The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

From Boring Storage to Cyber Resilience
Technology vendors are definitely in their new eras and we’re here for it. Jeff Baxter, Vice President of Product Marketing at NetApp, announced NetApp’s campaign to move the needle towards four critical customer requirements which include data infrastructure modernisation, cloud transformation, artificial intelligence, and cyber resilience.
“We’re ...
Curly COMrades: Evasion and Persistence via Hidden Hyper-V Virtual Machines
Bitdefender first documented the Curly COMrades threat actor, operating to support Russian interests in geopolitical hotbeds, in August 2025. Since that initial discovery, subsequent forensics and incident response efforts have revealed critical new tools and techniques. Valuable support was provided by the Georgian CERT, whose collaboration ...

NetApp’s CEO Unveils New Strategy
Data is the cornerstone of business transformation, driving intelligence around cybersecurity, as well as informing AI models. George Kurian, CEO of NetApp, recently unveiled at their annual conference, NetApp Insight in Las Vegas, that data is king.
“Data is the foundation for transforming a business,” Kurian explained.
Having the data and the ...

Cybersecurity Negligence Can’t Be a Cost of Doing Business Anymore
For years, organisations viewed cybersecurity failures as costly but absorbable mishaps. That era is over. Relentless, high-impact breaches now demand evolving accountability, impacting not just technology resilience but also governance, trust, and the rule of law.

How to Select the Optimum Physical Security Solution for Your Business
Robust physical security is essential for organisations of all stripes and sizes. Conducting a judicious procurement process will ensure the solutions you invest in are robust, fit for purpose and represent value for money.

Public, Profiled, and Unprotected – Event Recap
Introduction
When the panel took the stage for “Public, profiled, and unprotected: How OSINT, AI and Geolocation blur the line between privacy and surveillance” at Cyber Con 2025 on the Thursday afternoon, the tone was set for a fascinating, multidisciplinary conversation.
The Three Pillars - OSINT, AI, and Legal Privacy
The talks core focus was the ...

AI Fear Meets FOMO
Introduction
If you haven’t heard about AI, then you must be living on a different planet. It’s the talk of the town, with individuals using it to help them with everyday tasks, boardrooms discussing how best to implement it in their business, and more. However, behind this growing hype lies hesitation.
While AI promises to boost productivity, ...

Oracle Hard Launches into its AI Era
Oracle’s definitely in its AI era. A select group of companies have raced to build humongous models, funnelling fortunes into training complex neural networks. AI is sounding a little more like humans nowadays and less like robots with multimodal models that parallel the human brain, dividing sight, language, and classification across their digital ...
No results found.
In The News
Fortinet Introduces FortiOS 8.0 to Expand Secure Networking With Secure AI Controls, Fabric-based AI Agents, Flexible SASE, and Simplified SD-WAN
Latest FortiOS capabilities help organisations secure AI adoption, simplify operations, and strengthen protection across hybrid and multi-cloud environments
Tenable Patch Tuesday Commentary – March 2026
Microsoft patched 83 CVEs in its March 2026 Patch Tuesday release, with eight rated critical and 75 rated as important. Our counts omitted one CVE (CVE-2026-26030) assigned by GitHub. Elevation of privilege (EoP) vulnerabilities accounted for 55.4% of the vulnerabilities patched this month, followed by remote code execution (RCE)vulnerabilities at ...
Google Threat Intelligence Group Warns Enterprise Systems Now Dominate Global Zero-day Attacks
Enterprise technologies have emerged as the primary target for zero-day exploitation, according to new research from the Google Threat Intelligence Group (GTIG), signalling a continued shift away from traditional browser-based attacks toward enterprise infrastructure and edge devices.
In its report, “Look What You Made Us Patch: 2025 Zero-Days in ...
Ping Identity Advances Regional Trust with PROTECTED-Level IRAP Assessment
Strengthens Support for Australian Government and Regulated Enterprises
Macquarie Technology Group secures A$200m Investment from National Reconstruction Fund Corporation
Macquarie Technology Group Limited (ASX: MAQ) (the “Company”) today announced that it has secured a A$200m hybrid investment from National Reconstruction Fund Corporation (NRFC). The NRFC is a sovereign investor established by the Australian Government to invest in Australian businesses to support nationally significant technological innovation, ...
Radware Introduces Alteon Protect to Deliver Scalable Application Security Without Compromise
Combines real-time cloud protection infrastructure with on-device enforcement to deliver continuous application security beyond appliance constraints MAHWAH, N.J. — March 9, 2026 — Radware® (NASDAQ: RDWR), a global leader in application security and delivery solutions for multi-cloud environments, today announced Alteon Protect, an expansion of its ...
UiPath Achieves AIUC-1 Certification, Setting New Standard for AI Agent Security and Reliability
Agentic Automation leader becomes the first enterprise automation platform to meet independent verification standard for safe AI agent deployment
Darktrace Appoints Ed Jennings as President and CEO
Veteran leader brings deep software and cybersecurity experience
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
