The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Driving Enterprise Cloud Adoption is Not as Easy as We Think
Ashish Dhawan, the Senior Vice President, General Manager, and Chief Revenue Officer of the Cloud Business Unit at NetApp, shared the driving forces behind enterprise cloud adoption and the role of partnerships and multi-cloud approaches.
The Reasons For Movement
The primary motivators for enterprise cloud adoption are innovation speed, optimal IT ...
Generative AI for Cybersecurity – Is It Right For Your Organisation?
Introduction
The arrival of generative AI and its seemingly endless possibilities also came with a myriad of sophisticated threats. And as organisations move to increasingly complex digital environments and struggle to analyse the exponential growth of security data, SIEM solutions are evolving to harness the power of generative AI. Yet, given the ...
Cybersecurity Awareness Month: four easy ways to secure our world
Cybersecurity Awareness Month is an international initiative that focuses on simple ways to protect ourselves, our families, and our businesses from online threats. The 2025 theme โSecure Our Worldโ highlights the pervasiveness of digital technologies that enable connections across the globe and how straightforward, yet effective, measures can have a ...
Knowing Your Data. A Precursor To Effective Governance
Gagan Gulati, the General Manager of Data Services at NetApp, discussed with me why data is the proverbial โkingโ. This included the development of data protection, governance, and cybersecurity.
"When it comes to ransomware attacks, it's all about real-time ransomware detection. Because the sooner you can detect that there's an attack, the ...
Sandeep Singh – Senior VP and GM, Enterprise Storage
Watch The Interview
Biography
Sandeep Singh is Senior Vice President and General Manager, Enterprise Storage at NetApp. Sandeep Singh is a driven, passionate, creative business leader with a proven track record of leading business and product strategy, building innovative products, managing high-performance organizations, and delivering business ...
In Defense of Humans: The Bigger Issues Behind Data Breaches
This Cybersecurity Awareness Month, understand why it's unfair to blame humans for every breach. Learn how technology can better support users.
Unix CUPS Unauthenticated RCE Zero-Day Vulnerabilities: All you need to know
On September 23rd, Twitter userย Simone Margaritelli (@evilsocket) announcedย that he has discovered and privately disclosed a CVSS 9.9 GNU/Linux unauthenticated RCE, which affects almost all Linux distributions, and that the public disclosure will happen on September 30th,
Due to a suspected leak in the disclosure process, @evilsocket decided to ...
Weโve Grown Up To Be The Intelligence Data Infrastructure Company
NetApp's cloud evolution and intelligent data infrastructure. A Conversation with Haiyan Song at NetApp Insight 2024.
In The News
New OT Security Solutions From Palo Alto Networks Address Growing Cybersecurity Threats To Industrial Operations
Powered by Precision AI, new capabilities protect OT remote operations, mitigate risk for critical OT assets and extend security into harsh industrial environments
Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, today introduced new capabilities in its OT Security solution, including the industryโs only fully integrated, risk-based ...
UiPath Unveils Vision for the Future: Expanding the Boundaries of AI with Agentic Automation
UiPath (NYSE: PATH), a leading enterprise automation and AI software company, today announced its new vision and strategic direction centred on the next evolution of enterprise automation โ agentic automation.
Launches New Machine Identity Security Product To Help Simplify Management, Security, And Lifecycle Of Machine Identities For Enterprises
SailPoint is expanding beyond human identity governance into the rapidly growing field of machine identities, addressing a critical gap for enterprises
Launches Privileged Task Automation Capability For Automating And Delegating The Execution Of Privileged Tasks
Privileged Task Automation revolutionises the way organisations manage the execution of tasks that require privileged access
New Relic Study Reveals Outages in Australia and New Zealand Can Cost Businesses $2.2M USD Per Hour
The findings demonstrate a strong correlation between full-stack observability and reduced downtime, fewer interruptions, and lower annual outage costsโreinforcing the critical role observability plays in maximising operational efficiencies and business performance.
Tenable Research Discovers SMB Force-Authentication Vulnerability in Widely Used Open-Source Software
Tenable, the exposure management company, has disclosed that its Tenable Cloud Security Research team has discovered a medium-severity Server Message Block (SMB) force-authentication vulnerability that exists in all versions of Open Policy Agent (OPA) for Windows prior to v0.68.0. OPA is one of the most widely used policy engines built on open-source ...
AI-driven Attacks Targeting Retailers Ahead Of The Holiday Shopping Season
With sales beginning as early as October and extending through late December, Imperva warns that the holiday shopping season represents a critical time for online retailers. AI-driven attacks originate from AI tools like ChatGPT, Claude, and Gemini, alongside specialised bots that are designed to scrape websites for LLM (Large Language Model) training data.
Trustwave Expands Partnership With Dicker Data To Resell Complete Suite Of Security Services
Trustwave, a global leader in cybersecurity and managed security services, has announced an expanded partnership with Dicker Data, Australiaโs premier IT distributor, which has long been a Trustwave solutions distributor. Dicker Data will now offer the entire portfolio of Trustwaveโs cutting-edge cybersecurity services to its resellers as part of this ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..