The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Modernising Privileged Access Management to Combat Advanced ID-Based Cyber Threats

Modernising Privileged Access Management to Combat Advanced ID-Based Cyber Threats

While identity-related threats are increasingly challenging, a well-implemented PAM strategy can transform security postures. By securing paths to privilege, businesses reduce their attack surfaces, making it harder for cybercriminals to exploit identities.
Proactive Measures for Businesses to Achieve Effective Cyber Hygiene Practices

Proactive Measures for Businesses to Achieve Effective Cyber Hygiene Practices

Cybercrime rates in Australia have surged, with online attacks averaging out to one every six minutes, according to the Australian Signals Directorate (ASD).(1) For organisations, one of the most common attacks is email compromise, which involves manipulating individuals into unauthorised financial transactions or the disclosure of sensitive company ...
Antifragility – the Essential Strategy for Modern Cyber Defense

Antifragility – the Essential Strategy for Modern Cyber Defense

Agnidipta Sarkar, VP CISO Advisory, explores how Nassim Taleb's concept of antifragility enhances cyber defense strategies.
The Five Step Journey to Securing Australia’s Most Important Data Assets

The Five Step Journey to Securing Australia’s Most Important Data Assets

Securing information assets to be resilient against a broad spectrum of threats is a journey many Australian organisations find themselves on. A steady stream of data breach disclosures - and a desire not to join that list - is keeping them motivated to stay the course. For banks and other financial entities, there’s additional motivation in the form ...
AI’s Transformative Role in Corporate Governance

AI’s Transformative Role in Corporate Governance

Corporate governance is on the brink of a major transformation driven by artificial intelligence (AI), which is already reshaping the way organisations operate. As we move deeper into the Fifth Industrial Revolution, AI is no longer a distant concept, but a central force that has fundamentally altered how companies are making strategic decisions, ...
Secure-By-Design Is a Significant Exercise, but the Rewards Are Significant, Too

Secure-By-Design Is a Significant Exercise, but the Rewards Are Significant, Too

Concerted multilateral efforts are underway to influence and change developer behaviour when it comes to secure software creation.
Cloud-Based Post-Quantum Cryptography (PQC) Vs Local PQC: Not as Straightforward as You’d Think

Cloud-Based Post-Quantum Cryptography (PQC) Vs Local PQC: Not as Straightforward as You’d Think

As quantum computing advances, organisations face a critical choice in adopting Post-Quantum Cryptography (PQC): cloud-based or local deployment. This article explores the benefits of cloud-based PQC, including improved performance by offloading heavy computations, enhanced security managed by specialised providers, seamless scalability, and simplified ...
Holiday Shopping and the Dark Market Parallel

Holiday Shopping and the Dark Market Parallel

As Black Friday and Cyber Monday deals continue throughout the holiday season, millions of consumers will log on to snag the best offers of the year. But they aren’t the only ones on the hunt for seasonal discounts. Cybercriminals, too, flock to dark markets, browsing for their version of ‘steals’ on an assortment of unconventional goods and services. ...
No results found.

In the News

Big Sales, Small Tells: Staying Safe From Online Scams This Black Friday and Cyber Monday

Big Sales, Small Tells: Staying Safe From Online Scams This Black Friday and Cyber Monday

With the year’s biggest shopping event right around the corner, Microsoft's National Security Officer, Mark Anderson, shares tips on how consumers can protect themselves from online scams
Palo Alto Networks Forecasts ​​6 Predictions on Securing the New AI Economy for 2026

Palo Alto Networks Forecasts ​​6 Predictions on Securing the New AI Economy for 2026

2026 will be the “Year of the Defender,” where autonomous AI defence is the only way to combat AI-driven identity attacks, data poisoning and quantum risks
Palo Alto Networks Announces New Prisma AIRS Integrations With Factory, Glean, IBM and ServiceNow to Secure the AI Agent Boom

Palo Alto Networks Announces New Prisma AIRS Integrations With Factory, Glean, IBM and ServiceNow to Secure the AI Agent Boom

Allowing customers to safely accelerate AI agent adoption across the enterprise while removing security roadblocks
BioCatch Connect 2.0 Delivers Advanced Fraud and Financial Crime-fighting Capabilities to World’s Banks

BioCatch Connect 2.0 Delivers Advanced Fraud and Financial Crime-fighting Capabilities to World’s Banks

BioCatch, which prevents financial crime by recognising patterns in human behaviour, today announced a major upgrade to its market-leading digital fraud- and financial crime-detection platform. BioCatch Connect 2.0 features both BioCatch Align, a singular, next-generation software development kit (SDK) that unifies signal collection (behaviour, device, ...
Check Point Software Collaborates With Microsoft to Deliver Enterprise-Grade AI Security for Microsoft Copilot Studio

Check Point Software Collaborates With Microsoft to Deliver Enterprise-Grade AI Security for Microsoft Copilot Studio

As AI reshapes enterprise workflows, Check Point works with Microsoft to enable secure agent innovation powered by real-time guardrails, DLP, and threat prevention REDWOOD CITY, CA. November 18, 2025 -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced it is collaborating ...
Rapid7 Delivers Smarter Network Security With Curated Intelligence Rules for AWS Network Firewall

Rapid7 Delivers Smarter Network Security With Curated Intelligence Rules for AWS Network Firewall

Rapid7's Curated Intelligence Rules for AWS Network Firewall delivers threat intelligence directly into customers’ AWS environments to address the operational challenges security teams face when manually managing and updating firewall rules to keep pace with evolving threats.
Kyndryl Announces Agentic AI Digital Trust to Support Governance of AI Agents at Scale

Kyndryl Announces Agentic AI Digital Trust to Support Governance of AI Agents at Scale

New services address emerging risks as organisations expand agentic AI across mission-critical environments     SYDNEY, November 20, 2025 – Kyndryl (NYSE: KD), a leading provider of mission-critical enterprise technology services, today announced Kyndryl Agentic AI Digital Trust to help enterprises securely manage and scale their agentic AI ...
CyberArk Unveils Free Tool and Powerful TLS Certificate Scan to Help Organisations Tackle Soaring Labor Costs and Disruptive System Outages

CyberArk Unveils Free Tool and Powerful TLS Certificate Scan to Help Organisations Tackle Soaring Labor Costs and Disruptive System Outages

Certificate lifespans are shrinking from 398 days today to just 47 days by 2029 | Transitioning to automated renewals will dramatically decrease labor costs | CyberArk’s new tools help organisations understand exposure and calculate renewal impact in seconds
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This