The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

How NetApp’s Government Relations Are Shaping Secure Tech
Kristen Verderame, Vice President of Global Government Relations at NetApp, shared the importance of government relations, public affairs, and cybersecurity in shaping the technology. Verderame shared a view on how companies like NetApp collaborate with various government bodies to support missions and develop cybersecurity frameworks.
Representing ...

How Quantum Random Number Generators Can Amplify the Power of Post Quantum cryptography
The development of quantum computing is driving the need for new cryptographic methods that can resist future quantum-based attacks. Among the most promising techniques in post-quantum cryptography are Module Lattice-based Key Encapsulation Mechanisms (ML-KEM) and Module Lattice-based Digital Signature Algorithms (ML-DSA). These methods leverage the ...

What Do Gauss and Euler Handshakes Have to Do With “Infinite Microsegmentation Policy Impact Simulation”?
Explore how math concepts from Gauss and Euler solve cybersecurity challenges, enabling scalable microsegmentation with infinite policy impact simulation.

NetApp Is Committed to Helping Entities Build Their Own AI Factories
So much is going on with NetApp according to Jeff Baxter, Vice President of Product Marketing at NetApp. Baxter provided details about the latest NetApp product announcements and the future trajectory of artificial intelligence (AI) and cybersecurity within the industry.
Understanding ONTAP: The Foundation of Data Management
The introduction to ...

Revolutionising Government With a Modular, AI-Driven Platform
Utilising low-code platforms with modular features more seamlessly allow government agencies to efficiently and effectively meet the ever-changing needs of their citizens. They are contributing to government at all levels to increase cost efficiency, become more agile, whilst remaining compliant and better prepared for the future.

Debunking Three Common Myths About Data Protection
Introduction
Data protection is no longer an afterthought but a daily priority for businesses. While Australia's regulations like the Privacy Act and the Notifiable Data Breaches (NDB) scheme are crucial, the average cost of a data breach globally is now $4.45 million. For Australian enterprises, the financial hit can be devastating, especially if ...

Ensuring Secure Content in the Era of Digital Transformation
Introduction
In today’s digital landscape, safeguarding sensitive information, be it in transit, at rest, or in use, has become more crucial. As public and private organisations continue to embrace digital transformation, the risk of data breaches and unauthorised access has grown exponentially.
As creating and sharing documents from anywhere ...

Boosting Software Security With a Binary Approach
Introduction
The discovery of a leaked access token earlier this year that could have opened the door to malicious code being injected into one of the world’s most widespread programming languages has shone a light on why the method we use to search for security issues in software matters.
The access token, discovered by the JFrog Security Research ...
No results found.
In the News
Dynatrace Expands AWS Integrations at re:Invent 2025
BOSTON, Mass., December 3, 2025 — Today at Amazon Web Services (AWS) re:Invent 2025, Dynatrace (NYSE: DT) announced expanded integrations with advanced AWS technologies and new achievements with AWS that deliver enhanced AI-driven observability, automation, and security to customers worldwide. These advancements help enterprises running workloads on ...
DataDog Announces Expanded Collaboration With AWS, Highlighting New AI, Observability and Security Capabilities at AWS re:Invent
Datadog signs new Strategic Collaboration Agreement with AWS, building on 10+ years of joint innovation and outcomes for customers
AI Adoption in Cybersecurity Surges Across Australia: 91 Percent Already Using IT
AI now powers detection, response, and recruitment as enterprises shift from reactive to predictive defence
Veeam and HPE Extend Strategic Partnership and Unveil Next-gen Data Protection to Supercharge Enterprise Resilience
Veeam® Software, the #1 global leader by market share in Data Resilience, today announced a bold new chapter in its strategic alliance with HPE. Building on the partnership’s momentum earlier this year, HPE and Veeam are unleashing transformative, integrated solutions designed to empower enterprises with radically simplified data resilience for the ...
BeyondTrust Announces the Availability of BeyondTrust + Ping Identity Unified Identity Security Solutions in AWS Marketplace
ATLANTA, GA – December 03, 2025 – BeyondTrust, the global leader in privilege-centric identity security protecting Paths to Privilege™, and Ping Identity, a leader in securing digital identities for the world’s largest enterprises, announced today the availability of the BeyondTrust + Ping Identity Unified Identity Security solutions as a ...
Macquarie Telecom Expands Fortinet Partnership to Launch Unified Secure Networking Solution
Macquarie Telecom has today announced a major expansion of its long-running partnership with global cybersecurity leader Fortinet. The expansion will see the companies bring a new, fully unified secure networking offering to the Australian market.
The strengthened partnership combines Fortinet’s global leadership in secure networking with Macquarie ...
Workato Brings Agentic AI to Australia and New Zealand With Regional Data Processing
Workato has launched one of the first enterprise-grade, fully sovereign Agentic AI offerings in ANZ, making its core AI models, inference, and processing available entirely within Australia for the first time.
DataDog Launches Bits AI SRE Agent to Resolve Incidents Faster
Bits AI SRE is an on-call 24/7 agent that autonomously investigates alerts and surfaces the fastest path to remediation
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
