The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Janice Le – GM, Microsoft Security, Compliance, Identity & Privacy

Janice Le – GM, Microsoft Security, Compliance, Identity & Privacy

Watch The Interview  Biography Janice is GM, Microsoft Security Compliance, Identity & Privacy at Microsoft where she oversees strategy, operations, and portfolio marketing for Microsoft Security. She has served the tech industry in Silicon Valley over the last 20+ years at enterprises and startups in product, marketing, and GM roles for ...
The End of Pentest Reporting Chaos: OWASP Standardises the Industry

The End of Pentest Reporting Chaos: OWASP Standardises the Industry

For years, penetration testing reports have been inconsistent, manual, and difficult to integrate into modern security workflows. Every provider has its own format, slowing down remediation and making automation nearly impossible. The OWASP Penetration Test Reporting Standard (OPTRS) is designed to fix this. It provides a structured, machine-readable ...
2024 Lessons Shaping 2025 Cybersecurity Trends

2024 Lessons Shaping 2025 Cybersecurity Trends

Discover key lessons from 2024 cyberattacks and how they’ll shape 2025 cybersecurity trends. Learn to build resilience with breach ready defenses.
Navigating And Combatting Scams In Banking

Navigating And Combatting Scams In Banking

By adopting a comprehensive cybersecurity strategy that integrates multiple data sources and streams and enhances the digital experience, banks can significantly bolster their defences and protect their customers.
The Two Forces Reshaping Our Cyber Defences For The Better

The Two Forces Reshaping Our Cyber Defences For The Better

Introduction It’s very hard to catch a ball in flight without being able to make real-time calculations based on a continuous and uninterrupted stream of information from your eyes to your brain. The same can be said for cyber security. It’s tough to catch threats in play without truly real-time data. The need for real-time data and data processing ...
Understanding The Risks Associated With ‘Shadow AI’ In Software Development

Understanding The Risks Associated With ‘Shadow AI’ In Software Development

There are ways for CISOs to bring AI-assisted coding out of the shadows, allowing staff to get the most out of productivity benefits while avoiding vulnerabilities. This can be done by embracing it – as opposed to blanket suppression – and pursuing a three-point plan to establish reasonable guardrails and raise security awareness capabilities among ...
Six Trends Shaping The Future Of The Security Industry In 2025

Six Trends Shaping The Future Of The Security Industry In 2025

In 2025, security will be transformed by hybrid architectures, advanced AI, and high-resolution imaging, enabling smarter, more flexible systems. Security technologies will deliver business intelligence, while software-driven solutions and core technology ownership ensure resilience, efficiency, and innovation.
Malicious AdTech And Compromised Websites: A Dangerous Combination

Malicious AdTech And Compromised Websites: A Dangerous Combination

In the security industry, we rarely tell a story from the victim’s perspective. Instead, we focus on a malicious actor’s perspective: their tactics, techniques, and procedures (TTPs). So, I decided to take a turn as a victim and see what happened after visiting a compromised website with malicious adtech.
No results found.

In The News

Ping Identity Strengthens Defence Against AI-Driven Impersonation with Privacy-Preserving Biometrics

Ping Identity Strengthens Defence Against AI-Driven Impersonation with Privacy-Preserving Biometrics

Signs agreement to acquire Keyless, expanding privacy-first authentication across the entire user journey.
Kaseya Connect APAC 2025 Awards Celebrate Regional MSP Excellence

Kaseya Connect APAC 2025 Awards Celebrate Regional MSP Excellence

The awards recognise outstanding innovation and service excellence from MSPs and IT professionals across the Asia Pacific region.
Camelot Secure CEO Stan Oliver Named One of The Daily Record’s 2025 Most Admired CEOs

Camelot Secure CEO Stan Oliver Named One of The Daily Record’s 2025 Most Admired CEOs

Oliver’s recognition reflects a career defined by both innovation and inclusivity. Since founding Camelot Secure in 2022, he has spearheaded pioneering work in Advanced Persistent Threat (APT) Hunting, Attack Surface Management, Penetration Testing, and Threat Detection & Incident Response. Under his leadership, the company has also developed ...
Lakera Launches Open-Source Security Benchmark for LLM backends in AI Agents

Lakera Launches Open-Source Security Benchmark for LLM backends in AI Agents

SAN FRANCISCO and ZURICH - October 27, 2025 – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, and Lakera, a world leading AI-native security platform for Agentic AI applications, with researchers from The UK AI Security Institute (AISI), have announced the release of the backbone breaker ...
Tech Professionals In Oceania Brace For A Year Of AI Risks, Regulation And A Focus On Business Continuity

Tech Professionals In Oceania Brace For A Year Of AI Risks, Regulation And A Focus On Business Continuity

ISACA’s 2026 Tech Trends & Priorities Pulse Poll reveals the top threats and pressures keeping Oceania’s digital trust professionals awake at night
Cloudian HyperScale AI Data Platform Powered by NVIDIA Unlocks Sovereign AI

Cloudian HyperScale AI Data Platform Powered by NVIDIA Unlocks Sovereign AI

Cloudian is enabling governments, enterprises, and service providers worldwide to develop sovereign AI projects within their national borders, using its proven S3-compatible storage platforms. With Cloudian HyperStore for AI data management and the Cloudian HyperScale AI Data Platform – which integrates NVIDIA accelerated computing, networking and ...
Rapid7 Accelerates Exposure Remediation with AI-Generated Risk Insights and Enhanced Vulnerability Intelligence

Rapid7 Accelerates Exposure Remediation with AI-Generated Risk Insights and Enhanced Vulnerability Intelligence

Rapid7 has announced new AI-generated risk-intelligence features within its Command Platform. The upgrade introduces plain-language risk summaries in Remediation Hub, combining exploit signals, asset criticality, and threat-intelligence to help security teams prioritise faster.
BeyondTrust Experts Reveal Top Cybersecurity Predictions for 2026 and Beyond

BeyondTrust Experts Reveal Top Cybersecurity Predictions for 2026 and Beyond

From AI fragmentation and identity debt to biological computing, BeyondTrust forecasts the technologies and threats that will shape the next decade. | Experts predict a surge in agentic AI adoption, identity exploitation, and global regulatory shifts redefining digital trust.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This