The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Australian Enterprises Need An Exit Strategy For Tier-One Applications In Virtualised Environments

Australian Enterprises Need An Exit Strategy For Tier-One Applications In Virtualised Environments

Escalating threats targeting the hypervisor are driving more enterprises to reconsider how they host their tier-one applications.
Cybercrime Is Soaring: Is Your Business Ready To Respond?

Cybercrime Is Soaring: Is Your Business Ready To Respond?

Key questions every organisation should consider when assessing their cybersecurity readiness.
Are Aussie Networks Future-fit?

Are Aussie Networks Future-fit?

According to IDC’s recent Asia/Pacific Enterprise Connectivity and Telecom Services Survey, only 51% of ANZ companies believe their networks are equipped to handle the complex demands of today’s digital economy.  Some might say that’s an alarming statistic. So what's stopping Aussie companies from getting their networks Future Fit?
Unmasking the SYS01 InfoStealer Threat: Bitdefender Labs Tracks Global Malvertising Campaign Targeting Meta Business Pages

Unmasking the SYS01 InfoStealer Threat: Bitdefender Labs Tracks Global Malvertising Campaign Targeting Meta Business Pages

In a digital world where advertising is king, businesses and organisations are not the only ones using this powerful tool. Cybercriminals have a knack for exploiting the engine that powers online platforms by corrupting the vast reach of advertising to distribute malware en masse. While legitimate businesses rely on ads to reach new audiences, ...
Cybersecurity is Everyone’s Business: Navigating Our Digital Lives

Cybersecurity is Everyone’s Business: Navigating Our Digital Lives

As Cybersecurity Awareness Month draws to a close, the message "Cybersecurity is Everyone's Business" remains vital. Despite fewer high-profile breaches making headlines, cyber threats are still very much present. Just this month, Australian companies like Funlab, Perfection Fresh and Road Distribution Services were targeted by cyberattacks, ...
How NetApp’s Government Relations are Shaping Secure Tech

How NetApp’s Government Relations are Shaping Secure Tech

Kristen Verderame, Vice President of Global Government Relations at NetApp, shared the importance of government relations, public affairs, and cybersecurity in shaping the technology. Verderame shared a view on how companies like NetApp collaborate with various government bodies to support missions and develop cybersecurity frameworks. Representing ...
How Quantum Random Number Generators Can Amplify the Power of Post Quantum Cryptography

How Quantum Random Number Generators Can Amplify the Power of Post Quantum Cryptography

The development of quantum computing is driving the need for new cryptographic methods that can resist future quantum-based attacks. Among the most promising techniques in post-quantum cryptography are Module Lattice-based Key Encapsulation Mechanisms (ML-KEM) and Module Lattice-based Digital Signature Algorithms (ML-DSA). These methods leverage the ...
What Do Gauss and Euler Handshakes Have to Do with “Infinite Microsegmentation Policy Impact Simulation”?

What Do Gauss and Euler Handshakes Have to Do with “Infinite Microsegmentation Policy Impact Simulation”?

Explore how math concepts from Gauss and Euler solve cybersecurity challenges, enabling scalable microsegmentation with infinite policy impact simulation.
No results found.

In The News

CyberArk Expands Machine Identity Security Portfolio with Advanced Discovery and Context Capabilities, Enabling Enhanced Visibility and Control

CyberArk Expands Machine Identity Security Portfolio with Advanced Discovery and Context Capabilities, Enabling Enhanced Visibility and Control

Machine identities outnumber human identities by 82 to 1. Automated discovery and context-driven approaches are needed to meet complex machine identity security challenges. CyberArk’s platform enhancements help security teams easily find, manage and secure machine identities across the enterprise.
ColorTokens Completes IRAP Assessment to PROTECTED Level, Delivering Government-grade Breach Readiness in Australia

ColorTokens Completes IRAP Assessment to PROTECTED Level, Delivering Government-grade Breach Readiness in Australia

ColorTokens today reaffirmed its commitment to the Australian market including federal, state, and local government agencies, regulated industries, critical infrastructure operators, and enterprises.
Fortinet Annual Report Indicates Artificial Intelligence Skillsets Critical to Cybersecurity Skills Gap Solution

Fortinet Annual Report Indicates Artificial Intelligence Skillsets Critical to Cybersecurity Skills Gap Solution

87 per cent of cybersecurity professionals expect artificial intelligence to enhance their roles, offering efficiency and relief amid cyber skill shortages, but they require upskilling to unlock full potential
Semperis Accelerates Cyber Response With Unified Identity Cyberattack Recovery and Crisis Management offering

Semperis Accelerates Cyber Response With Unified Identity Cyberattack Recovery and Crisis Management offering

Semperis' first-of-its-kind Ready1 for Identity Crisis Management combines market-leading hybrid identity recovery and crisis management to streamline out-of-band communications, reporting, and identity recovery
Barracuda Introduces ‘Barracuda Research’ – A Unified Resource for Global Threat Intelligence and Insights

Barracuda Introduces ‘Barracuda Research’ – A Unified Resource for Global Threat Intelligence and Insights

Sydney, Australia – 9 October, 2025 — Barracuda Networks, Inc., a leading cybersecurity company providing complete protection against complex threats for all size business, has introduced Barracuda Research, a new centralised resource for threat intelligence, real-world incident analysis, email threat detection data from Barracuda AI, and more. ...
Sophos Receives Recognition As It Reaches Key Milestones With Secureworks Acquisition

Sophos Receives Recognition As It Reaches Key Milestones With Secureworks Acquisition

Sophos today announced it has been named a Leader in the IDC MarketScape™: Worldwide Extended Detection and Response (XDR) Software 2025 Vendor Assessment (doc #US52997325, September 2025) report. The IDC MarketScape for Extended Detection and Response cites Sophos’ protection capabilities as a strength, noting, “Sophos is viewed favourably in terms ...
WhatsApp-Enabled ‘Vote for My Child’ Scams Are Rapidly Spreading Across Europe, Bitdefender Lab Warns

WhatsApp-Enabled ‘Vote for My Child’ Scams Are Rapidly Spreading Across Europe, Bitdefender Lab Warns

If you’ve ever wondered how someone could lose access to their WhatsApp account in a matter of seconds, the answer lies in cleverly crafted scams. Cybercriminals don’t need advanced malware or sophisticated hacking tools – instead they exploit trust, urgency, and empathy. Bitdefender Labs has been monitoring a rapidly expanding campaign that ...
Kaseya Acquires Leading AI-Powered Email Security Provider INKY

Kaseya Acquires Leading AI-Powered Email Security Provider INKY

Acquisition strengthens Kaseya’s end-to-end cybersecurity platform and advances Kaseya 365 User with next-generation, AI-driven email protection.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This