announced its robust repository of cyber threat intelligence, with Microsoft Security Copilot and Microsoft 365 Copilot. Introduced at the Microsoft Ignite Conference in San Francisco, organisations of all sizes gain real-time access to Sophos threat intelligence within Microsoft’s AI-powered environments, helping them strengthen defences ...
VAST Data Partners with Microsoft to Power the Next Wave of Agentic AI

VAST Data Partners with Microsoft to Power the Next Wave of Agentic AI

AI Operating System company VAST Data has announced at Microsoft Ignite a collaboration with Microsoft to power the next wave of agentic AI. Available soon to Azure customers, the VAST AI OS provides a simple way to deploy high-performance, scalable AI infrastructure in the cloud. Enterprises will be able to access VAST’s complete suite of data ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This