The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Your AI Is Only as Good as Your Data, According to NetApp’s President

Your AI Is Only as Good as Your Data, According to NetApp’s President

Forget dashboards and customer insights, the game has changed. The royal flush is in the data and lots of it.​ Countries and corporations that can prove the integrity of their data will dominate the next stage of global trade and innovation.Recently, NetApp’s President César Cernuda walked through the AI gold rush. It’s meaningless if companies can’t ...
North Korean ‘Laptop Farm’ Scheme Nets Prison Time for US Operatives

North Korean ‘Laptop Farm’ Scheme Nets Prison Time for US Operatives

​Two US nationals have been sentenced years behind bars after federal prosecutors say they helped fuel a sophisticated North Korean scheme that infiltrated American companies, stole identities and funnelled millions to a hostile regime. The United States Department of Justice announced that Kejia Wang, 42, and Zhenxing Wang, 39, were sentenced for ...
The Mission-Critical Standard: Why Mission-Certified Communications Are the Future of High-Stakes Operations

The Mission-Critical Standard: Why Mission-Certified Communications Are the Future of High-Stakes Operations

Mission-certified communications deliver secure, unified support in high-stakes operations.
Break Glass Accounts: Essential Security or a Cyber Risk?

Break Glass Accounts: Essential Security or a Cyber Risk?

Enterprises need a zero trust mindset to emergency access: least privilege, continuous monitoring and no implicit trust, even in a crisis. Break glass accounts should be treated as exceptions, not shortcuts, and governed accordingly.
The Latest Security Vulnerability Exploit Doesn’t Break Your Encryption. IT Bypasses IT.

The Latest Security Vulnerability Exploit Doesn’t Break Your Encryption. IT Bypasses IT.

A zero-day vulnerability exploit shows device compromises can bypass encryption entirely.
Building Secure Automation: Three Core Pillars That Make an iPaaS Enterprise-ready

Building Secure Automation: Three Core Pillars That Make an iPaaS Enterprise-ready

Introduction Security and governance are no longer back-office concerns, and in Australia, the stakes have never been higher. After a record 1,113 notifiable data breaches in 2024, the OAIC logged more than 530 additional breaches in the first half of 2025, with malicious attacks continuing to dominate. At the same time, major privacy reforms (e.g. ...
Identity Management Day

Identity Management Day

The sixth Identity Management Day highlights the evolving nature of identity. The meteoric rise of AI in general and its impact on nonhuman identities (NHIs) has focused attention on identity security as never before. But in the long view, it simply highlights the same issues we have seen in identity management since it was called “identity ...
Encryption Alone Is Not a Security Strategy

Encryption Alone Is Not a Security Strategy

Consumer apps lack identity and device controls, risking sensitive data.
No results found.

In the News

Veeam Launches DataAI™ Command Platform, the Industry’s First Unified Data and AI Trust Infrastructure for the Agentic Era

Veeam Launches DataAI™ Command Platform, the Industry’s First Unified Data and AI Trust Infrastructure for the Agentic Era

Combining #1 Data Resilience with #1 Data Security, Veeam delivers the missing layer in the AI stack, bringing together Data, Access, Identities, and AI in one connected trust platform
Boomi Unveils Innovations That Power the Agentic Enterprise

Boomi Unveils Innovations That Power the Agentic Enterprise

Orchestration capabilities simplify workflows, while advanced agent connectivity and an enhanced context layer activate data and scale AI
Veeam Unveils Intelligent ResOps for the Agentic AI Era, Turning Data Context Into Faster, More Precise Recovery

Veeam Unveils Intelligent ResOps for the Agentic AI Era, Turning Data Context Into Faster, More Precise Recovery

Part of the new Veeam DataAI™ Command Platform, this new Veeam solution add-on, powered by the Veeam DataAI Command Graph, unifies data context and recovery so enterprises can manage, back up and retain data more intelligently, respond faster, and restore only what’s impacted | Microsoft 365 is the first supported workload, with additional workloads ...
Fortinet Deepens Integration to Uniquely Secure Enterprise AI at Scale With NVIDIA

Fortinet Deepens Integration to Uniquely Secure Enterprise AI at Scale With NVIDIA

FortiAIGate integration enables zero-trust AI environments with high-performance, GPU-accelerated security across any deployment model
Group-IB Launches Prevyn AI to Bridge the Gap Between Detection and Predictive Cyber Defense

Group-IB Launches Prevyn AI to Bridge the Gap Between Detection and Predictive Cyber Defense

New cognitive core orchestrates agentic research and assistive response to outpace machine-speed threats
Arctic Wolf Introduces the Next Era of Exposure Management to Help Organisations Outpace AI-Accelerated Vulnerability Discovery

Arctic Wolf Introduces the Next Era of Exposure Management to Help Organisations Outpace AI-Accelerated Vulnerability Discovery

New exposure management capabilities unify vulnerability and attack surface insights to help prioritise and reduce real-world cyber risk
Boomi and ServiceNow Partner to Power Data Activation Across the Enterprise

Boomi and ServiceNow Partner to Power Data Activation Across the Enterprise

Boomi announced as the launch partner for the ServiceNow Workflow Data Network Passport Program, enabling customers to activate data enterprise-wide and accelerate AI-driven outcomes
Arctic Wolf Launches AI-Powered Mobile Threat Defense to Protect Organisations Against Growing Mobile-based Cyber Threats

Arctic Wolf Launches AI-Powered Mobile Threat Defense to Protect Organisations Against Growing Mobile-based Cyber Threats

New AI-powered mobile threat protection, expanded threat intelligence, and Concierge experience enhancements help organisations reduce risk across an increasingly distributed attack surface
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This