The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

When Post-Quantum cryptography Is No Longer Post-Quantum

When Post-Quantum cryptography Is No Longer Post-Quantum

As quantum computing advances, the standards for Post-Quantum Cryptography (PQC) are evolving rapidly, with governments like Australia phasing out even selected PQC algorithms like ML-KEM-768 and ML-DSA-65 to maintain robust security. This article explores the challenges businesses face in adapting to these shifting standards, from resource demands to ...
The Cisco Live 2024 Rundown Featuring Splunk

The Cisco Live 2024 Rundown Featuring Splunk

At the hustling and bustling Melbourne Convention and Exhibition Centre, the 2024 edition of Cisco Live commenced with discussions on the future of cybersecurity and data management. With industry heavyweights like Tom Gillis, AJ Shipley, and Tom Casey at the helm, the event promises to redefine the paradigms of network security, artificial ...
Modernising Privileged Access Management to Combat Advanced ID-Based Cyber Threats

Modernising Privileged Access Management to Combat Advanced ID-Based Cyber Threats

While identity-related threats are increasingly challenging, a well-implemented PAM strategy can transform security postures. By securing paths to privilege, businesses reduce their attack surfaces, making it harder for cybercriminals to exploit identities.
Proactive Measures for Businesses to Achieve Effective Cyber Hygiene Practices

Proactive Measures for Businesses to Achieve Effective Cyber Hygiene Practices

Cybercrime rates in Australia have surged, with online attacks averaging out to one every six minutes, according to the Australian Signals Directorate (ASD).(1) For organisations, one of the most common attacks is email compromise, which involves manipulating individuals into unauthorised financial transactions or the disclosure of sensitive company ...
Antifragility – the Essential Strategy for Modern Cyber Defense

Antifragility – the Essential Strategy for Modern Cyber Defense

Agnidipta Sarkar, VP CISO Advisory, explores how Nassim Taleb's concept of antifragility enhances cyber defense strategies.
The Five Step Journey to Securing Australia’s Most Important Data Assets

The Five Step Journey to Securing Australia’s Most Important Data Assets

Securing information assets to be resilient against a broad spectrum of threats is a journey many Australian organisations find themselves on. A steady stream of data breach disclosures - and a desire not to join that list - is keeping them motivated to stay the course. For banks and other financial entities, there’s additional motivation in the form ...
AI’s Transformative Role in Corporate Governance

AI’s Transformative Role in Corporate Governance

Corporate governance is on the brink of a major transformation driven by artificial intelligence (AI), which is already reshaping the way organisations operate. As we move deeper into the Fifth Industrial Revolution, AI is no longer a distant concept, but a central force that has fundamentally altered how companies are making strategic decisions, ...
Secure-By-Design Is a Significant Exercise, but the Rewards Are Significant, Too

Secure-By-Design Is a Significant Exercise, but the Rewards Are Significant, Too

Concerted multilateral efforts are underway to influence and change developer behaviour when it comes to secure software creation.
No results found.

In the News

Veeam and HPE Extend Strategic Partnership and Unveil Next-gen Data Protection to Supercharge Enterprise Resilience

Veeam and HPE Extend Strategic Partnership and Unveil Next-gen Data Protection to Supercharge Enterprise Resilience

Veeam® Software, the #1 global leader by market share in Data Resilience, today announced a bold new chapter in its strategic alliance with HPE. Building on the partnership’s momentum earlier this year, HPE and Veeam are unleashing transformative, integrated solutions designed to empower enterprises with radically simplified data resilience for the ...
BeyondTrust Announces the Availability of BeyondTrust + Ping Identity Unified Identity Security Solutions in AWS Marketplace

BeyondTrust Announces the Availability of BeyondTrust + Ping Identity Unified Identity Security Solutions in AWS Marketplace

ATLANTA, GA – December 03, 2025 –  BeyondTrust, the global leader in privilege-centric identity security protecting Paths to Privilege™, and Ping Identity, a leader in securing digital identities for the world’s largest enterprises, announced today the availability of the BeyondTrust + Ping Identity Unified Identity Security solutions as a ...
Macquarie Telecom Expands Fortinet Partnership to Launch Unified Secure Networking Solution

Macquarie Telecom Expands Fortinet Partnership to Launch Unified Secure Networking Solution

Macquarie Telecom has today announced a major expansion of its long-running partnership with global cybersecurity leader Fortinet. The expansion will see the companies bring a new, fully unified secure networking offering to the Australian market. The strengthened partnership combines Fortinet’s global leadership in secure networking with Macquarie ...
Workato Brings Agentic AI to Australia and New Zealand With Regional Data Processing

Workato Brings Agentic AI to Australia and New Zealand With Regional Data Processing

Workato has launched one of the first enterprise-grade, fully sovereign Agentic AI offerings in ANZ, making its core AI models, inference, and processing available entirely within Australia for the first time.
DataDog Launches Bits AI SRE Agent to Resolve Incidents Faster

DataDog Launches Bits AI SRE Agent to Resolve Incidents Faster

Bits AI SRE is an on-call 24/7 agent that autonomously investigates alerts and surfaces the fastest path to remediation
Kroll Elevates Global MDR Services, Migrating Protection to CrowdStrike Falcon Complete Next-Gen MDR

Kroll Elevates Global MDR Services, Migrating Protection to CrowdStrike Falcon Complete Next-Gen MDR

Partnership unites Kroll’s cyber expertise with the CrowdStrike Falcon platform to deliver 24/7 expert- and agent-led, full-cycle protection across its global customer base
Genetec Launches Cloudrunner Mobile App for Real-Time Vehicle Investigations in the Field

Genetec Launches Cloudrunner Mobile App for Real-Time Vehicle Investigations in the Field

New app extends Cloudrunner capabilities to the field, giving law enforcement and security professionals faster access to data and alerts wherever they are.
KnowBe4 Predicts the Agentic AI Revolution Will Reshape Cybersecurity in 2026

KnowBe4 Predicts the Agentic AI Revolution Will Reshape Cybersecurity in 2026

KnowBe4 releases cybersecurity predictions for 2026 
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This