The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Janice Le – GM, Microsoft Security, Compliance, Identity & Privacy
Watch The Interview
Biography
Janice is GM, Microsoft Security Compliance, Identity & Privacy at Microsoft where she oversees strategy, operations, and portfolio marketing for Microsoft Security.
She has served the tech industry in Silicon Valley over the last 20+ years at enterprises and startups in product, marketing, and GM roles for ...

The End of Pentest Reporting Chaos: OWASP Standardises the Industry
For years, penetration testing reports have been inconsistent, manual, and difficult to integrate into modern security workflows. Every provider has its own format, slowing down remediation and making automation nearly impossible. The OWASP Penetration Test Reporting Standard (OPTRS) is designed to fix this. It provides a structured, machine-readable ...

2024 Lessons Shaping 2025 Cybersecurity Trends
Discover key lessons from 2024 cyberattacks and how they’ll shape 2025 cybersecurity trends. Learn to build resilience with breach ready defenses.

Navigating And Combatting Scams In Banking
By adopting a comprehensive cybersecurity strategy that integrates multiple data sources and streams and enhances the digital experience, banks can significantly bolster their defences and protect their customers.

The Two Forces Reshaping Our Cyber Defences For The Better
Introduction
It’s very hard to catch a ball in flight without being able to make real-time calculations based on a continuous and uninterrupted stream of information from your eyes to your brain. The same can be said for cyber security. It’s tough to catch threats in play without truly real-time data.
The need for real-time data and data processing ...

Understanding The Risks Associated With ‘Shadow AI’ In Software Development
There are ways for CISOs to bring AI-assisted coding out of the shadows, allowing staff to get the most out of productivity benefits while avoiding vulnerabilities. This can be done by embracing it – as opposed to blanket suppression – and pursuing a three-point plan to establish reasonable guardrails and raise security awareness capabilities among ...

Six Trends Shaping The Future Of The Security Industry In 2025
In 2025, security will be transformed by hybrid architectures, advanced AI, and high-resolution imaging, enabling smarter, more flexible systems. Security technologies will deliver business intelligence, while software-driven solutions and core technology ownership ensure resilience, efficiency, and innovation.

Malicious AdTech And Compromised Websites: A Dangerous Combination
In the security industry, we rarely tell a story from the victim’s perspective. Instead, we focus on a malicious actor’s perspective: their tactics, techniques, and procedures (TTPs). So, I decided to take a turn as a victim and see what happened after visiting a compromised website with malicious adtech.
No results found.
In The News
Ping Identity Strengthens Defence Against AI-Driven Impersonation with Privacy-Preserving Biometrics
Signs agreement to acquire Keyless, expanding privacy-first authentication across the entire user journey.
Kaseya Connect APAC 2025 Awards Celebrate Regional MSP Excellence
The awards recognise outstanding innovation and service excellence from MSPs and IT professionals across the Asia Pacific region.
Camelot Secure CEO Stan Oliver Named One of The Daily Record’s 2025 Most Admired CEOs
Oliver’s recognition reflects a career defined by both innovation and inclusivity. Since founding Camelot Secure in 2022, he has spearheaded pioneering work in Advanced Persistent Threat (APT) Hunting, Attack Surface Management, Penetration Testing, and Threat Detection & Incident Response. Under his leadership, the company has also developed ...
Lakera Launches Open-Source Security Benchmark for LLM backends in AI Agents
SAN FRANCISCO and ZURICH - October 27, 2025 – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, and Lakera, a world leading AI-native security platform for Agentic AI applications, with researchers from The UK AI Security Institute (AISI), have announced the release of the backbone breaker ...
Tech Professionals In Oceania Brace For A Year Of AI Risks, Regulation And A Focus On Business Continuity
ISACA’s 2026 Tech Trends & Priorities Pulse Poll reveals the top threats and pressures keeping Oceania’s digital trust professionals awake at night
Cloudian HyperScale AI Data Platform Powered by NVIDIA Unlocks Sovereign AI
Cloudian is enabling governments, enterprises, and service providers worldwide to develop sovereign AI projects within their national borders, using its proven S3-compatible storage platforms. With Cloudian HyperStore for AI data management and the Cloudian HyperScale AI Data Platform – which integrates NVIDIA accelerated computing, networking and ...
Rapid7 Accelerates Exposure Remediation with AI-Generated Risk Insights and Enhanced Vulnerability Intelligence
Rapid7 has announced new AI-generated risk-intelligence features within its Command Platform. The upgrade introduces plain-language risk summaries in Remediation Hub, combining exploit signals, asset criticality, and threat-intelligence to help security teams prioritise faster.
BeyondTrust Experts Reveal Top Cybersecurity Predictions for 2026 and Beyond
From AI fragmentation and identity debt to biological computing, BeyondTrust forecasts the technologies and threats that will shape the next decade. | Experts predict a surge in agentic AI adoption, identity exploitation, and global regulatory shifts redefining digital trust.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
