The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Rethinking Cyber Resilience in the Age of AI

Rethinking Cyber Resilience in the Age of AI

AI is transforming both innovation and risk, driving advancements while enabling more sophisticated cyber threats. To achieve true cyber resilience, organizations must shift from passive data storage to intelligent, proactive defense, integrating AI-driven detection and recovery directly into the data layer to anticipate, withstand, and recover from ...
Cisco’s Bid to Anchor the Agentic Enterprise

Cisco’s Bid to Anchor the Agentic Enterprise

The Shift to Agentic Enterprise AI Artificial Intelligence (AI) now alters the commercial world with a speed that feels less evolutionary and more tectonic. Infrastructure strains, security models stretch, collaboration tools morph. In that context, Cisco has positioned itself not merely as a participant, but as a structural layer in what it sees as ...
How to Protect Your Professional Image in the AI Age

How to Protect Your Professional Image in the AI Age

When Canadian Jake Moffat’s grandmother died in late 2022, he was at least comforted by an assurance from Air Canada’s helpful AI chatbot that he could get a compassionate rebate for his airfare after the event. That was a nice thing for an airline to do, made all the easier with the help of a friendly AI, and it eased the sting of an unexpected ...
Love-bombing and Pig-butchering: How Romance Scams Are Evolving

Love-bombing and Pig-butchering: How Romance Scams Are Evolving

As Valentine’s Day approaches, millions of Australians will be encouraged to swipe, match and message online in the search for romance. Dating apps and social platforms typically see a surge in activity during this period, driven by the promise of companionship, intimacy and connection. But alongside genuine relationships, this heightened activity also ...
Future-Proofing Your Data Infrastructure With Post-Quantum cryptography

Future-Proofing Your Data Infrastructure With Post-Quantum cryptography

Quantum computing poses a significant threat to current encryption systems, making sensitive data vulnerable to future decryption by cybercriminals using "harvest now, decrypt later" tactics. To mitigate this risk, organizations must adopt post-quantum cryptography (PQC) standards, such as those developed by NIST, and integrate them into their data ...
Cyber Is No Longer Abstract or Passive According to Former National Security Advisor of Japan

Cyber Is No Longer Abstract or Passive According to Former National Security Advisor of Japan

Japan is no longer treating cyber threats as a background policy issue. As attacks soar across the region, Japan has taken the position toward active cyber defence, which in turn signals a more assertive national security posture. Mr. Kitamura, former National Security Advisor of Japan, is aware that the threat environment left little room for delay ...
Rising Cybersecurity Vulnerabilities in Increasingly Interconnected IT/OT Environments

Rising Cybersecurity Vulnerabilities in Increasingly Interconnected IT/OT Environments

From Outage to Infiltration: Cybersecurity Risk and the Evolving Threat to Electrical Infrastructure As electrical infrastructure modernizes, its vulnerabilities evolve in parallel. From substation automation to AI-powered grid management, today’s systems have developed from the isolated hardware of the past to converged digital ecosystems with data ...
Cyber Dashboards Are Making Boards Feel Safer…and That’s the Real Risk

Cyber Dashboards Are Making Boards Feel Safer…and That’s the Real Risk

Cyber dashboards could be driving complacency when it comes to cyber risk.
No results found.

In the News

Anomali Launches ThreatStream Next-Gen To Turn Intelligence Into Action, At The Speed Threats Demand

Anomali Launches ThreatStream Next-Gen To Turn Intelligence Into Action, At The Speed Threats Demand

New release gives CTI teams deeper investigative power and SOC teams the decisioning layer to act on it — 300 times faster than traditional workflows, regardless of how they deploy
Extreme Solidifies Networking Leadership with Major Enhancements to Extreme Platform ONE

Extreme Solidifies Networking Leadership with Major Enhancements to Extreme Platform ONE

Morrisville, NC, May 5, 2026 – Extreme Networks, Inc. (Nasdaq: EXTR) today announced major advancements to Extreme Platform ONE™ including expanded third-party device management and integrated security, delivering a more intelligent, scalable, and secure enterprise networking solution. The platform is further enhanced with the introduction of Extreme ...
Infoblox Completes Axur Acquisition, Expands Preemptive Security to Stop External Threats at the Source

Infoblox Completes Axur Acquisition, Expands Preemptive Security to Stop External Threats at the Source

Infoblox, a leader in hybrid, multi-cloud networking and preemptive security, today announced it has completed its acquisition of Axur, a global provider of AI-powered external threat discovery and digital risk protection. With the close of the acquisition, Infoblox expands its preemptive security capabilities to address a growing class of digital ...
Tanium Introduces Tanium Atlas to Transform IT and Security Operations for the Age of AI

Tanium Introduces Tanium Atlas to Transform IT and Security Operations for the Age of AI

New autonomous operating system brings real-time intelligence, guidance and action together in one experience
Genetec Urges Stronger Identity And Credential Governance For Physical Security Systems As AI Accelerates Cyber Risk

Genetec Urges Stronger Identity And Credential Governance For Physical Security Systems As AI Accelerates Cyber Risk

Ahead of World Password Day, Genetec warns that password changes alone are no longer enough to protect connected physical security environments
Sektor Expands Cybersecurity Portfolio With Semperis Distribution Agreement Across ANZ

Sektor Expands Cybersecurity Portfolio With Semperis Distribution Agreement Across ANZ

Partnership strengthens identity security offering for partners amid rising threat landscape
DroneShield and Terma Sign Strategic MOU to Advance Layered Counter UAS Capabilities

DroneShield and Terma Sign Strategic MOU to Advance Layered Counter UAS Capabilities

DroneShield, a global leader in counter-drone technology solutions, along with Terma, a leading defence and aerospace company, announced the signing of a Memorandum of Understanding (MOU), to establish a strategic collaboration focused on advancing layered counter‑UAS capabilities. Both companies bring complementary, mission‑proven counter-UxS ...
Qualys Cloud Security Forecast 2026 Finds Cloud Risk is Scaling Through Design, Not Disruption

Qualys Cloud Security Forecast 2026 Finds Cloud Risk is Scaling Through Design, Not Disruption

Qualys, Inc. (NASDAQ: QLYS), a leading provider of cloud-based IT, security and compliance solutions, has published its Cloud Security Forecast 2026 report, warning that cloud compromise is increasingly driven by how environments are designed and operated, rather than by novel attack techniques. The research signals a shift from exploit-driven breaches ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This