The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Data Transfer Secrets Revealed

Data Transfer Secrets Revealed

From the battlefields of war to the boardrooms of civilian enterprises, Antony Reynolds, Vice President of Federal and National Security at Bridgeworks, or "Tony" as I’ve come to know him, delivers revelations on the technology transforming data transfer from a sluggish chore to a lightning-fast marvel. Reynolds’ belief and metaphor he goes by is: ...
Make CNAPP Decisions To Stay Ahead Of Cloud Threats

Make CNAPP Decisions To Stay Ahead Of Cloud Threats

Cloud-Native Application Protection Platforms (CNAPPs) are a game changer in cloud security. CNAPPs are rapidly becoming the central nervous system of cloud defence, offering businesses a comprehensive solution to manage risk in today’s fast-changing digital environment.
The Unseen Powerhouse: 2020Partners

The Unseen Powerhouse: 2020Partners

As far as cybersecurity networks go, 2020Partners stands out—a private, non-commercial coalition of senior security professionals transcending conventional borders and limitations. Greg Sim is the Founding Partner of 2020Partners and the pioneer behind this exclusive network. "It’s not even a non-profit," Greg commented, referring to the networks ...
How Mobile Devices Became the Bad Guys’ Favourite Weapon

How Mobile Devices Became the Bad Guys’ Favourite Weapon

Everyone is glued to their mobile devices, sinister cyber threats lurk beneath those sleek screens, waiting to exploit our casual scrolling and innocent application installations. According to Jeff Lindholm, Chief Revenue Officer at Lookout Technologies, our beloved smartphones and tablets are digital best friends - but most are unware their risks that ...
Protecting Data from Ransomware: The Power of Advanced Encryption

Protecting Data from Ransomware: The Power of Advanced Encryption

Ransomware attacks have become a pressing threat to businesses worldwide, with their potential to encrypt sensitive data and hold organisations hostage. While many focus on preventing such attacks, the ability to mitigate their consequences is equally crucial. This article explores how advanced encryption techniques, including quantum-powered ...
Tackling Takedowns – How To Mitigate Risks of Fake Domains

Tackling Takedowns – How To Mitigate Risks of Fake Domains

As cyber threat actors continue to leverage more and more sophistication in phishing attacks and other cases of fraud targeting customers and consumers, organisations need to take proactive steps to stay ahead and be ready to respond when those threats are identified.
Oracle Cloud – The Late Bloomer

Oracle Cloud – The Late Bloomer

For years, the tech behemoth Oracle stood in the shadows of cloud giants like Amazon and Microsoft. But now, with their second-gen Oracle Cloud Infrastructure (OCI), Oracle is rewriting the cloud playbook. Oracle is far more than just the database company as most people would have memories of.Mahesh Thiagarajan, Executive Vice President of OCI, whose ...
The Invisible Siege on Our Supply Chain

The Invisible Siege on Our Supply Chain

Daniel Churches, Sales Director at ColorTokens, a captain in breach readiness and containment, lifts the veil on the precarious state of cybersecurity today. "When I say breach readiness, I speak from a place of inevitability," Churches states. The reality is that breaches aren’t just possible; they’re practically guaranteed. "A breach is likely ...
No results found.

In The News

Qualys Honored with Dual Win at Prestigious Pwnie Awards for Groundbreaking Cybersecurity Research

Qualys Honored with Dual Win at Prestigious Pwnie Awards for Groundbreaking Cybersecurity Research

Wins for Epic Achievement and Best RCE spotlight Qualys’ industry-leading research into critical OpenSSH vulnerabilities, reinforcing its leadership in global cybersecurity innovation
Tenable Jailbreaks OpenAI’s GPT-5 Within 24 Hours, Bypassing New Safety Features

Tenable Jailbreaks OpenAI’s GPT-5 Within 24 Hours, Bypassing New Safety Features

Just 24 hours after OpenAI launched its highly anticipated GPT−5 model with promises of “significantly more sophisticated” prompt safety, exposure management company Tenable has successfully jailbroken the platform, compelling it to provide detailed instructions on how to build a Molotov cocktail. On August 7, 2025, OpenAI unveiled GPT−5, touting its ...
Fortinet Enhances FortiRecon to Align With Continuous Threat Exposure Management Framework to Help Organisations Stay Ahead of Threats

Fortinet Enhances FortiRecon to Align With Continuous Threat Exposure Management Framework to Help Organisations Stay Ahead of Threats

New features integrate attack surface management, threat intelligence, and security orchestration to help security teams reduce risk faster and more proactively
Genetec Continues To Dominate Video Surveillance Software Market, According To Latest Analyst Reports

Genetec Continues To Dominate Video Surveillance Software Market, According To Latest Analyst Reports

Growing SaaS adoption and customer demand for flexible, open solutions strengthen company’s continued market leadership.
Trend Micro Launches Agentic SIEM to Herald New Era of Proactive Security

Trend Micro Launches Agentic SIEM to Herald New Era of Proactive Security

SYDNEY, August 13, 2025 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced new agentic AI technology designed to solve the traditional pain points associated with Security Information and Event Management (SIEM). When combined with Trend’s digital twin capabilities it will help to transform security ...
Elastic Introduces Logs Essentials: Serverless Log Analytics, in a New Low-priced Tier

Elastic Introduces Logs Essentials: Serverless Log Analytics, in a New Low-priced Tier

Site reliability engineers and developers gain access to powerful log analytics without the overhead of managing Elastic Stack
New Dragos Report Estimates Over $300 Billion in Potential Global OT Cyber Risk Exposure

New Dragos Report Estimates Over $300 Billion in Potential Global OT Cyber Risk Exposure

A new industry study has quantified the potential global financial impact of operational technology (OT) cyber incidents at up to US $329.5 billion in a severe but plausible scenario, with business interruption losses accounting for more than half that amount.
Rapid7 Access Brokers Report: New Research Reveals Depth of Compromise in Access Broker Deals, with 71% Offering Privileged Access

Rapid7 Access Brokers Report: New Research Reveals Depth of Compromise in Access Broker Deals, with 71% Offering Privileged Access

New research into underground cybercrime markets has revealed that “initial” access sold by brokers often represents a deep compromise, with 71% of listings offering privileged credentials and, in some cases, multiple access vectors bundled together.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This