The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

How Quantum Random Number Generators Can Amplify the Power of Post Quantum Cryptography
The development of quantum computing is driving the need for new cryptographic methods that can resist future quantum-based attacks. Among the most promising techniques in post-quantum cryptography are Module Lattice-based Key Encapsulation Mechanisms (ML-KEM) and Module Lattice-based Digital Signature Algorithms (ML-DSA). These methods leverage the ...

What Do Gauss and Euler Handshakes Have to Do with “Infinite Microsegmentation Policy Impact Simulation”?
Explore how math concepts from Gauss and Euler solve cybersecurity challenges, enabling scalable microsegmentation with infinite policy impact simulation.

NetApp Is Committed To Helping Entities Build Their Own AI Factories
So much is going on with NetApp according to Jeff Baxter, Vice President of Product Marketing at NetApp. Baxter provided details about the latest NetApp product announcements and the future trajectory of artificial intelligence (AI) and cybersecurity within the industry.
Understanding ONTAP: The Foundation of Data Management
The introduction to ...

Revolutionising Government with a Modular, AI-Driven Platform
Utilising low-code platforms with modular features more seamlessly allow government agencies to efficiently and effectively meet the ever-changing needs of their citizens. They are contributing to government at all levels to increase cost efficiency, become more agile, whilst remaining compliant and better prepared for the future.

Debunking Three Common Myths About Data Protection
Introduction
Data protection is no longer an afterthought but a daily priority for businesses. While Australia's regulations like the Privacy Act and the Notifiable Data Breaches (NDB) scheme are crucial, the average cost of a data breach globally is now $4.45 million. For Australian enterprises, the financial hit can be devastating, especially if ...

Ensuring Secure Content in the Era of Digital Transformation
Introduction
In today’s digital landscape, safeguarding sensitive information, be it in transit, at rest, or in use, has become more crucial. As public and private organisations continue to embrace digital transformation, the risk of data breaches and unauthorised access has grown exponentially.
As creating and sharing documents from anywhere ...

Boosting Software Security With a Binary Approach
Introduction
The discovery of a leaked access token earlier this year that could have opened the door to malicious code being injected into one of the world’s most widespread programming languages has shone a light on why the method we use to search for security issues in software matters.
The access token, discovered by the JFrog Security Research ...

The Goal Is To Alleviate The Administrative Burden In Healthcare
Stephanie Trunzo, Senior Vice President and General Manager at Oracle Industry. Trunzo dives deep into the changes Oracle Industries is bringing to the healthcare sector with applied AI and an open healthcare platform and what this actually means.
Trunzo led with Oracle Industries' approach, which integrates specific industry needs into general ...
No results found.
In The News
Exabeam Delivers First Configurable Peer Benchmarking for CISO Decision-Making
New capabilities in the Exabeam Nova Advisor Agent and Outcomes Navigator operationalise benchmarking for proactive security operations
Ping Identity Survey Reveals Australian Consumer Trust Plummeting as Security Concerns Soar
With only 20% confident in spotting scams, Australians demand stronger AI security and regulation
C-Suite’s Rush to AI Blinds Leadership to Critical Security Failures, Leaving Organisations Exposed
With 34% of organisations suffering an AI-related breach, new Tenable report shows leadership is misjudging risk by focusing on reactive metrics instead of preventable threats
KnowBe4 Is a Proud Participant in the Microsoft Security Store Partner Ecosystem
KnowBe4 customers can now streamline procurement and deployment processes to accelerate their security outcomes and simplify operations
C-Suite’s Rush to AI Blinds Leadership to Critical Security Failures, Leaving Organisations Exposed
With 34% of organisations suffering an AI-related breach, new Tenable report shows leadership is misjudging risk by focusing on reactive metrics instead of preventable threats
Kyndryl Announces Advanced Agentic AI Capabilities that Enable Customers to Scale AI Across their Businesses
Newly unveiled core of Kyndryl Agentic AI Framework orchestrates, securely builds and dynamically deploys AI agents. Enterprise-grade Kyndryl Agentic AI Framework is augmented with a differentiated approach and unique methodology to drive business outcomes. Kyndryl is poised to empower customers across industries to become AI-native.
Trend Micro Named a Worldwide Leader in XDR by IDC MarketScape
Trend Vision One™ Security Operations is built for the next-gen SOC
Tenable Exposes AI Flaws in Google Gemini That Could Have Let Hackers Steal Data from Millions
The Gemini Trifecta marks a dangerous shift in AI security as attackers could turn Gemini into the attack vehicle, not just target it
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
