The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

From Boring Storage to Cyber Resilience

From Boring Storage to Cyber Resilience

Technology vendors are definitely in their new eras and we’re here for it. Jeff Baxter, Vice President of Product Marketing at NetApp, announced NetApp’s campaign to move the needle towards four critical customer requirements which include data infrastructure modernisation, cloud transformation, artificial intelligence, and cyber resilience. “We’re ...
Curly COMrades: Evasion and Persistence via Hidden Hyper-V Virtual Machines

Curly COMrades: Evasion and Persistence via Hidden Hyper-V Virtual Machines

Bitdefender first documented the Curly COMrades threat actor, operating to support Russian interests in geopolitical hotbeds, in August 2025. Since that initial discovery, subsequent forensics and incident response efforts have revealed critical new tools and techniques. Valuable support was provided by the Georgian CERT, whose collaboration ...
NetApp’s CEO Unveils New Strategy

NetApp’s CEO Unveils New Strategy

​Data is the cornerstone of business transformation, driving intelligence around cybersecurity, as well as informing AI models. George Kurian, CEO of NetApp, recently unveiled at their annual conference, NetApp Insight in Las Vegas, that data is king. “Data is the foundation for transforming a business,” Kurian explained. Having the data and the ...
Cybersecurity Negligence Can’t Be a Cost of Doing Business Anymore

Cybersecurity Negligence Can’t Be a Cost of Doing Business Anymore

For years, organisations viewed cybersecurity failures as costly but absorbable mishaps. That era is over. Relentless, high-impact breaches now demand evolving accountability, impacting not just technology resilience but also governance, trust, and the rule of law.
How to Select the Optimum Physical Security Solution for Your Business

How to Select the Optimum Physical Security Solution for Your Business

Robust physical security is essential for organisations of all stripes and sizes. Conducting a judicious procurement process will ensure the solutions you invest in are robust, fit for purpose and represent value for money.
Public, Profiled, and Unprotected – Event Recap

Public, Profiled, and Unprotected – Event Recap

Introduction When the panel took the stage for “Public, profiled, and unprotected: How OSINT, AI and Geolocation blur the line between privacy and surveillance” at Cyber Con 2025 on the Thursday afternoon, the tone was set for a fascinating, multidisciplinary conversation. The Three Pillars - OSINT, AI, and Legal Privacy The talks core focus was the ...
AI Fear Meets FOMO

AI Fear Meets FOMO

Introduction If you haven’t heard about AI, then you must be living on a different planet. It’s the talk of the town, with individuals using it to help them with everyday tasks, boardrooms discussing how best to implement it in their business, and more. However, behind this growing hype lies hesitation. While AI promises to boost productivity, ...
Oracle Hard Launches Into Its AI Era

Oracle Hard Launches Into Its AI Era

Oracle’s definitely in its AI era. A select group of companies have raced to build humongous models, funnelling fortunes into training complex neural networks. AI is sounding a little more like humans nowadays and less like robots with multimodal models that parallel the human brain, dividing sight, language, and classification across their digital ...
No results found.

In the News

HPE Threat Labs Report Reveals Cyber Adversaries Are Morphing Their Business Model to Scale and Accelerate Attacks

HPE Threat Labs Report Reveals Cyber Adversaries Are Morphing Their Business Model to Scale and Accelerate Attacks

Cyber adversaries adopt business-like models to target every major sector, HPE finds Generative AI used to produce synthetic voices, images and videos for targeted impersonation fraud campaigns World-class network threat research expertise and experience brought together in new HPE Threat Labs Sydney, AUSTRALIA – March 18, 2026 – HPE (NYSE: ...
Check Point Enables Email Security Telemetry to Flow Into CrowdStrike Falcon Next-Gen SIEM

Check Point Enables Email Security Telemetry to Flow Into CrowdStrike Falcon Next-Gen SIEM

REDWOOD CITY, CA. – March 17, 2026 – Check Point Software Technologies Ltd. (NASDAQ: CHKP) today announced a new integration that enables email security telemetry from Check Point Email Security to flow into CrowdStrike Falcon® Next-Gen SIEM.  The integration allows security teams to ingest and correlate email-based activity with downstream identity ...
Ping Identity: Only 9% of Organisations Are Prepared for Continuous AI-Driven Identity Threats

Ping Identity: Only 9% of Organisations Are Prepared for Continuous AI-Driven Identity Threats

An independent global study finds that organisations meeting verified trust criteria achieve 51% higher transaction conversion and 43% lower fraud losses. DENVER, March 17, 2026 – Ping Identity, a leader in securing digital identities for the world's largest enterprises, released independent research showing that organisations that have ...
Genetec Enables Enterprise Cloud Modernisation With New Access Control Capabilities in Security Center SaaS

Genetec Enables Enterprise Cloud Modernisation With New Access Control Capabilities in Security Center SaaS

Updates simplify visitor workflows, accelerate daily operations, and expand enterprise hardware support. MONTRÉAL, March 17, 2026 — Genetec Inc. (“Genetec”), the global leader in enterprise physical security software, today announced new access control enhancements to Security Center SaaS. The updates simplify day-to-day operations for security teams ...
Saviynt Appoints Alex Lei to Drive Identity Security Growth Across Asia Pacific and Japan

Saviynt Appoints Alex Lei to Drive Identity Security Growth Across Asia Pacific and Japan

Enterprise security veteran to lead regional sales strategy as organisations across APJ strengthen identity-first cybersecurity Key Highlights: The appointment comes as organisations across APJ increase investment in identity security to support cloud adoption, AI initiatives, and evolving cyber risks Lei will oversee customer acquisition, ...
Kaseya Report Highlights Impact of AI on Cyber Security Threat Landscape

Kaseya Report Highlights Impact of AI on Cyber Security Threat Landscape

The 2026 Kaseya INKY Email Security Report analyses the evolution of phishing and email-based cybercrime in the age of AI. Sydney, Australia – March 18, 2026 – Kaseya, the leading global provider of AI-powered IT management and cyber security software, released today the 2026 Kaseya INKY Email Security Report, which shows that 2025 was an inflection ...
Armis Research Reveals Australia Experiencing the Highest Volume of Cyberwarfare Attacks of Any Country Globally

Armis Research Reveals Australia Experiencing the Highest Volume of Cyberwarfare Attacks of Any Country Globally

...although Australian respondents (73%) were the most of any group surveyed to believe the idea of "Mutually Assured Disruption"—that nations avoid major cyberattacks due to shared vulnerability—still acts as an effective deterrent today, they’re also the most likely (84%) to say their organisation has evolved its cyberwarfare readiness posture over ...
SentinelOne Appoints Jason Duerden as ANZ Area Vice President, as IT Expands Its Focus on Protecting Government and Critical Infrastructure

SentinelOne Appoints Jason Duerden as ANZ Area Vice President, as IT Expands Its Focus on Protecting Government and Critical Infrastructure

Sydney, Australia - 17 March 2026 - SentinelOne®, the leader in AI cybersecurity, has appointed Jason Duerden as Area Vice President for Australia and New Zealand, marking a decisive step in the company’s next phase of regional growth, with defending government and SOCI Act aligned critical infrastructure organisations firmly in its sights. The ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This