The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Your Secrets Aren’t Safe – Frightening Flaws in Modern Messaging Apps

Your Secrets Aren’t Safe – Frightening Flaws in Modern Messaging Apps

Imagine pouring your country’s most sensitive secrets into a messaging app you downloaded for free. Now imagine those messages in the hands of your adversary. Sounds far-fetched? Not according to David Wiseman, VP of Secure Communications at BlackBerry, who warns that governments, businesses, and everyday people alike are hurtling towards a ...
From Gallipoli to the Digital Frontier: The ANZAC Spirit in Cybersecurity

From Gallipoli to the Digital Frontier: The ANZAC Spirit in Cybersecurity

Context As dawn breaks on ANZAC Day, Australians and New Zealanders pause to remember the sacrifices of the soldiers who stormed the beaches of Gallipoli in 1915. However, in a hyperconnected 21st-century world, the fight for national sovereignty has shifted from trenches and shores to servers and silicon. Today, a new generation of defenders stands ...
The Shadowy Threats Stalking Australia’s Ballot Box

The Shadowy Threats Stalking Australia’s Ballot Box

As Australia edges toward another election, a new and invisible threat stalks our democratic process, not from hackers in dark rooms, but from sophisticated, well-funded nation states wielding artificial intelligence. According to Ginny Badanes, General Manager of Democracy Forward at Microsoft, 2024 has seen democracy itself placed in the ...
How Adopting Maturity Models Can Improve Enterprise IT Security

How Adopting Maturity Models Can Improve Enterprise IT Security

Having developers well trained in security techniques is vital for the production of resilient code. Taking time to achieve this now can avoid significant disruption and losses in the future.
Why Web Application Firewalls Are a Critical Shield for FinTech Security

Why Web Application Firewalls Are a Critical Shield for FinTech Security

The implementation of AI-driven, cloud-native WAF solutions offers financial institutions a robust defence mechanism against cyber threats.
The Real Corporate Penetration Testing Process: How Companies Get Hacked Before the Hackers Do! 🚀

The Real Corporate Penetration Testing Process: How Companies Get Hacked Before the Hackers Do! 🚀

Hey guys, I’m sn0x — a cybersecurity researcher, bug hunter, and security enthusiast. I hold multiple certifications, including CNSP, EWPTXv2, CEH v11–12, GRC, RHCSA, and Cisco Cyber Threat Management. I’ve been ranked #1 in India and #2 globally on TryHackMe, secured #134 on Hack The Box in 2021, and even won HTB Battlegrounds twice. But hey, this ...
What in the DeepSeek?

What in the DeepSeek?

DeepSeek, the tool designed to exploit vulnerabilities in AI systems, raises significant concerns amongst the security industry, particularly OpenAI. The DeepSeek competitor discussed the potential for DeepSeek to undermine the security of AI applications, which could have far-reaching consequences for technology as we know it. Satnam Narang, Senior ...
AI First, Human Second: The New Cybersecurity Command Structure

AI First, Human Second: The New Cybersecurity Command Structure

"Man is the measure of all things." ― Protagora - pre-Socratic Greek philosopher It’s an ancient idea, yet it feels more relevant than ever as machines start making decisions that were once left to human minds. In today’s high-stakes cybersecurity landscape, artificial intelligence is no longer a future wager; it’s a frontline asset. AI systems detect ...
No results found.

In the News

Kyndryl Unveils Agentic AI Workflow Governance for Trusted Deployment of Mission‑Critical AI Agents

Kyndryl Unveils Agentic AI Workflow Governance for Trusted Deployment of Mission‑Critical AI Agents

Policy as code capability transforms compliance in regulated agentic AI workflows | Automated policy enforcement establishes guardrails, codifies compliance and boosts transparency across enterprise operations
Palo Alto Networks Completes Acquisition of CyberArk to Secure the AI Era

Palo Alto Networks Completes Acquisition of CyberArk to Secure the AI Era

Adds the leading platform that delivers unified security for human, machine and agentic identity.
Riverbed Study Finds 92% of Decision Makers in the Financial Services Industry Agree That Improving Data Quality Is Critical to AI Success 

Riverbed Study Finds 92% of Decision Makers in the Financial Services Industry Agree That Improving Data Quality Is Critical to AI Success 

Financial Services organisations lead with a strong ROI on AIOps initiatives but only 12% have AI projects fully deployed enterprise-wide, and a substantial 62% still remain in pilot or development stages 
CISOs Driving Growth Through Cyber Resilience, but AI and Supply Chain Visibility Cause Lingering Gaps

CISOs Driving Growth Through Cyber Resilience, but AI and Supply Chain Visibility Cause Lingering Gaps

February 12, 2026 – LevelBlue, the world’s largest pure-play provider of managed security services, has released its latest research report, Persona Spotlight: CISO (Chief Information Security Officer), part of the company’s ongoing research into how cybersecurity leaders are navigating an increasingly complex threat landscape ...
Genetec Advances Investigation Speed and Efficiency With Built for Enterprise Capabilities in Security Center SaaS

Genetec Advances Investigation Speed and Efficiency With Built for Enterprise Capabilities in Security Center SaaS

New investigation capabilities reduce investigation time from hours to minutes across complex, multi-site, and multi-vendor environments
Sophos Acquires Arco Cyber to Bring CISO-Level, Agentic AI-Powered Expertise to Every Organisation

Sophos Acquires Arco Cyber to Bring CISO-Level, Agentic AI-Powered Expertise to Every Organisation

Sophos has announced the acquisition of UK-based Arco Cyber, a cybersecurity assurance company dedicated to helping organisations improve their security posture while staying ahead of compliance requirements and emerging threats. The acquisition is an important step in Sophos’ strategy to help organisations strengthen cybersecurity strategy and ...
Armis Launches Armis Centrix™ for Application Security to Secure the Code That Runs Organisations

Armis Launches Armis Centrix™ for Application Security to Secure the Code That Runs Organisations

Today’s application security landscape is overloaded with fragmented, static point solutions, each solving a piece of the puzzle but creating noise, inefficiencies, and blind spots. Armis Centrix™ for Application Security is an AI-powered solution for detection, contextualisation, and remediation.
NinjaOne Expands Platform With IT Asset Management to Reduce Cost and Risk

NinjaOne Expands Platform With IT Asset Management to Reduce Cost and Risk

Today, announced NinjaOne IT Asset Management (ITAM), a new solution that gives IT teams complete visibility and control across their entire IT environment by unifying endpoint and asset management. Built natively into the NinjaOne platform, ITAM helps organisations extend the life of their assets, reduce costs, strengthen security, and improve ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This