The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Future of Work Predictions 2024
With 2024 around the corner, Sunny Bedi, CIO and CDO at Snowflake, has developed his future of work predictions for next year.
Prediction: AI Will Be Your Best Work Buddy
One of the most exciting ideas for workplace productivity is the deployment of AI assistants that help employees become — and continue to be — efficient and effective. For example, ...

A Human Centric Tech Revolution in 2024
With 2024 around the corner, renowned tech visionary, Ben Canning, SVP of Product Experiences at Smartsheet, has developed his predictions for 2024 focusing on empowering individuals, fostering collaboration, and harnessing the untapped potential of artificial intelligence.
Work Needs To Revolve Around Humans, Not The Other Way Around
Productivity ...

Businesses Need To Rewrite Their Identity Security Playbook For 2024
With 9 in 10 businesses having suffered an identity-related breach, identity security remains a critical component to strengthening businesses’ cybersecurity posture in 2024. Yet, 44% of businesses are still at the beginning of their identity journeys, with 60% of Asia-Pacific businesses still in the first stage of identity maturity. Especially now, as ...
Unveiling the Future of Cybersecurity: A Conversation with Cisco’s Jeetu Patel
In a recent Cisco Live session in Melbourne, Cisco's Jeetu Patel, Executive Vice President & Chief Product Officer, shed light on the company's significant announcements and the profound advancements in the field of cybersecurity. Patel's insights underscore the pivotal role of artificial intelligence (AI) in revolutionising security, carving a ...

A Legal Take On The Cybersecurity Strategy 2023-2030
The Cybersecurity Strategy 2023-2030 (the Strategy) is Australia's blueprint for cyber-safety by 2030, with three horizons to get there. The Action Plan for the first horizon (2023-2025) sets the foundations for the rest of the strategy to follow, and unsurprisingly includes a lot of legal and regulatory elements to support horizons two and three. For ...

Battling Cyber Scams: Traditional Algorithms Won’t Cut it
Australians have experienced a surge in scams, with losses amounting to a staggering $3.1 billion in the past year alone. From a cybersecurity perspective, traditional anti-fraud analytics won’t stem the rising tide of scams. FICO's Vaile Mexted shares five key considerations for the finance sector as it faces an urgent imperative to fortify defences ...

Building Bridges: Developing Cybersecurity Skills And Elevating Talent
The cybersecurity sector is at a crossroads, grappling with what can only be described as an existential crisis. The gap in cybersecurity skills has grown to alarming proportions with Australia boasting a shortage of 25,000 to 30,000 cybersecurity professionals in 2022.
The escalating complexity of cyber threats, showcased by the 95% increase in ...

Legal Privilege – For Cyber Incidents
A class action lawsuit has been filed against the telecommunications company Optus by former and current customers whose personal information was exposed in a data breach. The lawsuit, representing millions of customers, alleges that Optus failed to protect customer information, breached privacy and telecommunication laws, and did not take proper steps ...
No results found.
In The News
Extreme Networks Leads Industry With First All-in-One Networking Platform Powered by Conversational, Multimodal, And Agentic AI
Now in Limited Availability, Extreme Platform ONE helps reduce manual tasks by up to 90 percent, offering the deepest and widest network visualisation and industry’s simplest licensing
PARIS, FRANCE, EXTREME CONNECT--May 20, 2025: Extreme Networks, Inc. (NASDAQ: EXTR) today launched new capabilities within Extreme Platform ONE™, now in Limited ...
GitHub Introduces Coding Agent For GitHub Copilot
At Microsoft Build 2025, GitHub introduced a new, enterprise-ready coding agent for Copilot – integrated, responsible and secured by GitHub’s control layer
Teradata Completes IRAP Assessment for VantageCloud at PROTECTED Level
Newest Assessment Applies to VantageCloud Lake on AWS, Azure and Google Cloud, and Permits Teradata Cloud Offerings for Government Projects
Oracle EU Sovereign Cloud Helps Organisations Across Germany Securely Manage Critical Business Data
RDV, BGN, and Vertama among public and private organisations taking advantage of sovereign cloud capabilities to run their sensitive workloads entirely within the borders of the EU
JFrog Partners With NVIDIA to Accelerate Agentic AI, Integrating the JFrog Platform With NVIDIA Enterprise AI Factory
New Full-Stack, Validated Design Aims to Accelerate AI/ML Model Engineering, Security, Operations and Delivery for the AI-powered Enterprise

CloudSEK Raises $19 Million in Series B1 Funding to Scale Predictive Cybersecurity Platform
Bangalore, India – May 20, 2025 — CloudSEK, a leader in AI-powered cyber threat prediction and intelligence, has raised $19 million across its Series A2 and B1 funding rounds. The round included participation from a mix of India- and US-based investors, such as MassMutual Ventures, Inflexor Ventures, Prana Ventures, Tenacity Ventures, and select ...
Google Cloud Expands Risk Protection Program to Australia Amid Rising Cyber Threats and Insurance Pressures
Google Cloud today announced the expansion of its Risk Protection Program (RPP) to the Australian market, providing local organisations with a streamlined path to cyber insurance that reflects their real-time security posture. The move comes as Australian companies face rising cyber risks, stricter regulatory standards, and mounting insurance ...
SecurityBridge Teams Up With Microsoft To Enhance SAP Security With Microsoft Sentinel
SAP systems are integral to many organizations, managing critical business processes and sensitive data. However, protecting these systems against cyber threats has traditionally been challenging due to their complexity and the specialized nature of SAP applications.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
