The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

AI Domination and Quantum Computing on the Horizon
Over the last few years we all know there has been transformative changes in the workplace, the critical role of technology, and the ongoing debate between remote and in-office work. Enterprises are still pushing for staff to come into the office more frequently and are finding persuasive ways to entice their employees back into the building. I sat ...

Human-centric Cybersecurity: The First Line of Defence
Introduction
Australian organisations face an array of cybersecurity challenges that didn’t exist half a decade ago.
And yet the reliance on traditional security and legacy systems is largely the status quo – often falling short in addressing the nuanced interplay between human behaviour and technological vulnerabilities.
A New Approach
Enter ...
Keeping the Public Safe From Festive Scams
"While the festive season should be a period of joy and goodwill, hackers are particularly active in Australia and have the ability to employ new, sophisticated tactics on consumers.
One emerging trend we're seeing is the use of AI-powered tools, with deepfake technologies allowing hackers to create convincing face-swapped videos and the ability to ...

When Post-Quantum Cryptography Is No Longer Post-Quantum
As quantum computing advances, the standards for Post-Quantum Cryptography (PQC) are evolving rapidly, with governments like Australia phasing out even selected PQC algorithms like ML-KEM-768 and ML-DSA-65 to maintain robust security. This article explores the challenges businesses face in adapting to these shifting standards, from resource demands to ...

The Cisco Live 2024 Rundown Featuring Splunk
At the hustling and bustling Melbourne Convention and Exhibition Centre, the 2024 edition of Cisco Live commenced with discussions on the future of cybersecurity and data management. With industry heavyweights like Tom Gillis, AJ Shipley, and Tom Casey at the helm, the event promises to redefine the paradigms of network security, artificial ...

Modernising Privileged Access Management to Combat Advanced ID-Based Cyber Threats
While identity-related threats are increasingly challenging, a well-implemented PAM strategy can transform security postures. By securing paths to privilege, businesses reduce their attack surfaces, making it harder for cybercriminals to exploit identities.
Proactive Measures for Businesses to Achieve Effective Cyber Hygiene Practices
Cybercrime rates in Australia have surged, with online attacks averaging out to one every six minutes, according to the Australian Signals Directorate (ASD).(1) For organisations, one of the most common attacks is email compromise, which involves manipulating individuals into unauthorised financial transactions or the disclosure of sensitive company ...

Antifragility – the Essential Strategy for Modern Cyber Defense
Agnidipta Sarkar, VP CISO Advisory, explores how Nassim Taleb's concept of antifragility enhances cyber defense strategies.
No results found.
In the News
DroneShield Secures $5.2M European Military Contract
DroneShield Limited has announced it has received a follow-on contract for $5.2 million from an in-country European reseller, that is contractually required to distribute the products to a European military customer. The contract is for handheld counter-drone systems and associated accessories. DroneShield has all stock on-the-shelf to deliver this ...
Genetec Predicts Top Physical Security Trends for 2026
Organisations will focus on flexibility, responsible AI, and unified connected systems to strengthen security and operational performance
MONTRÉAL, November 24, 2025 — Genetec Inc. (“Genetec”), the global leader in enterprise physical security software, today shared its top predictions for the physical security industry in 2026.
Choice and ...
Trend Micro to Introduce Most Comprehensive Offering for Enterprise AI Risk Management
AI Application Security will accompany a package of new solution capabilities at AWS re:Invent
Big Sales, Small Tells: Staying Safe From Online Scams This Black Friday and Cyber Monday
With the year’s biggest shopping event right around the corner, Microsoft's National Security Officer, Mark Anderson, shares tips on how consumers can protect themselves from online scams
Palo Alto Networks Forecasts 6 Predictions on Securing the New AI Economy for 2026
2026 will be the “Year of the Defender,” where autonomous AI defence is the only way to combat AI-driven identity attacks, data poisoning and quantum risks
Palo Alto Networks Announces New Prisma AIRS Integrations With Factory, Glean, IBM and ServiceNow to Secure the AI Agent Boom
Allowing customers to safely accelerate AI agent adoption across the enterprise while removing security roadblocks
BioCatch Connect 2.0 Delivers Advanced Fraud and Financial Crime-fighting Capabilities to World’s Banks
BioCatch, which prevents financial crime by recognising patterns in human behaviour, today announced a major upgrade to its market-leading digital fraud- and financial crime-detection platform. BioCatch Connect 2.0 features both BioCatch Align, a singular, next-generation software development kit (SDK) that unifies signal collection (behaviour, device, ...
Check Point Software Collaborates With Microsoft to Deliver Enterprise-Grade AI Security for Microsoft Copilot Studio
As AI reshapes enterprise workflows, Check Point works with Microsoft to enable secure agent innovation powered by real-time guardrails, DLP, and threat prevention
REDWOOD CITY, CA. November 18, 2025 -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced it is collaborating ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
