The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Your AI is Only as Good as your Data, According to NetApp’s President

Your AI is Only as Good as your Data, According to NetApp’s President

Forget dashboards and customer insights, the game has changed. The royal flush is in the data and lots of it.​ Countries and corporations that can prove the integrity of their data will dominate the next stage of global trade and innovation.Recently, NetApp’s President César Cernuda walked through the AI gold rush. It’s meaningless if companies can’t ...
North Korean ‘Laptop Farm’ Scheme Nets Prison Time for US Operatives

North Korean ‘Laptop Farm’ Scheme Nets Prison Time for US Operatives

​Two US nationals have been sentenced years behind bars after federal prosecutors say they helped fuel a sophisticated North Korean scheme that infiltrated American companies, stole identitie,s and funnelled millions to a hostile regime.The United States Department of Justice announced that Kejia Wang, 42, and Zhenxing Wang, 39, were sentenced for ...
The Mission-Critical Standard: Why Mission-Certified Communications are the Future of High-Stakes Operations

The Mission-Critical Standard: Why Mission-Certified Communications are the Future of High-Stakes Operations

Mission-certified communications deliver secure, unified support in high-stakes operations.
Break Glass Accounts: Essential Security or a Cyber Risk?

Break Glass Accounts: Essential Security or a Cyber Risk?

Enterprises need a zero trust mindset to emergency access: least privilege, continuous monitoring and no implicit trust, even in a crisis. Break glass accounts should be treated as exceptions, not shortcuts, and governed accordingly.
The Latest Security Vulnerability Exploit Doesn’t Break Your Encryption. It Bypasses It.

The Latest Security Vulnerability Exploit Doesn’t Break Your Encryption. It Bypasses It.

A zero-day vulnerability exploit shows device compromises can bypass encryption entirely.
Building Secure Automation: Three Core Pillars That Make An iPaaS Enterprise-ready

Building Secure Automation: Three Core Pillars That Make An iPaaS Enterprise-ready

Introduction Security and governance are no longer back-office concerns, and in Australia, the stakes have never been higher. After a record 1,113 notifiable data breaches in 2024, the OAIC logged more than 530 additional breaches in the first half of 2025, with malicious attacks continuing to dominate. At the same time, major privacy reforms (e.g. ...
Identity Management Day

Identity Management Day

The sixth Identity Management Day highlights the evolving nature of identity. The meteoric rise of AI in general and its impact on nonhuman identities (NHIs) has focused attention on identity security as never before. But in the long view, it simply highlights the same issues we have seen in identity management since it was called “identity ...
Encryption Alone Is Not a Security Strategy

Encryption Alone Is Not a Security Strategy

Consumer apps lack identity and device controls, risking sensitive data.
No results found.

In the News

NinjaOne Unified Backup Surpasses Fifteen Thousand Customers

NinjaOne Unified Backup Surpasses Fifteen Thousand Customers

Today, NinjaOne announced strong momentum for its NinjaOne Backup product, with more than 15,000 customers now relying on the solution to protect their endpoints, servers, and SaaS applications. The growth reflects increasing demand from IT teams and managed service providers (MSPs) for backup and recovery to be embedded within a unified IT operations ...
Defender’s Guide to the Frontier AI Impact on Cybersecurity

Defender’s Guide to the Frontier AI Impact on Cybersecurity

The release of the newest frontier AI models marks a turning point for cybersecurity. Palo Alto Networks has conducted early testing of the latest frontier AI models, including Anthropic’s Mythos model as part of Project Glasswing and OpenAI’s latest models as part of Trusted Access for Cyber program. The conclusion is clear: They are extraordinarily ...
Arctic Wolf Introduces Decipio, a Community Tool to Catch Credential Theft with Defense‑First AI

Arctic Wolf Introduces Decipio, a Community Tool to Catch Credential Theft with Defense‑First AI

Community beta tool invites defenders to collaborate and help shape a new approach to exposing credential‑stealing attacks
Check Point Software Ranks #1 in Miercom’s 2026 Hybrid Mesh Network Security

Check Point Software Ranks #1 in Miercom’s 2026 Hybrid Mesh Network Security

Miercom’s 2026 Hybrid Mesh Network Security Assessment Shows Check Point achieving the highest overall security effectiveness score of 99.8%, highlighting its industry-leading threat prevention   
BeyondTrust’s 13th Annual Microsoft Vulnerabilities Report Reveals Drop in Total Volume, But Surge in Critical Risk

BeyondTrust’s 13th Annual Microsoft Vulnerabilities Report Reveals Drop in Total Volume, But Surge in Critical Risk

Critical vulnerabilities doubled year-over-year, signalling rising risk severity as AI-driven discovery and expanding attack surfaces reshape the Microsoft security landscape | Elevation of Privilege vulnerabilities accounted for 40% of all flaws, continuing to dominate threat actor pathways and reinforcing identity as the primary attack vector | Azure ...
Companies Rushing to Scale AI Are Running Into Operational Limits, Datadog Report Finds

Companies Rushing to Scale AI Are Running Into Operational Limits, Datadog Report Finds

Nearly 1 in 20 AI requests fail in production as capacity limits become the primary bottleneck to scaling AI reliably
Elastic Delivers First Embedded AI Experiences for Observability and Security Inside Third-Party AI Tools

Elastic Delivers First Embedded AI Experiences for Observability and Security Inside Third-Party AI Tools

MCP Apps bring Elastic’s security and observability workflows into third-party AI tools, enabling teams to act on data directly where they work, with additional capabilities for search and data exploration
Snowflake Expands Snowflake Intelligence and Cortex Code to Power the Control Plane for the Agentic Enterprise

Snowflake Expands Snowflake Intelligence and Cortex Code to Power the Control Plane for the Agentic Enterprise

Snowflake Intelligence transforms how business users turn insights into action through a personalised, context-aware AI agent grounded in enterprise data, while Cortex Code enables builders to move faster from code to production with AI-powered development across systems, tools, or environments
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This