The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Asset Deployment and the Changing Face of Mining

Asset Deployment and the Changing Face of Mining

As an industry, mining has always been slow to adopt new ideas due to the enormous upfront investment in capital. It is clear, however, that new approaches are required to transform operations because of the pressure on margins and the need to extract raw materials more efficiently and cheaper than competitors. The mining sector is experiencing a ...
New BlackBerry Research Finds Australian Manufacturers Increasingly Wary of Nation State Threats

New BlackBerry Research Finds Australian Manufacturers Increasingly Wary of Nation State Threats

Two-thirds of Australian manufacturers believe their environment is too difficult to defend. 87% admit manufacturing functions are running on outdated and unsupported legacy operating systems.
Zscaler ThreatLabz Research Shows a Nearly 50% Increase in Phishing Attacks with Education, Finance, and Government Being the Most Targeted

Zscaler ThreatLabz Research Shows a Nearly 50% Increase in Phishing Attacks with Education, Finance, and Government Being the Most Targeted

Annual Phishing Report Highlights New and Evolving Phishing Campaigns Resulting from the Rise of AI Platforms, like ChatGPT, Urges Organisations to Adopt a Zero Trust Architecture
How MFA and Endpoint Security is Helping Firms Meet Cyber Insurance Demands

How MFA and Endpoint Security is Helping Firms Meet Cyber Insurance Demands

Amidst an environment of ever-increasing digital threats, growing numbers of organisations are turning to cyber insurance as a means of protecting against the fallout from attacks.
60% of Organisations Take Longer Than 4 Days To Resolve Security Issue, New Report from Palo Alto Networks Unit 42 Finds

60% of Organisations Take Longer Than 4 Days To Resolve Security Issue, New Report from Palo Alto Networks Unit 42 Finds

As cloud adoption continues to surge, with a projected market size of $830 billion in 2025, threat actors are increasingly targeting common vulnerabilities in the cloud.
Why SaaS Security Needs to Receive Constant Attention

Why SaaS Security Needs to Receive Constant Attention

ured by the promise of lower operating costs and improved flexibility, many businesses are continuing to increase their usage of software-as-a-service (SaaS) offerings.
Telecommunications Asset Deployments

Telecommunications Asset Deployments

The introduction of digital devices into just about everything we do is pervasive; smart vehicles, smart watches, smart homes, through to smart cities; IoT is already fundamentally reshaping our daily lives. The foundational infrastructure that allows the communication between devices and the collection of this data for processing and interpretation ...
F5 research reveals vast majority of A/NZ consumers unwilling to buy from companies post data leak

F5 research reveals vast majority of A/NZ consumers unwilling to buy from companies post data leak

F5’s latest Curve of Convenience report shows, in the event of a data leak, majority of A/NZ consumers are unwilling to continue buying from the company involved (71%). Most of A/NZ (89%) are not comfortable with tracking mechanisms in their digital usage.

In The News

Check Point Launches Horizon Playblocks: the Security Collaboration Platform that Eliminates Security Siloes and Stops Attacks from Spreading

Check Point Launches Horizon Playblocks: the Security Collaboration Platform that Eliminates Security Siloes and Stops Attacks from Spreading

Horizon Playblocks is a security collaboration platform that uses security products collaboratively to automate security operations across the network, in order to save time and resources
Spammers piggyback on the Israel-Gaza war to plunder donations

Spammers piggyback on the Israel-Gaza war to plunder donations

Bitdefender today released findings on Israel-Gaza war scams that started on the 13th of October, less than a week after Hamas attacked.
ECI Software Solutions cloud offerings build continued trust and business value for SMBs

ECI Software Solutions cloud offerings build continued trust and business value for SMBs

The global provider of cloud-based software joins the National Cybersecurity Alliance’s group of Cybersecurity Awareness Month Champion organisations
ManageEngine Rounds off Its Endpoint Protection Platform with the Addition of Next Generation Antivirus Capability

ManageEngine Rounds off Its Endpoint Protection Platform with the Addition of Next Generation Antivirus Capability

Capability added to Endpoint Central, its UEM Solution, to tackle the dynamic threat landscape
Trustwave SpiderLabs uncovers critical cybersecurity threats facing financial services industry

Trustwave SpiderLabs uncovers critical cybersecurity threats facing financial services industry

Trustwave, a leading cybersecurity and managed security services provider, has released comprehensive research shedding light on the distinctive cybersecurity risks facing financial services organisations.
CyberArk Launches New Capabilities for Securing Access to Cloud Workloads and Services as Part of Its Identity Security Platform

CyberArk Launches New Capabilities for Securing Access to Cloud Workloads and Services as Part of Its Identity Security Platform

Only CyberArk Provides the Right Level of Intelligent Privilege Controls to Enable Secure Access to Every Layer of Cloud Environments with Zero Standing Privileges
Check Point Launches Game-Changing SASE Solution: Delivering 2x Faster Internet Security

Check Point Launches Game-Changing SASE Solution: Delivering 2x Faster Internet Security

The leading Hybrid SASE solution combining on-device and cloud-based protections, delivering unprecedented SASE performance
Arctic Wolf announces intent to acquire Revelstoke to accelerate security operations efficiency and outcomes through automation and AI

Arctic Wolf announces intent to acquire Revelstoke to accelerate security operations efficiency and outcomes through automation and AI

Customers to benefit from tailored response actions, enhanced threat detection, and game changing noise reduction delivered by Revelstoke’s cutting-edge SOAR solution

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governements, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This