The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

No results found.

In The News

Open source software: A pillar of modern software development

Open source software: A pillar of modern software development

Todayโ€™s modern software applications simply would not exist, or be as powerful, without the use of open source software (OSS). Developers design open source software with source code that is accessible for anyone to use, modify, and learn from, and they release the code with specific licensing rights.
CSO Group Hires one of Governmentโ€™s Top CISOs

CSO Group Hires one of Governmentโ€™s Top CISOs

Government and financial services security veteran Matthew Fedele-Sirotich joins Australian-owned Cyber Security Company
ChatGPT May Already Be Used In Nation State Cyberattacks, Say IT Decision Makers in BlackBerry Global Research

ChatGPT May Already Be Used In Nation State Cyberattacks, Say IT Decision Makers in BlackBerry Global Research

51% of IT decision makers believe there will be a successful cyberattack credited to ChatGPT within the year and 95% believe governments have a responsibility to regulate advanced technologies, such as ChatGPT
Zscaler Introduces Industryโ€™s First Cloud Resilience Capabilities for SSE to Ensure Nonstop Cloud Security Operations

Zscaler Introduces Industryโ€™s First Cloud Resilience Capabilities for SSE to Ensure Nonstop Cloud Security Operations

Zscaler Resilience Extends the Flexibility of Zscalerโ€™s Cloud Platform and Preserves Interconnections to Any App for Rapid Recovery from Unforeseen Events and Attacks
Afterpay reduces fraud risk with Cloudera while managing data at scale

Afterpay reduces fraud risk with Cloudera while managing data at scale

Cloudera Data Platform provides speed and scalability to align with business growth; ability to ingest data increases by 8-fold with its 3.6 million customers in 12 months
Finding hard-coded secrets before you suffer a breach

Finding hard-coded secrets before you suffer a breach

Hard-coded secrets include any type of sensitive information, such as usernames, passwords, SSH keys, and access tokens.
Rapid7 Releases Metasploit Framework 6.3

Rapid7 Releases Metasploit Framework 6.3

Rapid7 has released Metasploit Framework 6.3, which adds native support for Kerberos authentication, incorporates new modules to conduct a wide range of Active Directory attacks, and simplifies complex workflows to support faster and more intuitive security testing.
Absolute Software Named a Leader in the Winter 2023 G2 Grid Reports for Endpoint Management and Zero Trust Networking

Absolute Software Named a Leader in the Winter 2023 G2 Grid Reports for Endpoint Management and Zero Trust Networking

Absolute Software, the only provider of self-healing, intelligent security solutions, today announced that it has been named a Leader in the Winter 2023 Gridยฎ Reports for Endpoint Management and Zero Trust Networking published by G2, the world's largest and most trusted software marketplace.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This