The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

From Boring Storage to Cyber Resilience

From Boring Storage to Cyber Resilience

Technology vendors are definitely in their new eras and we’re here for it. Jeff Baxter, Vice President of Product Marketing at NetApp, announced NetApp’s campaign to move the needle towards four critical customer requirements which include data infrastructure modernisation, cloud transformation, artificial intelligence, and cyber resilience. “We’re ...
Curly COMrades: Evasion and Persistence via Hidden Hyper-V Virtual Machines

Curly COMrades: Evasion and Persistence via Hidden Hyper-V Virtual Machines

Bitdefender first documented the Curly COMrades threat actor, operating to support Russian interests in geopolitical hotbeds, in August 2025. Since that initial discovery, subsequent forensics and incident response efforts have revealed critical new tools and techniques. Valuable support was provided by the Georgian CERT, whose collaboration ...
NetApp’s CEO Unveils New Strategy

NetApp’s CEO Unveils New Strategy

​Data is the cornerstone of business transformation, driving intelligence around cybersecurity, as well as informing AI models. George Kurian, CEO of NetApp, recently unveiled at their annual conference, NetApp Insight in Las Vegas, that data is king. “Data is the foundation for transforming a business,” Kurian explained. Having the data and the ...
Cybersecurity Negligence Can’t Be a Cost of Doing Business Anymore

Cybersecurity Negligence Can’t Be a Cost of Doing Business Anymore

For years, organisations viewed cybersecurity failures as costly but absorbable mishaps. That era is over. Relentless, high-impact breaches now demand evolving accountability, impacting not just technology resilience but also governance, trust, and the rule of law.
How to Select the Optimum Physical Security Solution for Your Business

How to Select the Optimum Physical Security Solution for Your Business

Robust physical security is essential for organisations of all stripes and sizes. Conducting a judicious procurement process will ensure the solutions you invest in are robust, fit for purpose and represent value for money.
Public, Profiled, and Unprotected – Event Recap

Public, Profiled, and Unprotected – Event Recap

Introduction When the panel took the stage for “Public, profiled, and unprotected: How OSINT, AI and Geolocation blur the line between privacy and surveillance” at Cyber Con 2025 on the Thursday afternoon, the tone was set for a fascinating, multidisciplinary conversation. The Three Pillars - OSINT, AI, and Legal Privacy The talks core focus was the ...
AI Fear Meets FOMO

AI Fear Meets FOMO

Introduction If you haven’t heard about AI, then you must be living on a different planet. It’s the talk of the town, with individuals using it to help them with everyday tasks, boardrooms discussing how best to implement it in their business, and more. However, behind this growing hype lies hesitation. While AI promises to boost productivity, ...
Oracle Hard Launches Into Its AI Era

Oracle Hard Launches Into Its AI Era

Oracle’s definitely in its AI era. A select group of companies have raced to build humongous models, funnelling fortunes into training complex neural networks. AI is sounding a little more like humans nowadays and less like robots with multimodal models that parallel the human brain, dividing sight, language, and classification across their digital ...
No results found.

In the News

Arctic Wolf Unveils the Aurora Superintelligence Platform to Redefine Security for the Age of AI

Arctic Wolf Unveils the Aurora Superintelligence Platform to Redefine Security for the Age of AI

Breakthrough advances bring superintelligence to cybersecurity, setting a higher standard for trustworthy AI in the industry
Qualys Debuts Industry’s First AI Agent for Safe Exploit Validation and Autonomous Remediation

Qualys Debuts Industry’s First AI Agent for Safe Exploit Validation and Autonomous Remediation

Agent Val exploits, mitigates and revalidates exposures against compensating controls continuously, dramatically reducing the average window of exposure Qualys, Inc. (NASDAQ: QLYS) , a leading provider of cloud-based IT, security and compliance solutions, today launched Agent Val within Enterprise TruRisk Management (ETM) to bring safe, agent-led ...
Arctic Wolf Launches the World’s Largest Commercial Agentic SOC to Usher in a New Era of Agent‑Led Security Operations

Arctic Wolf Launches the World’s Largest Commercial Agentic SOC to Usher in a New Era of Agent‑Led Security Operations

Complete platform transformation delivers a trustworthy Agentic SOC with turnkey deployment and proven ROI for organisations of every size
Lenovo Accelerates Production-Ready Enterprise AI With NVIDIA—From AI Inferencing to Gigawatt-Scale AI Factories

Lenovo Accelerates Production-Ready Enterprise AI With NVIDIA—From AI Inferencing to Gigawatt-Scale AI Factories

Lenovo unveiled new Lenovo Hybrid AI Advantage™ with NVIDIA solutions designed to accelerate AI adoption, reduce time-to-first-token (TTFT), and deliver measurable business results across personal, enterprise, and cloud environments. Building on the inferencing acceleration introduced at Lenovo Tech World, this next phase of Hybrid AI execution expands ...
Arctic Wolf and Wiz Join Forces to Counter Rising Cloud Threats With End-to-End Cloud Security and Response

Arctic Wolf and Wiz Join Forces to Counter Rising Cloud Threats With End-to-End Cloud Security and Response

Industry-leading Agentic SOC combined with Wiz’s cloud-native application protection to deliver cloud response backed by 24×7 security operations

Check Point Releases AI Factory Security Blueprint to Safeguard AI Infrastructure From GPU Servers to LLM Prompts

As enterprises and neo-clouds invest billions in private AI infrastructure, Check Point delivers the industry's most comprehensive security architecture for AI data centres REDWOOD CITY, CA. March 23, 2026 -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today released the AI Factory ...
BeyondTrust Delivers Industry’s First Unified Privileged Identity Solution for AI Agent Coworkers and Workloads, From the Desktop to the Cloud

BeyondTrust Delivers Industry’s First Unified Privileged Identity Solution for AI Agent Coworkers and Workloads, From the Desktop to the Cloud

New capabilities in the BeyondTrust Pathfinder Platform secure AI agent coworkers on endpoints and AI agent workloads across cloud infrastructure and SaaS platforms Security teams gain visibility into AI agent identities, privileges, and secrets across platforms including OpenAI, AWS Bedrock, Salesforce Agentforce, ServiceNow, and Google Vertex ...
Cisco Reimagines Security for the Agentic Workforce

Cisco Reimagines Security for the Agentic Workforce

With end-to-end security across AI actions, Cisco is helping organizations confidently deploy AI agents at scale
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This