The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

A CISO’s Love Letter to The Board – Cyber Risk Quantified
Cybersecurity has a communication problem: CISOs still speak in technical jargon while boards listen for financial impact. This byline reframes cyber risk as a business language of dollars and cents — the true “love language” of executives. Drawing on new research, it argues that risk quantification is the CISO’s secret weapon, shifting the focus from ...

The New Normal – Ransomware as a Service
Introduction
Gone are the days that cyber threats and attacks are the work of elite hackers, or those who have deep coding skills, nation state support, and unique access to high-level tools.
In 2025, and accelerating in coming years, it’s disturbingly easy to launch an attack. With ready-made malware or custom code sold on the dark web, anyone ...

Why Measuring The Right Threat Intelligence Metrics Is Key To SOC Success
Organisations must detect, investigate, and respond to threats faster than ever. Success depends on measuring the right threat intelligence metrics which are those that can separate meaningful insights from overwhelming noise. For businesses, failing to do so risks reputational damage and financial loss.

Organisations Must Adapt Defences To 2025’s Dynamic Ransomware Threat
Ransomware has entered a new phase in 2025—faster, more unpredictable, and increasingly targeting APAC. Reactive security no longer works and organisations must adopt intelligence-led, multi-layered defences to keep pace.

IT-OT Convergence: What Happens When Two Worlds Collide?
Most people thought that cybersecurity is all about data breaches, suspicious links, or adversaries trying to get access to your accounts. But in recent years, the space has gone beyond computers and firewalls. Today, cybersecurity also means keeping the power on, the water safe, and hospitals operational.
Recently on the DevSecOops podcast, hosts ...

Hygiene is Hard: Why Even Security-Conscious Organisations Still Fall at the First Hurdle
Simply put, organisations need to move beyond reactive threat hunt engagements to proactive identity security and zero trust and statistics show this is one of the biggest gaps in our environments today that need attention

The Next Scammer’s Paradise
The email looks real. It sounds like your boss. Thinking it might be urgent, you click the link included therein. And just like that, it’s over.
This is the new face of cybercrime. Powered by AI, cybercrime no longer requires technical prowess nor heavy coding. All you need is the right tool and the appropriate prompt; something that can scrape ...

The PIN That Wasn’t Yours
Fintech gift card system flaw may have allowed quiet cashouts. Signs point to possible exploitation months before it was discovered.
No results found.
In The News
Cisco Launches Cisco IQ, the Unified AI-Powered Experience That Connects the Entire Customer Journey
• Cisco IQ brings real-time insights, on-demand assessments, troubleshooting and personalized learning, automation and agents from across professional services and support together in a single AI-powered interface, helping customers plan, deploy, manage, secure and optimize technology investments with greater speed and simplicity.
• With Cisco IQ's ...
CyberArk Introduces First Identity Security Solution Purpose-Built to Protect AI Agents with Privilege Controls
Delivers privilege controls, visibility and compliance for the new class of AI agent identities. | Extends CyberArk’s identity security capabilities to secure AI-driven automation at enterprise scale.
KnowBe4 Research Reveals Personalised Phishing Emails Using the Company Name Dominate
The Q3 2025 Phishing Simulation Roundup reveals people interacted most with emails that impersonated colleagues or referenced internal systems or topics
Critical RCE Vulnerability Discovered in React Native Community CLI NPM Package with 2M Weekly Downloads
JFrog Security Research team demonstrates CVE-2025-11953 allows unauthenticated attackers to remotely execute code on developers’ machines, putting organisations at risk
SAP and Snowflake Unleash the Power of Data and Enterprise AI Across the Business Data Fabric
New partnership empowers organisations with access to rich data insights required to power AI apps that accelerate businesses outcomes
Delinea Expands OEM Agreement with IBM to Deliver Privileged Identity and Access Management Capabilities
AUSTRALIA – 5 November, 2025 – Delinea, a pioneering provider of solutions for securing human and machine identities through centralised authorisation, today announced the expansion of its OEM agreement with IBM to make the full Delinea Platform available to IBM customers.
This new agreement deepens a strategic collaboration that began between the two ...
More than Half (58%) of Retailers hit by Ransomware Pay the Ransom, Sophos Finds
Sophos today released its fifth annual Sophos State of Ransomware in Retail report, a vendor-agnostic survey of IT and cybersecurity leaders across 16 countries. This year’s report reveals that nearly half (46%) of retail ransomware incidents were traced to an unknown security gap, underscoring ongoing visibility challenges across the retail attack ...
Snowflake Announces New Product Innovations to Accelerate the Development of Enterprise-Grade Agentic AI Apps
• Snowflake Intelligence is now generally available, equipping organisations to democratise data and AI across their business • New advancements to Snowflake Horizon Catalog and Snowflake Openflow enable enterprises to make all their data accessible for AI agents • New suite of developer tools to supercharge agentic AI, enabling developers to deploy AI ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
