The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Inside the DIY Scam Economy
Introduction
The headquarters of the scam economy have always been elusive, shifting between countries, towns and cities like a shadow. Western Africa, once heralded as a hotbed for digital fraud operations, has now been superseded by Southeast Asia, where hundreds of major scam centres are scattered.
The operations of these criminal groups transcend ...

Closing the Human Gap in SAP Security: The Case for Cybersecurity Training
Cyber threats are happening at an overwhelming pace, and organizations using SAP systems have become favorite targets for cybercriminals. While specialized tools exist, there is a shortage of skilled professionals with expertise in SAP security. The need for training individuals in this area has never been greater.

Rushing AI Adoption? Security Leaders Say to Slow Down
Artificial intelligence isn’t just transforming business. It’s reshaping risk.At the recent Genetec Press Summit in Montréal, Manager and Principal Security Architect, Mathieu Chevalier delivered a presentation that the promise of AI is real, but so are the vulnerabilities.“It feels like everyone is talking about [AI], and with good reason… this ...

Navigating AI With Cyber-Resilient Storage: Use Cases Lead, Infrastructure Enables
This article discusses how intelligent data infrastructure enables AI adoption and innovation while providing robust cybersecurity protection through features like AI-powered ransomware detection and multi-layered security approaches. The piece emphasizes that while use cases drive technology adoption, secure and resilient data infrastructure is the ...
Security Metrics That Matter
Introduction
Organisations must move beyond reactive security postures and embrace data-driven decision-making as the sophistication and prevalence of threat actors continues to increase. For start-ups, especially those scaling rapidly or navigating compliance requirements, understanding and tracking the right cybersecurity metrics is ...

Rethinking Cyber Resilience in the Age of AI
AI is transforming both innovation and risk, driving advancements while enabling more sophisticated cyber threats. To achieve true cyber resilience, organizations must shift from passive data storage to intelligent, proactive defense, integrating AI-driven detection and recovery directly into the data layer to anticipate, withstand, and recover from ...

Cisco’s Bid to Anchor the Agentic Enterprise
The Shift to Agentic Enterprise AI
Artificial Intelligence (AI) now alters the commercial world with a speed that feels less evolutionary and more tectonic. Infrastructure strains, security models stretch, collaboration tools morph. In that context, Cisco has positioned itself not merely as a participant, but as a structural layer in what it sees as ...

How to Protect Your Professional Image in the AI Age
When Canadian Jake Moffat’s grandmother died in late 2022, he was at least comforted by an assurance from Air Canada’s helpful AI chatbot that he could get a compassionate rebate for his airfare after the event. That was a nice thing for an airline to do, made all the easier with the help of a friendly AI, and it eased the sting of an unexpected ...
No results found.
In the News
Extreme Solidifies Networking Leadership with Major Enhancements to Extreme Platform ONE
Morrisville, NC, May 5, 2026 – Extreme Networks, Inc. (Nasdaq: EXTR) today announced major advancements to Extreme Platform ONE™ including expanded third-party device management and integrated security, delivering a more intelligent, scalable, and secure enterprise networking solution. The platform is further enhanced with the introduction of Extreme ...
Infoblox Completes Axur Acquisition, Expands Preemptive Security to Stop External Threats at the Source
Infoblox, a leader in hybrid, multi-cloud networking and preemptive security, today announced it has completed its acquisition of Axur, a global provider of AI-powered external threat discovery and digital risk protection.
With the close of the acquisition, Infoblox expands its preemptive security capabilities to address a growing class of digital ...
Tanium Introduces Tanium Atlas to Transform IT and Security Operations for the Age of AI
New autonomous operating system brings real-time intelligence, guidance and action together in one experience
Genetec Urges Stronger Identity And Credential Governance For Physical Security Systems As AI Accelerates Cyber Risk
Ahead of World Password Day, Genetec warns that password changes alone are no longer enough to protect connected physical security environments
Sektor Expands Cybersecurity Portfolio With Semperis Distribution Agreement Across ANZ
Partnership strengthens identity security offering for partners amid rising threat landscape
DroneShield and Terma Sign Strategic MOU to Advance Layered Counter UAS Capabilities
DroneShield, a global leader in counter-drone technology solutions, along with Terma, a leading defence and aerospace company, announced the signing of a Memorandum of Understanding (MOU), to establish a strategic collaboration focused on advancing layered counter‑UAS capabilities. Both companies bring complementary, mission‑proven counter-UxS ...
Qualys Cloud Security Forecast 2026 Finds Cloud Risk is Scaling Through Design, Not Disruption
Qualys, Inc. (NASDAQ: QLYS), a leading provider of cloud-based IT, security and compliance solutions, has published its Cloud Security Forecast 2026 report, warning that cloud compromise is increasingly driven by how environments are designed and operated, rather than by novel attack techniques. The research signals a shift from exploit-driven breaches ...
BeyondTrust Expands Identity Security Insights to Australia to Address Rising AI and Non-Human Identity Risks
BeyondTrust extends regional availability to help organisations manage and secure human and non-human identities across hybrid, cloud, and SaaS environments | The expansion supports compliance with regional regulations, including Australia’s Security of Critical Infrastructure Act, while providing visibility into AI agents, machine identities, ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
- 353
- 354
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
