The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

We’ve Grown up to Be the Intelligence Data Infrastructure Company
NetApp's cloud evolution and intelligent data infrastructure. A Conversation with Haiyan Song at NetApp Insight 2024.

The Unseen Hero. Enterprise Storage
The future of enterprise storage - simplification, security, and AI integration as Sandeep Singh, Senior Vice President and General Manager of Enterprise Storage at NetApp put it.
Singh put forward the central role of enterprise storage, spotlighting its importance not merely as a repository for data but as a cornerstone for security, regulatory ...

Haiyan Song – EVP & GM, CloudOps
Watch the Interview
Biography
Haiyan Song is EVP & GM, CloudOps @ NetApp. Haiyan Song is an experienced cloud, security, engineering, and database-management leader, with a track record of successfully integrating acquisitions and scaling them by connecting with and leveraging larger company ecosystem capabilities to accelerate success. ...

Navigating the Waters: The American Water Cyberattack
American Water suspends online and billing services after a significant cyberattack. Read post to know how microsegmentation can contain such threats.

Ashish Dhawan – SVP/GM and Chief Revenue Officer, Cloud Business Unit
Watch the Interview
Biography
Ashish Dhawan is NetApp’s Senior Vice President of Global Cloud Sales. At the helm of NetApp's Cloud Business Unit as the Senior Vice President, General Manager, and Chief Revenue Officer, his focus is on driving growth through transformative cloud and AI solutions. With a background in leading AWS's Enterprise ...

The Future of Security: Why Gender Diversity Is No Longer Optional
Gender diversity is not just a nice-to-have – it's a business imperative

Gagan Gulati – General Manager, Data Services, NetApp
Watch the Interview
Biography
Gagan’s team focuses on building best-in-class data protection and governance products for NetApp enterprise and cloud storage. This portfolio includes backup, disaster recovery, ransomware protection, data classification and governance and CVO. Prior to NetApp, Gagan was Chief Product Officer at Behavox, a security ...

Jeff Baxter – VP Product Marketing, NetApp
Watch the Interview
Biography
Jeff Baxter is Vice President, Product Marketing at NetApp. In this role, Jeff leads the team responsible for core product & solutions marketing at NetApp. Previously, Jeff has held a variety of technical and strategy roles at NetApp, including serving Sr. Director of Product Management for ONTAP, Chief ...
No results found.
In the News
DataDog Launches Bits AI SRE Agent to Resolve Incidents Faster
Bits AI SRE is an on-call 24/7 agent that autonomously investigates alerts and surfaces the fastest path to remediation
Kroll Elevates Global MDR Services, Migrating Protection to CrowdStrike Falcon Complete Next-Gen MDR
Partnership unites Kroll’s cyber expertise with the CrowdStrike Falcon platform to deliver 24/7 expert- and agent-led, full-cycle protection across its global customer base
Genetec Launches Cloudrunner Mobile App for Real-Time Vehicle Investigations in the Field
New app extends Cloudrunner capabilities to the field, giving law enforcement and security professionals faster access to data and alerts wherever they are.
KnowBe4 Predicts the Agentic AI Revolution Will Reshape Cybersecurity in 2026
KnowBe4 releases cybersecurity predictions for 2026
Research Proves Billions in GDP and Thousands More Jobs If Government Backs Australian-owned Companies
New economic modelling has found that awarding a greater share of Australian Defence procurement, covering both services and materiel, to Australian-owned and operated prime contractors would inject billions annually into the nation's GDP and create tens of thousands of jobs, whilst also strengthening Australia’s sovereign capability at a time of ...
PyTorch Users at Risk: Unveiling 3 Zero-Day PickleScan Vulnerabilities
AI Model Scanning as the First Layer of Security
JFrog Security Research found 3 zero-day critical vulnerabilities in PickleScan, which would allow attackers to bypass the most popular Pickle model scanning tool. PickleScan is a widely used, industry-standard tool for scanning ML models and ensuring they contain no malicious content. Each discovered ...
CrowdStrike Named AWS 2025 Global Security Partner & Global Marketplace Partner of the Year
CrowdStrike also recognized as Canada, Iberia, MENA, and SSA Technology Partner of the Year
Wasabi Strengthens Cloud Storage Security With Covert Copy Capability
Cloud storage company Wasabi has expanded its cyber resilient cloud storage capabilities with Covert Copy, a patent pending, advanced ransomware-resistant storage solution that allows users to create a locked, hidden copy of storage buckets to ensure critical data remains untouchable, even in the event of a cyberattack. The selected data is logically ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
- 353
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
