The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Fortinet CISO’s 2026 Cybersecurity Predictions: Artificial Intelligence, Geopolitics, and the New Era of Resilience
CISO predictions for 2026 | Artificial intelligence, geopolitics, and the new era of cyber resilience

The Identity Crisis CISOs Can No Longer Ignore
As 2026 budgeting ramps up, CISOs are under renewed pressure to cut costs without compromising security. Boards are demanding measurable ROI, while digital transformation efforts, increasingly driven by AI, continue to accelerate. Yet one critical area remains overlooked. Identity security is too often seen as a technical layer, rather than what it ...

From Boring Storage to Cyber Resilience
Technology vendors are definitely in their new eras and we’re here for it. Jeff Baxter, Vice President of Product Marketing at NetApp, announced NetApp’s campaign to move the needle towards four critical customer requirements which include data infrastructure modernisation, cloud transformation, artificial intelligence, and cyber resilience.
“We’re ...
Curly COMrades: Evasion and Persistence via Hidden Hyper-V Virtual Machines
Bitdefender first documented the Curly COMrades threat actor, operating to support Russian interests in geopolitical hotbeds, in August 2025. Since that initial discovery, subsequent forensics and incident response efforts have revealed critical new tools and techniques. Valuable support was provided by the Georgian CERT, whose collaboration ...

NetApp’s CEO Unveils New Strategy
Data is the cornerstone of business transformation, driving intelligence around cybersecurity, as well as informing AI models. George Kurian, CEO of NetApp, recently unveiled at their annual conference, NetApp Insight in Las Vegas, that data is king.
“Data is the foundation for transforming a business,” Kurian explained.
Having the data and the ...

Cybersecurity Negligence Can’t Be a Cost of Doing Business Anymore
For years, organisations viewed cybersecurity failures as costly but absorbable mishaps. That era is over. Relentless, high-impact breaches now demand evolving accountability, impacting not just technology resilience but also governance, trust, and the rule of law.

How to Select the Optimum Physical Security Solution for Your Business
Robust physical security is essential for organisations of all stripes and sizes. Conducting a judicious procurement process will ensure the solutions you invest in are robust, fit for purpose and represent value for money.

Public, Profiled, and Unprotected – Event Recap
Introduction
When the panel took the stage for “Public, profiled, and unprotected: How OSINT, AI and Geolocation blur the line between privacy and surveillance” at Cyber Con 2025 on the Thursday afternoon, the tone was set for a fascinating, multidisciplinary conversation.
The Three Pillars - OSINT, AI, and Legal Privacy
The talks core focus was the ...
No results found.
In the News
Claroty Announces Cybercriminals Are Increasingly Targeting Global Critical Infrastructure via CPS
New research finds cybercriminals are increasingly targeting global critical infrastructure via direct access to cyber-physical systems | Claroty’s Team82 Investigated Hundreds of Politically, Socially Motivated Attacks on Exposed Internet-Facing Devices Including HMI and SCADA Assets
JFrog Unveils Universal MCP Registry, Delivering a Secure System of Record for the AI-Driven Software Supply Chain
SYDNEY, Australia. – March 19, 2026 – JFrog Ltd (Nasdaq: FROG), the Liquid Software company and creators of the JFrog Software Supply Chain Platform, the system of record for software artifacts, binaries, and AI assets, today introduced its JFrog MCP Registry. Expanding on current capabilities in JFrog AI Catalog, the new registry acts as a single ...
UiPath Collaborates With Microsoft to Accelerate Security and Confidence for Automated Workflows
Integration demonstrates the power of agentic automation and security platforms working together to protect modern enterprises
Malicious IDE Extension Uses Solana blockchain to Steal Developer Credentials
Bitdefender researchers have uncovered a malicious extension targeting the Windsurf integrated development environment (IDE) that uses the Solana blockchain to deliver malware designed to steal sensitive data from developers.
The campaign disguises the extension as a tool for R language development inside Visual Studio Code–compatible environments. ...
Exabeam Expands Award-Winning Exabeam APEX Partner Program With New MSSP Commercial Framework
Flexible, pooled licensing model purpose-built to help managed security providers scale faster and grow predictably
Secure Code Warrior Launches Trust Agent: AI to Enable Safe, Scalable AI-Driven Development
New AI Software Governance solution makes AI-generated code visible at commit, enforces policy before production, and connects real development behaviour to measurable risk reduction
Synechron Unifies Australian Firms Chamonix IT, Exposé and iGreenData Under Company’s Brand
Leading global firm appoints Scott Grigg as country managing director to build Australian consulting business
$12.5M Investment: GitHub and Other Industry Leaders Join Forces for Open Source Security
Investing in the People Shaping Open Source and Securing the Future Together
See how GitHub is investing in open source security funding maintainers, partnering with Alpha-Omega, and expanding access to help reduce burden and strengthen software supply chains.
Open source has always been about community.
It’s about maintainers who review pull ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
