The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

5 Reasons Why You Shouldn’t Just Build the Solution

5 Reasons Why You Shouldn’t Just Build the Solution

For most teams, the default mode is execution mode: build and deliver as soon as possible. However, when we are building something new, this way of operating can potentially lead to wasted time and missed opportunities. It is essential to get into exploration mode first and understand the problem in-depth before building a new solution.
From fluff to facts: how you can measure innovation

From fluff to facts: how you can measure innovation

Innovation is a term that gets thrown around a lot, but what does it really mean? For me, innovation is implementing new ideas that bring value to people. You don't have to be a creative genius to be innovative - It's all about the context. What might be ordinary for startups could be groundbreaking for established corporations. Implementing these ...
3 Subtle Indicators of Major Innovation Blockers

3 Subtle Indicators of Major Innovation Blockers

Throughout my career, I've had the incredible opportunity to dive headfirst into many innovation projects. They ranged from strategic innovation projects to customer experience improvements, and from exploring new ways of working to executing human-centred automation solutions.
3 Ways to Get Everyone Onboard the Innovation Train

3 Ways to Get Everyone Onboard the Innovation Train

When it comes to innovation and introducing change in an organisation, some people instantly embrace the journey while others resist it.
Is Australia set to follow the UK, for banking liabilities?

Is Australia set to follow the UK, for banking liabilities?

As the digital world continues to dominate the banking industry, concerns about data security and privacy are coming to the forefront. As algorithms become more advanced, building a profile based on users data, and identifying abnormal transactions that could indicate fraudulent activity. This has led to concerns about privacy, as individuals feel like ...
I Have Been Attacked by Ransomware. What Should I Do Now?

I Have Been Attacked by Ransomware. What Should I Do Now?

Retro Blockbuster Plot: Sometime in the 1980s – a filthy rich industrialist – his beautiful daughter – a constant target for kidnappers – always accompanied by bodyguards – one fateful day – kidnapping succeeds – hefty ransom asked – her big strong bloke comes to rescue – happy ending!Nah!! Kidnappers today have become very tech-savvy and, if I might ...
66% of Malware is Delivered Through PDFs, New Report from Palo Alto Networks Unit 42 Finds

66% of Malware is Delivered Through PDFs, New Report from Palo Alto Networks Unit 42 Finds

Vulnerabilities continue to be a popular method for threat actors to infect victims, with exploit attempts of vulnerabilities increasing by 55% in the past year
How Safe are bit.ly (or Tiny URL) Links?

How Safe are bit.ly (or Tiny URL) Links?

What are shortened or tiny URLs?In the world of shortcuts, how could URLs stay behind. With domain names getting stranger and web links getting obnoxiously longer, tiny URLs come to the rescue. These are like capsule covers that make medicines easy to digest. Usually web addresses are attached with a lot of information (called query string) that helps ...

In The News

ExtraHop® Launches Zero Trust Extension for Netskope

ExtraHop® Launches Zero Trust Extension for Netskope

Introduces security service edge (SSE) integration to expand visibility across remote and distributed environments amid zero trust transformations
With up to 43% of cyberattacks targeting small businesses, the Qualys solution is a SMB- and SME-focused package offering vulnerability, patch and EDR capabilities in AWS Marketplace

With up to 43% of cyberattacks targeting small businesses, the Qualys solution is a SMB- and SME-focused package offering vulnerability, patch and EDR capabilities in AWS Marketplace

Qualys, Inc. (NASDAQ: QLYS), -- Qualys, Inc. (NASDAQ: QLYS), a pioneer and leading provider of disruptive cloud-based IT, security, and compliance solutions, today announced the availability of its award-winning VMDR TruRisk, FixIT and ProtectIT capabilities in AWS Marketplace priced and packaged for small-to-medium sized businesses (SMBs) and ...
Prolific Puma: Shadowy Link Shortening Service Enables Cybercrime

Prolific Puma: Shadowy Link Shortening Service Enables Cybercrime

SYDNEY, 1 November 2023 – Halloween might be the spookiest time of the year, but threat actors are doing frightening things on the internet every day. In the past month we have introduced two terms: Domain Name System (DNS) threat actors and RDGA (registered domain generation algorithm). We also gave a taste of one type of DNS threat actor, the ...
Cloudian Signs New A/NZ Partners as Data Immutability Demand Escalates

Cloudian Signs New A/NZ Partners as Data Immutability Demand Escalates

Hybrid cloud data management company signs six A/NZ partners as demand for object storage, data immutability rises on the back of ransomware attacks
NodeStealer attacks on Facebook take a provocative turn – threat actors deploy malvertising campaigns to hijack users’ accounts

NodeStealer attacks on Facebook take a provocative turn – threat actors deploy malvertising campaigns to hijack users’ accounts

Bitdefender Labs has been monitoring the growing trend among cybercriminals who actively exploit social media networks for malvertising.
Cado Security Launches Incident Response Preparedness with New Readiness Dashboard

Cado Security Launches Incident Response Preparedness with New Readiness Dashboard

Cloud forensics and incident response company introduces new product features to enable organisations to embrace a proactive approach to incident response in the cloud
TeamViewer adds additional security and productivity features for its enterprise connectivity solution TeamViewer Tensor in latest major update

TeamViewer adds additional security and productivity features for its enterprise connectivity solution TeamViewer Tensor in latest major update

TeamViewer, a leading global provider of remote connectivity and workplace digitalisation solutions, has announced a major update of its enterprise connectivity solution TeamViewer Tensor, supporting information technology (IT) departments in maintaining business-critical equipment. With leading compatibility, security and performance, TeamViewer ...
Check Point Software Technologies Enhances Infinity Global Services with New Managed Security Capabilities

Check Point Software Technologies Enhances Infinity Global Services with New Managed Security Capabilities

Check Point's Security Services serve 2,400 global enterprises, guiding them through the complexities of cyber resilience in the face of escalating cybersecurity threats and expanding skills shortage

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governements, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This