The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Unmasking the SYS01 InfoStealer Threat: Bitdefender Labs Tracks Global Malvertising Campaign Targeting Meta Business Pages

Unmasking the SYS01 InfoStealer Threat: Bitdefender Labs Tracks Global Malvertising Campaign Targeting Meta Business Pages

In a digital world where advertising is king, businesses and organisations are not the only ones using this powerful tool. Cybercriminals have a knack for exploiting the engine that powers online platforms by corrupting the vast reach of advertising to distribute malware en masse. While legitimate businesses rely on ads to reach new audiences, ...
Cybersecurity is Everyone’s Business: Navigating Our Digital Lives

Cybersecurity is Everyone’s Business: Navigating Our Digital Lives

As Cybersecurity Awareness Month draws to a close, the message "Cybersecurity is Everyone's Business" remains vital. Despite fewer high-profile breaches making headlines, cyber threats are still very much present. Just this month, Australian companies like Funlab, Perfection Fresh and Road Distribution Services were targeted by cyberattacks, ...
How NetApp’s Government Relations are Shaping Secure Tech

How NetApp’s Government Relations are Shaping Secure Tech

Kristen Verderame, Vice President of Global Government Relations at NetApp, shared the importance of government relations, public affairs, and cybersecurity in shaping the technology. Verderame shared a view on how companies like NetApp collaborate with various government bodies to support missions and develop cybersecurity frameworks. Representing ...
How Quantum Random Number Generators Can Amplify the Power of Post Quantum Cryptography

How Quantum Random Number Generators Can Amplify the Power of Post Quantum Cryptography

The development of quantum computing is driving the need for new cryptographic methods that can resist future quantum-based attacks. Among the most promising techniques in post-quantum cryptography are Module Lattice-based Key Encapsulation Mechanisms (ML-KEM) and Module Lattice-based Digital Signature Algorithms (ML-DSA). These methods leverage the ...
What Do Gauss and Euler Handshakes Have to Do with “Infinite Microsegmentation Policy Impact Simulation”?

What Do Gauss and Euler Handshakes Have to Do with “Infinite Microsegmentation Policy Impact Simulation”?

Explore how math concepts from Gauss and Euler solve cybersecurity challenges, enabling scalable microsegmentation with infinite policy impact simulation.
NetApp Is Committed To Helping Entities Build Their Own AI Factories

NetApp Is Committed To Helping Entities Build Their Own AI Factories

So much is going on with NetApp according to Jeff Baxter, Vice President of Product Marketing at NetApp. Baxter provided details about the latest NetApp product announcements and the future trajectory of artificial intelligence (AI) and cybersecurity within the industry. Understanding ONTAP: The Foundation of Data Management The introduction to ...
Revolutionising Government with a Modular, AI-Driven Platform

Revolutionising Government with a Modular, AI-Driven Platform

Utilising low-code platforms with modular features more seamlessly allow government agencies to efficiently and effectively meet the ever-changing needs of their citizens. They are contributing to government at all levels to increase cost efficiency, become more agile, whilst remaining compliant and better prepared for the future.
Debunking Three Common Myths About Data Protection

Debunking Three Common Myths About Data Protection

Introduction Data protection is no longer an afterthought but a daily priority for businesses. While Australia's regulations like the Privacy Act and the Notifiable Data Breaches (NDB) scheme are crucial, the average cost of a data breach globally is now $4.45 million. For Australian enterprises, the financial hit can be devastating, especially if ...
No results found.

In The News

Cloudwerx Reunites Cloud Sherpas Alumni with Appointment of Brendan Connolly as COO and Data and AI Lead

Cloudwerx Reunites Cloud Sherpas Alumni with Appointment of Brendan Connolly as COO and Data and AI Lead

Sydney, 22 October 2025 – Cloudwerx, a leading Australian provider of solutions that integrate advanced data, Generative AI and cloud technology, has announced the appointment of Brendan Connolly as Chief Operating Officer and head of its data and agentic AI division. Based in Sydney, Connolly will be responsible for scaling and productising the ...
New SolarWinds Report: Gen AI Significantly Drops Incident Response Time for ITSM Teams

New SolarWinds Report: Gen AI Significantly Drops Incident Response Time for ITSM Teams

Findings show a path to more effective and efficient ITSM operations through generative AI
Metadata Becomes the Cornerstone of Cyber Defence as CISOs Reimagine 2026 Security Strategies

Metadata Becomes the Cornerstone of Cyber Defence as CISOs Reimagine 2026 Security Strategies

As organisations race to adopt artificial intelligence, the world’s cybersecurity leaders are being forced to rethink their entire defensive playbook. New research from Gigamon reveals that as AI reshapes how businesses innovate and how adversaries operate, chief information security officers (CISOs) are recalibrating their risk strategies to meet a ...
Malaysia Expands Deployment of BlackBerry Secure Communications for the  46th and 47th ASEAN Summits

Malaysia Expands Deployment of BlackBerry Secure Communications for the 46th and 47th ASEAN Summits

Malaysia modernizes mobile command and control, securing voice and messaging for inter-agency coordination with BlackBerry AtHoc and BlackBerry SecuSUITE
Sophos Launches ITDR to Protect Against Growing Identity-Based Attacks

Sophos Launches ITDR to Protect Against Growing Identity-Based Attacks

Today, Sophos announced the launch of Sophos Identity Threat Detection and Response (ITDR). This new solution for Sophos XDR and Sophos MDR continuously monitors customer environments for identity risks and misconfigurations and scans the dark web for compromised credentials. It enables organizations to detect and respond to identity-based attacks ...
Splunk Report Shows Observability is a Business Catalyst for AI Adoption, Customer Experience, and Product Innovation

Splunk Report Shows Observability is a Business Catalyst for AI Adoption, Customer Experience, and Product Innovation

Cisco today announced the release of the Splunk State of Observability 2025: The Rise of a Business Catalyst report, marking its fifth annual analysis into the evolving landscape of observability. This year's research highlights the critical role observability plays in delivering business value – from elevating customer experience and boosting employee ...
KBI.Media Announces Season Two of Destination Cyber, with New Host Chaahat Baghla

KBI.Media Announces Season Two of Destination Cyber, with New Host Chaahat Baghla

Sydney, Australia - Oct 21st - KBI.Media is proud to announce the launch of Destination Cyber: Season Two, featuring new host Chaahat Baghla, a rising cybersecurity voice and final-year student at Macquarie University, where she is completing a Bachelor of Cybersecurity. Baghla brings a student’s perspective and professional curiosity to the platform, ...
Salty Much: Darktrace’s View on a Recent Salt Typhoon Intrusion

Salty Much: Darktrace’s View on a Recent Salt Typhoon Intrusion

Salt Typhoon, a China-linked cyber espionage group, has been observed targeting global infrastructure using stealthy techniques such as DLL sideloading and zero-day exploits. Darktrace recently identified early-stage intrusion activity consistent with Salt Typhoon’s tactics, reinforcing the importance of anomaly-based detection over traditional ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This