The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Why “IT Won’t Happen Here” Is a Dangerous Bet
Cyber incidents start quietly, which looks like a compromised credential, a malicious attachment, an employee doing what they’ve always done. The damage only becomes visible once systems stall, operations freeze, and executives ask the same question they always ask at the eleventh hour, ‘How did this get so far?’
Rajesh Khazanchi, CEO and Co-Founder ...

The Transformative Role of AI in Cybersecurity
The integration of AI and cybersecurity is reshaping the digital landscape, with three key trends emerging: the rise of AI-powered security threats, the transformation of data governance through AI, and the elevation of cybersecurity as a C-suite priority. Cybercriminals are leveraging AI for sophisticated attacks, necessitating adaptive, AI-driven ...
Email Threat Radar – January 2026
From QR code deception to callback phishing and more: An overview of emerging email threats and attack trends

When Digital Names Collide, Business Risk Follows
In an era where trust is increasingly mediated by systems rather than people, ensuring that every digital identity maps cleanly to a real one is no longer optional. It is a prerequisite for doing business safely.

Service to Our Nation Should Be the Focus According to Former NSA Deputy Director
America doesn’t have a technology problem. The biggest tech companies and CEO’s are birthed out of the United States. But, it may have a purpose problem.
With more than three decades spent inside the National Security Agency (NSA), as the former Deputy Director, George Barnes (currently Cyber Practice President and Partner at Red Cell Partners) ...

Do You Use Free Wi-Fi in Public Places?
In today's modern life, we find ourselves highly dependent on the connected world. Think about it, almost everything we do or need in some form requires being connected via a website, app or computer platform. We carry most of us smartphones which are smarter than the computer systems that enabled man to land on the moon.
Seriously, just think ...

AI Broke Cybersecurity and Corporate Leadership Still Hasn’t Noticed
Code is now being written and shipped faster than most security programs were ever built to withstand. Developers are moving at speed. Product teams are pushing releases earlier. And companies are racing to stay competitive often without fully grasping the risks they’ve just signed up for.Sonali Chaudhuri, Founder of MySmartOps commented,“...Exposing ...

blockchain Auditing in Practice: What Executives Need to Understand Now
Blockchain doesn’t remove trust, it relocates it into code, consensus, and governance. Learn how to audit blockchain systems using ISO 27001, COBIT, and NIST without starting over, and where risk truly lives.
No results found.
In the News
Getac Redefines Rugged Mobility With Launch of G140 Copilot+ PC, Powered by AMD Technology in Australia and New Zealand
The new G140 tablet blends AI-powered performance with MIL-STD fully rugged protection in a lightweight, field friendly design.
Semperis Expands Purple Knight to Strengthen Identity Security in Line With Five Eyes Guidance
SYDNEY, Australia- 24 April 2026 – Semperis, the identity-driven cyber resilience and crisis response company, today announced expanded capabilities for Purple Knight, its free, community-driven Active Directory and Entra ID security assessment tool helping organisations strengthen identity security in line with guidance from the Five Eyes Alliance, of ...
Saviynt Appoints Tim Wedande as Field CTO for Asia Pacific and Japan
APJ appointment strengthens regional customer engagement and technical strategy leadership.
CrowdStrike Launches Project QuiltWorks, Uniting the Cybersecurity Industry as Frontier AI Models Accelerate Risk
Powered by frontier models from OpenAI and Anthropic, CrowdStrike’s coalition includes Accenture, EY, IBM Cybersecurity Services, Kroll, and OpenAI to close the AI vulnerability gap for every enterprise
Elastic Collaborates With Google Cloud to Bring Its Embedded Security Layer to Google Distributed Cloud Air-Gapped Environments
Google Distributed Cloud is embedding Elastic’s agentic security operations platform, providing security analytics, automation, and XDR capabilities to help customers secure sensitive data in air-gapped environments
EXL Announces a Strategic Services Collaboration With Google Cloud
EXL’s relationship with Google Cloud underscores EXL’s strength as a differentiated outcome-led AI and cloud transformation partner
CrowdStrike Extends Its Real-Time Cloud Detection and Response to Google Cloud
CrowdStrike expands cloud runtime security leadership, giving defenders the speed and precision to stop cloud breaches in seconds across hybrid and multi-cloud environments
Oracle Expands Powerful AI Capabilities in Oracle AI Database@Google Cloud to Supercharge Enterprise Data Innovation
Secure, natural language access to Oracle data through Gemini Enterprise speeds insights without writing SQL
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
- 353
- 354
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
