The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Three Critical Actions for Achieving An Optimal SAP Cybersecurity Budget
Any enterprise is subject to cyberattacks. The details about incidents concerning critical enterprise applications like SAP S/4HANA are often internal, and hence, public awareness is not up to the mark of malware and phishing. As the attacks become more sophisticated, it is important to understand what your optimal budget should be to protect ...

From 398 to 200 Days: Understanding the TLS Certificate Lifespan Reduction
Digital trust is entering a new phase, and on March 15, 2026, a policy change will take effect that reshapes how organisations approach security.
In 2025, the CA/Browser Forum, a consortium of browser vendors and certificate authorities, approved revisions to public TLS standards, introducing a phased reduction in certificate lifespans to better ...

Cybersecurity Leader Sean Duca exits Vendor Land after 25 years, Launches Boutique Executive Advisory Firm
After more than two decades inside the global technology vendor ecosystem, cybersecurity heavyweight Sean Duca is stepping out on his own.
Duca, most recently Chief Technology Officer for Customer Experience at Cisco, has officially launched The Duca Group, a boutique executive advisory firm designed to help boards, C-suite leaders and Founders make ...

Reducing Cyber and Physical Risks: What Every IT Manager Should Know About Access Control
Access control has long been treated as a function of facilities teams, focused on unlocking and locking doors. As digital systems and physical spaces become more interconnected, that point of view needs to be rethought.
Access control is now playing an added role to cybersecurity and operational strategy. The systems that determine who can enter ...

How Modern Search Technology Is Changing Video Investigations For Security Teams
Intelligent search reflects a practical evolution in how video is used during investigations. Rather than changing what security teams do, it changes how quickly and confidently they can do it. By simplifying review workflows and reducing manual effort, intelligent search helps teams manage investigation workloads more effectively.

International Women’s Day
International Women’s Day is a moment to celebrate progress, possibility and the incredible women shaping the future of our industry. Reflecting on my own journey from engineering into leadership within the technology sector, one thing stands out, growth rarely follows a straight line. It is built through curiosity, resilience and the willingness to ...

How ‘Verified Trust’ Is Redefining Digital Authentication in the Age of AI
When verified trust becomes embedded in every interaction, authentication transforms from a barrier into an enabler. It delivers not only protection against fraud and impersonation but also the confidence that underpins long-term relationships.

Tanium Names Satyen Desai Regional VP for ASEAN, as Company Doubles Down on Growth in the Region
Cybersecurity and endpoint management firm Tanium has appointed Satyen Desai as the new Regional Vice President for ASEAN, signalling the company’s continued push to expand its presence across one of the world’s fastest growing economies.
Desai announced the move while attending Tanium’s global Sales Kickoff (SKO) in Dallas, describing the opportunity ...
No results found.
In The News
ManageEngine Endpoint Central Advances Towards Autonomous Endpoint Security with EDR and Secure Private Access
Company Unveils the First Natively Built Platform Combining UEM, Endpoint Security (EPP with EDR), Digital Employee Experience (DEX), and Secure Private Access
Delinea Finds 90% of Australian Organisations Pressure Security Teams to Loosen Identity Controls for AI
New research highlights visibility gaps around AI-driven identities, rising NHI risks, and an AI security confidence paradox
Rapid7 2026 Global Threat Landscape Report Shows Exploited High and Critical-Severity Vulnerabilities Surged 105% as Attack Timelines Collapsed
Released today, the Rapid7 2026 Global Threat Landscape Report: Decoding the Accelerated Cyber Attack Cycle, finds that the window between vulnerability disclosure and confirmed exploitation continues to collapse, leaving organisations with dramatically less time to assess risk, prioritise remediation, and contain threats before impact.
NetApp Sets the Game Plan for AI-Ready Data Operations Across Australia and New Zealand
NetApp’s vision to help organisations like the National Football League (NFL) bring intelligence to their data and reduce IT complexities
Claroty Announces Cybercriminals Are Increasingly Targeting Global Critical Infrastructure Via CPS
New research finds cybercriminals are increasingly targeting global critical infrastructure via direct access to cyber-physical systems | Claroty’s Team82 Investigated Hundreds of Politically, Socially Motivated Attacks on Exposed Internet-Facing Devices Including HMI and SCADA Assets
JFrog Unveils Universal MCP Registry, Delivering a Secure System of Record for the AI-Driven Software Supply Chain
SYDNEY, Australia. – March 19, 2026 – JFrog Ltd (Nasdaq: FROG), the Liquid Software company and creators of the JFrog Software Supply Chain Platform, the system of record for software artifacts, binaries, and AI assets, today introduced its JFrog MCP Registry. Expanding on current capabilities in JFrog AI Catalog, the new registry acts as a single ...
UiPath Collaborates with Microsoft to Accelerate Security and Confidence for Automated Workflows
Integration demonstrates the power of agentic automation and security platforms working together to protect modern enterprises
Malicious IDE Extension Uses Solana Blockchain to Steal Developer Credentials
Bitdefender researchers have uncovered a malicious extension targeting the Windsurf integrated development environment (IDE) that uses the Solana blockchain to deliver malware designed to steal sensitive data from developers.
The campaign disguises the extension as a tool for R language development inside Visual Studio Code–compatible environments. ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
