The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Keeping the Public Safe From Festive Scams

Keeping the Public Safe From Festive Scams

"While the festive season should be a period of joy and goodwill, hackers are particularly active in Australia and have the ability to employ new, sophisticated tactics on consumers. One emerging trend we're seeing is the use of AI-powered tools, with deepfake technologies allowing hackers to create convincing face-swapped videos and the ability to ...
When Post-Quantum Cryptography Is No Longer Post-Quantum

When Post-Quantum Cryptography Is No Longer Post-Quantum

As quantum computing advances, the standards for Post-Quantum Cryptography (PQC) are evolving rapidly, with governments like Australia phasing out even selected PQC algorithms like ML-KEM-768 and ML-DSA-65 to maintain robust security. This article explores the challenges businesses face in adapting to these shifting standards, from resource demands to ...
The Cisco Live 2024 Rundown Featuring Splunk

The Cisco Live 2024 Rundown Featuring Splunk

At the hustling and bustling Melbourne Convention and Exhibition Centre, the 2024 edition of Cisco Live commenced with discussions on the future of cybersecurity and data management. With industry heavyweights like Tom Gillis, AJ Shipley, and Tom Casey at the helm, the event promises to redefine the paradigms of network security, artificial ...
Modernising Privileged Access Management to Combat Advanced ID-Based Cyber Threats

Modernising Privileged Access Management to Combat Advanced ID-Based Cyber Threats

While identity-related threats are increasingly challenging, a well-implemented PAM strategy can transform security postures. By securing paths to privilege, businesses reduce their attack surfaces, making it harder for cybercriminals to exploit identities.
Proactive Measures for Businesses to Achieve Effective Cyber Hygiene Practices

Proactive Measures for Businesses to Achieve Effective Cyber Hygiene Practices

Cybercrime rates in Australia have surged, with online attacks averaging out to one every six minutes, according to the Australian Signals Directorate (ASD).(1) For organisations, one of the most common attacks is email compromise, which involves manipulating individuals into unauthorised financial transactions or the disclosure of sensitive company ...
Antifragility – the Essential Strategy for Modern Cyber Defense

Antifragility – the Essential Strategy for Modern Cyber Defense

Agnidipta Sarkar, VP CISO Advisory, explores how Nassim Taleb's concept of antifragility enhances cyber defense strategies.
The Five Step Journey to Securing Australia’s Most Important Data Assets

The Five Step Journey to Securing Australia’s Most Important Data Assets

Securing information assets to be resilient against a broad spectrum of threats is a journey many Australian organisations find themselves on. A steady stream of data breach disclosures - and a desire not to join that list - is keeping them motivated to stay the course. For banks and other financial entities, there’s additional motivation in the form ...
AI’s Transformative Role in Corporate Governance

AI’s Transformative Role in Corporate Governance

Corporate governance is on the brink of a major transformation driven by artificial intelligence (AI), which is already reshaping the way organisations operate. As we move deeper into the Fifth Industrial Revolution, AI is no longer a distant concept, but a central force that has fundamentally altered how companies are making strategic decisions, ...
No results found.

In the News

BioCatch Connect 2.0 Delivers Advanced Fraud and Financial Crime-fighting Capabilities to World’s Banks

BioCatch Connect 2.0 Delivers Advanced Fraud and Financial Crime-fighting Capabilities to World’s Banks

BioCatch, which prevents financial crime by recognising patterns in human behaviour, today announced a major upgrade to its market-leading digital fraud- and financial crime-detection platform. BioCatch Connect 2.0 features both BioCatch Align, a singular, next-generation software development kit (SDK) that unifies signal collection (behaviour, device, ...
Check Point Software Collaborates With Microsoft to Deliver Enterprise-Grade AI Security for Microsoft Copilot Studio

Check Point Software Collaborates With Microsoft to Deliver Enterprise-Grade AI Security for Microsoft Copilot Studio

As AI reshapes enterprise workflows, Check Point works with Microsoft to enable secure agent innovation powered by real-time guardrails, DLP, and threat prevention REDWOOD CITY, CA. November 18, 2025 -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced it is collaborating ...
Rapid7 Delivers Smarter Network Security With Curated Intelligence Rules for AWS Network Firewall

Rapid7 Delivers Smarter Network Security With Curated Intelligence Rules for AWS Network Firewall

Rapid7's Curated Intelligence Rules for AWS Network Firewall delivers threat intelligence directly into customers’ AWS environments to address the operational challenges security teams face when manually managing and updating firewall rules to keep pace with evolving threats.
Kyndryl Announces Agentic AI Digital Trust to Support Governance of AI Agents at Scale

Kyndryl Announces Agentic AI Digital Trust to Support Governance of AI Agents at Scale

New services address emerging risks as organisations expand agentic AI across mission-critical environments     SYDNEY, November 20, 2025 – Kyndryl (NYSE: KD), a leading provider of mission-critical enterprise technology services, today announced Kyndryl Agentic AI Digital Trust to help enterprises securely manage and scale their agentic AI ...
CyberArk Unveils Free Tool and Powerful TLS Certificate Scan to Help Organisations Tackle Soaring Labor Costs and Disruptive System Outages

CyberArk Unveils Free Tool and Powerful TLS Certificate Scan to Help Organisations Tackle Soaring Labor Costs and Disruptive System Outages

Certificate lifespans are shrinking from 398 days today to just 47 days by 2029 | Transitioning to automated renewals will dramatically decrease labor costs | CyberArk’s new tools help organisations understand exposure and calculate renewal impact in seconds
Sophos Recognised With Microsoft Verified Small and Medium Business Solution Status

Sophos Recognised With Microsoft Verified Small and Medium Business Solution Status

Sophos has announced its integration with Microsoft Defender for Business, Microsoft Defender for Endpoint, and that its Sophos MDR for Microsoft environments solution has achieved Microsoft verified Small & Medium Business (SMB) solution status through the Microsoft Intelligent Security Association (MISA). Microsoft’s verified SMBSolution status ...
Infoblox Launches Predictive DNS-Based Threat Protection Solution on AWS

Infoblox Launches Predictive DNS-Based Threat Protection Solution on AWS

Infoblox, the leader in uniting networking, security and cloud with a protective DDI platform, today announced the launch of Infoblox AWS Marketplace managed rules for AWS Network Firewall. This new integration strengthens organisations’ cloud security posture with predictive, DNS-based threat intelligence natively within their existing Amazon Web ...
Veeam Data Platform V13 Launches and Redefines the Standard for Cyber Resilience, Advanced Data Protection, Security and Identity Controls, and AI-Powered Intelligence

Veeam Data Platform V13 Launches and Redefines the Standard for Cyber Resilience, Advanced Data Protection, Security and Identity Controls, and AI-Powered Intelligence

Along with new capabilities to outsmart threats and accelerate recovery with next-gen security, forensic insights, and intelligent automation, Veeam is launching the Universal Hypervisor Integration API, a flexible integration platform for hypervisors
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This