The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Unmasking the SYS01 InfoStealer Threat: Bitdefender Labs Tracks Global Malvertising Campaign Targeting Meta Business Pages

Unmasking the SYS01 InfoStealer Threat: Bitdefender Labs Tracks Global Malvertising Campaign Targeting Meta Business Pages

In a digital world where advertising is king, businesses and organisations are not the only ones using this powerful tool. Cybercriminals have a knack for exploiting the engine that powers online platforms by corrupting the vast reach of advertising to distribute malware en masse. While legitimate businesses rely on ads to reach new audiences, ...
Cybersecurity is Everyone’s Business: Navigating Our Digital Lives

Cybersecurity is Everyone’s Business: Navigating Our Digital Lives

As Cybersecurity Awareness Month draws to a close, the message "Cybersecurity is Everyone's Business" remains vital. Despite fewer high-profile breaches making headlines, cyber threats are still very much present. Just this month, Australian companies like Funlab, Perfection Fresh and Road Distribution Services were targeted by cyberattacks, ...
How NetApp’s Government Relations are Shaping Secure Tech

How NetApp’s Government Relations are Shaping Secure Tech

Kristen Verderame, Vice President of Global Government Relations at NetApp, shared the importance of government relations, public affairs, and cybersecurity in shaping the technology. Verderame shared a view on how companies like NetApp collaborate with various government bodies to support missions and develop cybersecurity frameworks. Representing ...
How Quantum Random Number Generators Can Amplify the Power of Post Quantum Cryptography

How Quantum Random Number Generators Can Amplify the Power of Post Quantum Cryptography

The development of quantum computing is driving the need for new cryptographic methods that can resist future quantum-based attacks. Among the most promising techniques in post-quantum cryptography are Module Lattice-based Key Encapsulation Mechanisms (ML-KEM) and Module Lattice-based Digital Signature Algorithms (ML-DSA). These methods leverage the ...
What Do Gauss and Euler Handshakes Have to Do with “Infinite Microsegmentation Policy Impact Simulation”?

What Do Gauss and Euler Handshakes Have to Do with “Infinite Microsegmentation Policy Impact Simulation”?

Explore how math concepts from Gauss and Euler solve cybersecurity challenges, enabling scalable microsegmentation with infinite policy impact simulation.
NetApp Is Committed To Helping Entities Build Their Own AI Factories

NetApp Is Committed To Helping Entities Build Their Own AI Factories

So much is going on with NetApp according to Jeff Baxter, Vice President of Product Marketing at NetApp. Baxter provided details about the latest NetApp product announcements and the future trajectory of artificial intelligence (AI) and cybersecurity within the industry. Understanding ONTAP: The Foundation of Data Management The introduction to ...
Revolutionising Government with a Modular, AI-Driven Platform

Revolutionising Government with a Modular, AI-Driven Platform

Utilising low-code platforms with modular features more seamlessly allow government agencies to efficiently and effectively meet the ever-changing needs of their citizens. They are contributing to government at all levels to increase cost efficiency, become more agile, whilst remaining compliant and better prepared for the future.
Debunking Three Common Myths About Data Protection

Debunking Three Common Myths About Data Protection

Introduction Data protection is no longer an afterthought but a daily priority for businesses. While Australia's regulations like the Privacy Act and the Notifiable Data Breaches (NDB) scheme are crucial, the average cost of a data breach globally is now $4.45 million. For Australian enterprises, the financial hit can be devastating, especially if ...

In The News

More Than 60% Of Australian Employees Admit To Bypassing Cybersecurity Policies To Make Their Lives Easier

More Than 60% Of Australian Employees Admit To Bypassing Cybersecurity Policies To Make Their Lives Easier

Privileged access issues combined with worrisome worker actions compound security risks for organisations CyberArk Lab research also finds online history can be threat to employers as well as to personal lives
Teradata Introduces โ€˜Rapid-Startโ€™ Generative AI Use Cases with Amazon Bedrock Integration

Teradata Introduces โ€˜Rapid-Startโ€™ Generative AI Use Cases with Amazon Bedrock Integration

Teradata VantageCloud customers on AWS can immediately start implementing Gen AI use cases to fast-track business value and accelerate ROI
Trustwave Launches Two New Microsoft Security Accelerators to Increase Security Maturity and Drive Cost Savings

Trustwave Launches Two New Microsoft Security Accelerators to Increase Security Maturity and Drive Cost Savings

December 4, 2024 โ€“โ€ฏTrustwave, a leading cybersecurity and managed security services provider, has announced the launch ofโ€ฏtwo new Microsoft Security Acceleratorsโ€ฏdesigned to help organisations quickly improve their security maturity and identify cost-saving opportunities. These accelerators โ€“ the Accelerator for Microsoft Purview and the Accelerator ...
Lenovo Unveils Water-Cooled Supercomputers For Advanced Energy-Efficient Computing

Lenovo Unveils Water-Cooled Supercomputers For Advanced Energy-Efficient Computing

Lenovo, the worldโ€™s #1 supercomputer provider, has unveiled new high-performance innovations that deliver game-changing energy efficiency and accelerated computing to help scientific and industry researchers propel AI-powered transformation at any scale. Showcased at Supercomputing 2024 (SC24), the new powerful, energy-efficient platforms will help ...
NIWA Selects VAST Data to Set New Standards in Environmental Research Infrastructure

NIWA Selects VAST Data to Set New Standards in Environmental Research Infrastructure

AI data platform company, VAST Data, today announced that the National Institute of Water and Atmospheric Research (NIWA), New Zealandโ€™s leading Crown Research Institute for environmental science, has selected the VAST Data Platform to update and future-proof its data infrastructure. The platform will enable NIWA to synchronise its production workloads ...
Elastic Announces General Availability of Elastic Cloud Serverless Powered by Search AI Lake

Elastic Announces General Availability of Elastic Cloud Serverless Powered by Search AI Lake

The new stateless Elasticsearch architecture is optimised for real-time search on limitless data to scale security, observability and search without operational overhead
Seven Must-know Technology Trends For 2025

Seven Must-know Technology Trends For 2025

Introduction Technological innovation is reshaping business competition rules. Yesterdayโ€™s successful strategies may not be enough for tomorrowโ€™s challenges and businesses must adapt to the next wave of advancements, from quantum computing to industry-specific artificial intelligence (AI) solutions. Logicalis Australia has identified seven key trends ...
Axis Communications Celebrates 40 Years of Innovation and Growth in Oceania

Axis Communications Celebrates 40 Years of Innovation and Growth in Oceania

From a one-person operation to a 55-member team, supported by a thriving partner network

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This