The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Rethinking Cyber Resilience in the Age of AI
AI is transforming both innovation and risk, driving advancements while enabling more sophisticated cyber threats. To achieve true cyber resilience, organizations must shift from passive data storage to intelligent, proactive defense, integrating AI-driven detection and recovery directly into the data layer to anticipate, withstand, and recover from ...

Cisco’s Bid to Anchor the Agentic Enterprise
The Shift to Agentic Enterprise AI
Artificial Intelligence (AI) now alters the commercial world with a speed that feels less evolutionary and more tectonic. Infrastructure strains, security models stretch, collaboration tools morph. In that context, Cisco has positioned itself not merely as a participant, but as a structural layer in what it sees as ...

How to Protect Your Professional Image in the AI Age
When Canadian Jake Moffat’s grandmother died in late 2022, he was at least comforted by an assurance from Air Canada’s helpful AI chatbot that he could get a compassionate rebate for his airfare after the event. That was a nice thing for an airline to do, made all the easier with the help of a friendly AI, and it eased the sting of an unexpected ...

Love-bombing and Pig-butchering: How Romance Scams Are Evolving
As Valentine’s Day approaches, millions of Australians will be encouraged to swipe, match and message online in the search for romance. Dating apps and social platforms typically see a surge in activity during this period, driven by the promise of companionship, intimacy and connection. But alongside genuine relationships, this heightened activity also ...

Future-Proofing Your Data Infrastructure With Post-Quantum cryptography
Quantum computing poses a significant threat to current encryption systems, making sensitive data vulnerable to future decryption by cybercriminals using "harvest now, decrypt later" tactics. To mitigate this risk, organizations must adopt post-quantum cryptography (PQC) standards, such as those developed by NIST, and integrate them into their data ...

Cyber Is No Longer Abstract or Passive According to Former National Security Advisor of Japan
Japan is no longer treating cyber threats as a background policy issue. As attacks soar across the region, Japan has taken the position toward active cyber defence, which in turn signals a more assertive national security posture.
Mr. Kitamura, former National Security Advisor of Japan, is aware that the threat environment left little room for delay ...

Rising Cybersecurity Vulnerabilities in Increasingly Interconnected IT/OT Environments
From Outage to Infiltration: Cybersecurity Risk and the Evolving Threat to Electrical Infrastructure
As electrical infrastructure modernizes, its vulnerabilities evolve in parallel. From substation automation to AI-powered grid management, today’s systems have developed from the isolated hardware of the past to converged digital ecosystems with data ...

Cyber Dashboards Are Making Boards Feel Safer…and That’s the Real Risk
Cyber dashboards could be driving complacency when it comes to cyber risk.
No results found.
In the News
High Commissioner of Canada to Australia Visits Genetec Experience Centre in Sydney on Second Anniversary of Opening
High Commissioner Of Canada To Australia Visits Genetec Experience Centre In Sydney On Second Anniversary Of Opening
Ping Identity Wins 2026 Google Cloud Security Partner of the Year Award for Identity & Access Management
Award highlights joint leadership in modernising and extending identity controls into real-time AI-driven environments
Rubrik Announces Cyber Resilience for Google Cloud SQL
Rubrik Security Cloud provides enterprise security and recovery for PostgreSQL databases
SA Power Networks Deploys Tanium to Boost Cyber Resilience
South Australian electricity distributor relies on the Tanium Autonomous IT platform for more efficient and effective endpoint and exposure management
VAST Data Hits $30 Billion Valuation as AI Drives a New Infrastructure Stack
AI operating system company VAST Data today announced the closing of its Series F financing at a US$30 billion valuation, representing more than a threefold increase from its US$9.1 billion Series E valuation in late 2023. The latest round was led by Drive Capital, with Access Industries acting as co-lead, and included participation from existing ...
Check Point to Integrate AI Defense Plane With Google Cloud to Help Secure AI Agents With Integrated Discovery, Governance, and Runtime Protection
REDWOOD CITY, CA. – April 22, 2026 -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced that it will serve as a launch partner with Google Cloud to integrate Check Point's AI Defense Plane with Google Cloud's Gemini Enterprise Agent Platform. The integration will combine ...
Exabeam Extends Agent Behaviour Analytics to the Google Cloud Agent Ecosystem
Comprehensive visibility and anomaly detection now available for agents built with Google Cloud’s Agent Development Kit and multi-agent workflows via the upcoming Google Agent Gateway
DataDog Announces GPU Monitoring to Help Businesses Optimise Spend and Performance as They Aim to Scale AI Projects
The launch of Datadog’s GPU Monitoring helps teams plan capacity, troubleshoot issues quickly, prevent costly failures and avoid wasted spend
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
