The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

2025 Cybersecurity Predictions by CyberArk

2025 Cybersecurity Predictions by CyberArk

The cybersecurity landscape is poised for transformative shifts in 2025 driven by technological innovation and evolving threats. As cybercriminals become more sophisticated, organisations must stay ahead by proactively adopting strategies that prioritise identity security and business resiliency. Thomas Fikentscher, CyberArk’s Area Vice President for ...
How Breach Readiness Will Shape Cyber Defense In 2025

How Breach Readiness Will Shape Cyber Defense In 2025

Rajesh Khazanchi, co-founder and CEO of ColorTokens, writes how breach ready strategies and AI-powered cyber defense can drive cyber resilience and protect your business.
AI Domination and Quantum Computing on the Horizon

AI Domination and Quantum Computing on the Horizon

Over the last few years we all know there has been transformative changes in the workplace, the critical role of technology, and the ongoing debate between remote and in-office work. Enterprises are still pushing for staff to come into the office more frequently and are finding persuasive ways to entice their employees back into the building. I sat ...
Human-centric Cybersecurity: The First Line of Defence

Human-centric Cybersecurity: The First Line of Defence

Introduction Australian organisations face an array of cybersecurity challenges that didn’t exist half a decade ago. And yet the reliance on traditional security and legacy systems is largely the status quo – often falling short in addressing the nuanced interplay between human behaviour and technological vulnerabilities. A New Approach Enter ...
Keeping The Public Safe From Festive Scams

Keeping The Public Safe From Festive Scams

"While the festive season should be a period of joy and goodwill, hackers are particularly active in Australia and have the ability to employ new, sophisticated tactics on consumers. One emerging trend we're seeing is the use of AI-powered tools, with deepfake technologies allowing hackers to create convincing face-swapped videos and the ability to ...
When Post-Quantum Cryptography Is No Longer Post-Quantum

When Post-Quantum Cryptography Is No Longer Post-Quantum

As quantum computing advances, the standards for Post-Quantum Cryptography (PQC) are evolving rapidly, with governments like Australia phasing out even selected PQC algorithms like ML-KEM-768 and ML-DSA-65 to maintain robust security. This article explores the challenges businesses face in adapting to these shifting standards, from resource demands to ...
The Cisco Live 2024 Rundown Featuring Splunk

The Cisco Live 2024 Rundown Featuring Splunk

At the hustling and bustling Melbourne Convention and Exhibition Centre, the 2024 edition of Cisco Live commenced with discussions on the future of cybersecurity and data management. With industry heavyweights like Tom Gillis, AJ Shipley, and Tom Casey at the helm, the event promises to redefine the paradigms of network security, artificial ...
Modernising Privileged Access Management To Combat Advanced ID-Based Cyber Threats

Modernising Privileged Access Management To Combat Advanced ID-Based Cyber Threats

While identity-related threats are increasingly challenging, a well-implemented PAM strategy can transform security postures. By securing paths to privilege, businesses reduce their attack surfaces, making it harder for cybercriminals to exploit identities.

In The News

Unlocking AI’s Full Potential: EXL’s “AI in Action” Event Will Showcase Real-World Strategies to Scale AI for Business Leaders in ANZ

Unlocking AI’s Full Potential: EXL’s “AI in Action” Event Will Showcase Real-World Strategies to Scale AI for Business Leaders in ANZ

The event will provide attendees with actionable insights, hands-on demonstrations, and expert discussions to scale AI across the enterprise, bridge strategy with execution, and drive measurable business outcomes.
BeyondTrust Releases AI-powered True Privilege Graph to Expose How Attackers Exploit Hidden Paths to Privilege

BeyondTrust Releases AI-powered True Privilege Graph to Expose How Attackers Exploit Hidden Paths to Privilege

Revolutionary technology redefines Identity Security by revealing previously undetectable Paths to Privilege attackers attempt to leverage Prioritised remediations enhance security across endpoints, servers, Cloud and SaaS environments, reducing alert fatigue and enabling organisations to strengthen their defenses before attacks occur
Wild Tech Appoints Dan Whittle to Prepare Businesses for AI With Managed Services Expansion

Wild Tech Appoints Dan Whittle to Prepare Businesses for AI With Managed Services Expansion

Wild Tech has today announced the appointment of Dan Whittle as General Manager, Managed Services, marking a major milestone in the company's strategic trajectory. This initiative underscores Wild Tech's commitment to providing cutting-edge, technology solutions that enables the enterprise AI ready businesses of the future. Whittle joins Wild Tech ...
Fortinet Delivers Unmatched Security And Efficient Network Performance For The Distributed Enterprise With New Next-Gen Firewalls

Fortinet Delivers Unmatched Security And Efficient Network Performance For The Distributed Enterprise With New Next-Gen Firewalls

New FortiGate G series next-gen firewalls empower customers to strengthen threat protection and future-proof IT infrastructure 
Claroty Wins Best in KLAS Award for Healthcare IoT Security Five Years in a Row

Claroty Wins Best in KLAS Award for Healthcare IoT Security Five Years in a Row

In rare five-year winning streak, Claroty xDome recognised by KLAS Research as highest-rated IoT security solution by healthcare customers
Verizon Business Appoints Mark Trumble to Lead Cybersecurity Sales for Asia-Pacific

Verizon Business Appoints Mark Trumble to Lead Cybersecurity Sales for Asia-Pacific

Sydney, AUSTRALIA – Verizon Business today announced the appointment of Mark Trumble as Head of Cybersecurity Sales for the Asia-Pacific region. Mark will lead a team of regional cybersecurity specialists dedicated to addressing the increasingly complex security requirements of Verizon’s enterprise and government clients. Backed by one of the ...
Kaseya Report Outlines Top Trends in Backup and Recovery in 2025

Kaseya Report Outlines Top Trends in Backup and Recovery in 2025

AUSTRALIA, 10 February 2025 — Kaseya, the leading global provider of AI-powered cybersecurity and IT management software, released today The State of Backup and Recovery Report 2025: Navigating the Future of Data Protection. The survey of over 3,000 IT professionals worldwide reveals the importance of data protection and the increased need for robust ...
Fortinet Opens New Company-Owned Headquarters In Australia, Strengthening Global Reach And Advancing Enterprise Customer Experiences

Fortinet Opens New Company-Owned Headquarters In Australia, Strengthening Global Reach And Advancing Enterprise Customer Experiences

The building marks Fortinet’s first Innovation Hub in the Asia-Pacific, featuring a state-of-the-art data centre and a Technical Assistance Centre, along with a dedicated training facility designed to drive innovation, collaboration, and growth  

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This