The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Haiyan Song – EVP & GM, CloudOps
Watch The Interview
Biography
Haiyan Song is EVP & GM, CloudOps @ NetApp. Haiyan Song is an experienced cloud, security, engineering, and database-management leader, with a track record of successfully integrating acquisitions and scaling them by connecting with and leveraging larger company ecosystem capabilities to accelerate success. ...

Navigating the Waters: The American Water Cyberattack
American Water suspends online and billing services after a significant cyberattack. Read post to know how microsegmentation can contain such threats.

Ashish Dhawan – SVP/GM and Chief Revenue Officer, Cloud Business Unit
Watch The Interview
Biography
Ashish Dhawan is NetApp’s Senior Vice President of Global Cloud Sales. At the helm of NetApp's Cloud Business Unit as the Senior Vice President, General Manager, and Chief Revenue Officer, his focus is on driving growth through transformative cloud and AI solutions. With a background in leading AWS's Enterprise ...

The Future Of Security: Why Gender Diversity Is No Longer Optional
Gender diversity is not just a nice-to-have – it's a business imperative

Gagan Gulati – General Manager, Data Services, NetApp
Watch The Interview
Biography
Gagan’s team focuses on building best-in-class data protection and governance products for NetApp enterprise and cloud storage. This portfolio includes backup, disaster recovery, ransomware protection, data classification and governance and CVO. Prior to NetApp, Gagan was Chief Product Officer at Behavox, a security ...

Jeff Baxter – VP Product Marketing, NetApp
Watch The Interview
Biography
Jeff Baxter is Vice President, Product Marketing at NetApp. In this role, Jeff leads the team responsible for core product & solutions marketing at NetApp. Previously, Jeff has held a variety of technical and strategy roles at NetApp, including serving Sr. Director of Product Management for ONTAP, Chief ...

CISOs And The Art Of Post-Breach Communication
We’ve reached a point where attackers can have the upper hand in many cases, which is why it’s paramount that the right tools are invested in to provide deep visibility into an organisation’s IT infrastructure, and be resilient against cyber risk.

The Emergent Role Of Sustainability – Greenwashing Will Be Called Out
Introduction
One request I have to my guests is to define ‘Evangelism’ - as each company has a different version of what this means. For Matt Watts, Chief Technology Evangelist at NetApp reminded me that evangelism is far more than product promotion.
"It's an interesting question. My job is about bridging the technology within our portfolio to the ...
No results found.
In The News
Tenable Research Shows How “Prompt-Injection-Style” Hacks Can Secure the Model Context Protocol (MCP)
Tenable Research has published new findings that flip the script on one of the most discussed AI attack vectors. In the blog “MCP Prompt Injection: Not Just for Evil,” Tenable’s Ben Smith demonstrates how techniques resembling prompt injection can be repurposed to audit, log and even firewall Large Language Model (LLM) tool calls running over the ...
Lumify Group Wins Cyber Security Training Business of the Year in 2025 Australian Cyber Awards
Company celebrates further recognition of excellence as two employees named finalists in individual award categories
Trend Micro Delivers AI-Powered Threat Detection with AWS Infrastructure Support and NVIDIA Integration
Proactive security with AI-powered model built for modern enterprise workloads
Workato Launches Workato One Platform, UAI and Industry’s Leading Orchestration Offering to Bring Agents to The Core of The Enterprise
Customers now have a single place to rapidly build, deploy, and orchestrate powerful enterprise agents with complete enterprise context, skills, and governance
Genetec Launches AutoVu Plugin, ALPR Analysis Reports To Speed Up Investigations
ALPR-based forensic searches increase investigator efficiency and provide actionable insights.
New Research Reveals Over Half of Cybersecurity Incidents in Australia Occur Due to Unmanaged Assets
Trend Micro evaluation highlights alarmingly low use of attack surface management tools
Check Point Research Launches AI Security Report: Exposing the Rise of AI-Powered Cybercrime and Defences
New report unveils four key AI-driven cyber threats and how organisations can outsmart attackers in an AI-driven world
Enterprises to Redefine Cyber Resilience with Rackspace and Rubrik
Rackspace Cyber Recovery Cloud powered by Rubrik Enables Organisations to Restore Critical Operations Faster and More Securely than Traditional Offerings in the Event of a Cyber Attack
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..