The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Rethinking Cyber Resilience in the Age of AI
AI is transforming both innovation and risk, driving advancements while enabling more sophisticated cyber threats. To achieve true cyber resilience, organizations must shift from passive data storage to intelligent, proactive defense, integrating AI-driven detection and recovery directly into the data layer to anticipate, withstand, and recover from ...

Cisco’s Bid to Anchor the Agentic Enterprise
The Shift to Agentic Enterprise AI
Artificial Intelligence (AI) now alters the commercial world with a speed that feels less evolutionary and more tectonic. Infrastructure strains, security models stretch, collaboration tools morph. In that context, Cisco has positioned itself not merely as a participant, but as a structural layer in what it sees as ...

How to Protect Your Professional Image in the AI Age
When Canadian Jake Moffat’s grandmother died in late 2022, he was at least comforted by an assurance from Air Canada’s helpful AI chatbot that he could get a compassionate rebate for his airfare after the event. That was a nice thing for an airline to do, made all the easier with the help of a friendly AI, and it eased the sting of an unexpected ...

Love-bombing and Pig-butchering: How Romance Scams Are Evolving
As Valentine’s Day approaches, millions of Australians will be encouraged to swipe, match and message online in the search for romance. Dating apps and social platforms typically see a surge in activity during this period, driven by the promise of companionship, intimacy and connection. But alongside genuine relationships, this heightened activity also ...

Future-Proofing Your Data Infrastructure With Post-Quantum cryptography
Quantum computing poses a significant threat to current encryption systems, making sensitive data vulnerable to future decryption by cybercriminals using "harvest now, decrypt later" tactics. To mitigate this risk, organizations must adopt post-quantum cryptography (PQC) standards, such as those developed by NIST, and integrate them into their data ...

Cyber Is No Longer Abstract or Passive According to Former National Security Advisor of Japan
Japan is no longer treating cyber threats as a background policy issue. As attacks soar across the region, Japan has taken the position toward active cyber defence, which in turn signals a more assertive national security posture.
Mr. Kitamura, former National Security Advisor of Japan, is aware that the threat environment left little room for delay ...

Rising Cybersecurity Vulnerabilities in Increasingly Interconnected IT/OT Environments
From Outage to Infiltration: Cybersecurity Risk and the Evolving Threat to Electrical Infrastructure
As electrical infrastructure modernizes, its vulnerabilities evolve in parallel. From substation automation to AI-powered grid management, today’s systems have developed from the isolated hardware of the past to converged digital ecosystems with data ...

Cyber Dashboards Are Making Boards Feel Safer…and That’s the Real Risk
Cyber dashboards could be driving complacency when it comes to cyber risk.
No results found.
In the News
Anomali Launches ThreatStream Next-Gen To Turn Intelligence Into Action, At The Speed Threats Demand
New release gives CTI teams deeper investigative power and SOC teams the decisioning layer to act on it — 300 times faster than traditional workflows, regardless of how they deploy
Extreme Solidifies Networking Leadership with Major Enhancements to Extreme Platform ONE
Morrisville, NC, May 5, 2026 – Extreme Networks, Inc. (Nasdaq: EXTR) today announced major advancements to Extreme Platform ONE™ including expanded third-party device management and integrated security, delivering a more intelligent, scalable, and secure enterprise networking solution. The platform is further enhanced with the introduction of Extreme ...
Infoblox Completes Axur Acquisition, Expands Preemptive Security to Stop External Threats at the Source
Infoblox, a leader in hybrid, multi-cloud networking and preemptive security, today announced it has completed its acquisition of Axur, a global provider of AI-powered external threat discovery and digital risk protection.
With the close of the acquisition, Infoblox expands its preemptive security capabilities to address a growing class of digital ...
Tanium Introduces Tanium Atlas to Transform IT and Security Operations for the Age of AI
New autonomous operating system brings real-time intelligence, guidance and action together in one experience
Genetec Urges Stronger Identity And Credential Governance For Physical Security Systems As AI Accelerates Cyber Risk
Ahead of World Password Day, Genetec warns that password changes alone are no longer enough to protect connected physical security environments
Sektor Expands Cybersecurity Portfolio With Semperis Distribution Agreement Across ANZ
Partnership strengthens identity security offering for partners amid rising threat landscape
DroneShield and Terma Sign Strategic MOU to Advance Layered Counter UAS Capabilities
DroneShield, a global leader in counter-drone technology solutions, along with Terma, a leading defence and aerospace company, announced the signing of a Memorandum of Understanding (MOU), to establish a strategic collaboration focused on advancing layered counter‑UAS capabilities. Both companies bring complementary, mission‑proven counter-UxS ...
Qualys Cloud Security Forecast 2026 Finds Cloud Risk is Scaling Through Design, Not Disruption
Qualys, Inc. (NASDAQ: QLYS), a leading provider of cloud-based IT, security and compliance solutions, has published its Cloud Security Forecast 2026 report, warning that cloud compromise is increasingly driven by how environments are designed and operated, rather than by novel attack techniques. The research signals a shift from exploit-driven breaches ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
- 353
- 354
- 355
- 356
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
