The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

What Do Gauss and Euler Handshakes Have to Do with “Infinite Microsegmentation Policy Impact Simulation”?

What Do Gauss and Euler Handshakes Have to Do with “Infinite Microsegmentation Policy Impact Simulation”?

Explore how math concepts from Gauss and Euler solve cybersecurity challenges, enabling scalable microsegmentation with infinite policy impact simulation.
NetApp Is Committed To Helping Entities Build Their Own AI Factories

NetApp Is Committed To Helping Entities Build Their Own AI Factories

So much is going on with NetApp according to Jeff Baxter, Vice President of Product Marketing at NetApp. Baxter provided details about the latest NetApp product announcements and the future trajectory of artificial intelligence (AI) and cybersecurity within the industry. Understanding ONTAP: The Foundation of Data Management The introduction to ...
Revolutionising Government with a Modular, AI-Driven Platform

Revolutionising Government with a Modular, AI-Driven Platform

Utilising low-code platforms with modular features more seamlessly allow government agencies to efficiently and effectively meet the ever-changing needs of their citizens. They are contributing to government at all levels to increase cost efficiency, become more agile, whilst remaining compliant and better prepared for the future.
Debunking Three Common Myths About Data Protection

Debunking Three Common Myths About Data Protection

Introduction Data protection is no longer an afterthought but a daily priority for businesses. While Australia's regulations like the Privacy Act and the Notifiable Data Breaches (NDB) scheme are crucial, the average cost of a data breach globally is now $4.45 million. For Australian enterprises, the financial hit can be devastating, especially if ...
Ensuring Secure Content in the Era of Digital Transformation

Ensuring Secure Content in the Era of Digital Transformation

Introduction In today’s digital landscape, safeguarding sensitive information, be it in transit, at rest, or in use, has become more crucial. As public and private organisations continue to embrace digital transformation, the risk of data breaches and unauthorised access has grown exponentially.   As creating and sharing documents from anywhere ...
Boosting Software Security With a Binary Approach

Boosting Software Security With a Binary Approach

Introduction The discovery of a leaked access token earlier this year that could have opened the door to malicious code being injected into one of the world’s most widespread programming languages has shone a light on why the method we use to search for security issues in software matters. The access token, discovered by the JFrog Security Research ...
The Goal Is To Alleviate The Administrative Burden In Healthcare

The Goal Is To Alleviate The Administrative Burden In Healthcare

Stephanie Trunzo, Senior Vice President and General Manager at Oracle Industry. Trunzo dives deep into the changes Oracle Industries is bringing to the healthcare sector with applied AI and an open healthcare platform and what this actually means. Trunzo led with Oracle Industries' approach, which integrates specific industry needs into general ...
A Pledge to Secure Healthcare

A Pledge to Secure Healthcare

Discover why hospitals and healthcare providers are prime targets for cyberattacks and how strategies like microsegmentation can ensure patient safety.
No results found.

In The News

Falcon Next-Gen Identity Security Innovations Expand Unified Protection for Every Identity, Closing the Gaps Legacy Solutions Create

Falcon Next-Gen Identity Security Innovations Expand Unified Protection for Every Identity, Closing the Gaps Legacy Solutions Create

Phishing-resistant MFA, enhanced privileged access, and identity-driven case management strengthen unified initial access, privilege control, and SOC response across human and agent identities
CrowdStrike Delivers Unified Data Protection for the AI Era

CrowdStrike Delivers Unified Data Protection for the AI Era

Falcon Data Protection expands GenAI data protection to local apps and runtime cloud environments; unveils new innovations to replace legacy data loss and posture management tools with real-time, unified protection across endpoint, cloud, SaaS, and GenAI
Palo Alto Networks Recognises Leading Asia-Pacific and Japan Partners at 2025 Partner Executive Kick-Off

Palo Alto Networks Recognises Leading Asia-Pacific and Japan Partners at 2025 Partner Executive Kick-Off

Palo Alto Networks® (NASDAQ: PANW), the global cybersecurity leader, today announced the winners of its 2025 Asia-Pacific and Japan Partner Awards at the Palo Alto Networks Partner Executive Kick-Off (PEKO). The annual awards recognise and celebrate the top partners of the year, those who have showcased outstanding contributions and unwavering ...
New Report Finds 49% of Security Professionals Say Global Economic Policies and Geopolitical Tensions Increase Risk to Cyber-physical Environments

New Report Finds 49% of Security Professionals Say Global Economic Policies and Geopolitical Tensions Increase Risk to Cyber-physical Environments

Global survey by Claroty uncovers how organisations are navigating an uncertain economic landscape to secure mission-critical infrastructure
Cohesity and Semperis Announce Groundbreaking Offering That Unifies Data and Identity Resilience

Cohesity and Semperis Announce Groundbreaking Offering That Unifies Data and Identity Resilience

Cohesity and Semperis today announced a new product, Cohesity Identity Resilience, powered by Semperis, to defend enterprises’ critical Identity infrastructure, including Microsoft Active Directory assets, from cyberattacks.
ManageEngine Strengthens Its Unified Security Platform With Reengineered Detection, Reducing Alert Fatigue for SOC Teams

ManageEngine Strengthens Its Unified Security Platform With Reengineered Detection, Reducing Alert Fatigue for SOC Teams

New Capabilities in Log360 Tackle False Positives, Keep Threat Coverage Current, and Enable Scaling With Enterprise Demand
Cohesity Extends Cyber Resilience Leadership with New Security Innovations and Partnerships

Cohesity Extends Cyber Resilience Leadership with New Security Innovations and Partnerships

Cohesity today announced multiple cyber resilience breakthroughs at the company’s Catalyst 1 Data Security Summit, extending its pioneering Five-Step Cyber Resilience Framework to companies and governments. These innovations include unmatched protection for compute, container, storage, and database workloads across the three leading hyperscale clouds, ...
New Relic Study Reveals Australian and New Zealand Businesses Face Hourly Costs of up to $3 Million from High-Impact IT Outages

New Relic Study Reveals Australian and New Zealand Businesses Face Hourly Costs of up to $3 Million from High-Impact IT Outages

“To stay ahead of the curve, businesses across Australia and New Zealand need to prioritise reducing tool sprawl and data siloes so engineers can detect and resolve critical issues fast. With high-business impact outages costing up to $3 million per hour in lost revenue, organisations can no longer ignore the costs associated with maintaining the status quo.”
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This