The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

66% of Malware is Delivered Through PDFs, New Report from Palo Alto Networks Unit 42 Finds

66% of Malware is Delivered Through PDFs, New Report from Palo Alto Networks Unit 42 Finds

Vulnerabilities continue to be a popular method for threat actors to infect victims, with exploit attempts of vulnerabilities increasing by 55% in the past year
How Safe are bit.ly (or Tiny URL) Links?

How Safe are bit.ly (or Tiny URL) Links?

What are shortened or tiny URLs?In the world of shortcuts, how could URLs stay behind. With domain names getting stranger and web links getting obnoxiously longer, tiny URLs come to the rescue. These are like capsule covers that make medicines easy to digest. Usually web addresses are attached with a lot of information (called query string) that helps ...
How to remove the roadblocks to going passwordless

How to remove the roadblocks to going passwordless

The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity
How to remove the roadblocks to going passwordless

How to remove the roadblocks to going passwordless

The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity
How to protect against double-extortion ransomware attacks

How to protect against double-extortion ransomware attacks

Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
How to protect against double-extortion ransomware attacks

How to protect against double-extortion ransomware attacks

Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
Insikt Report – Deepfakes : I Have No Mouth, And I Must Do Crime

Insikt Report – Deepfakes : I Have No Mouth, And I Must Do Crime

Intelligence company Recorded Future today released the findings of its latest deepfakes research. Titled “I Have No Mouth, And I Must Do Crime”, the report looks at how the spread of deepfake technologies, specifically through advancements in AI-based voice cloning, is pushing scams to a new level.
Shadow API Usage Surges 900%, Revealing Alarming Lack of API Visibility Among Enterprise

Shadow API Usage Surges 900%, Revealing Alarming Lack of API Visibility Among Enterprise

New Research Highlights APIs are Now a Leading Attack Vector, Posing New and Significant Threats to Organisation

In The News

WatchGuard Supercharges Australian Partner Momentum with Senior Victoria and Tasmania Partner Relationship Manager Appointment

WatchGuard Supercharges Australian Partner Momentum with Senior Victoria and Tasmania Partner Relationship Manager Appointment

Channel partner appointment reinforces company commitment to serving strategic partners, including Managed Security Service Providers (MSSPs), resellers, integrators, and technology partners.
New Synopsys Report Finds 74% of Codebases Contained High-Risk Open Source Vulnerabilities, Surging 54% Since Last Year

New Synopsys Report Finds 74% of Codebases Contained High-Risk Open Source Vulnerabilities, Surging 54% Since Last Year

The Computer Hardware and Semiconductors industry contained the most open source vulnerabilities classified as high risk, followed by Manufacturing, Industrials and Robotics
Streamline PyTorch Machine Learning Workflows with Cloudian and AWS Hybrid Edge

Streamline PyTorch Machine Learning Workflows with Cloudian and AWS Hybrid Edge

Cloudian has announced an open-source software contribution that fuses PyTorch, the widely acclaimed machine learning library, with local Cloudian HyperStore S3-compatible storage solutions. This pioneering development is set to accelerate machine learning workflows by allowing PyTorch users on AWS Hybrid Edge solutions to directly access local data ...
Akamai Extending Industry-Leading Segmentation Solution to Hybrid Cloud Environments

Akamai Extending Industry-Leading Segmentation Solution to Hybrid Cloud Environments

Akamai Guardicore Segmentation is available first to public-cloud customers via Microsoft Azure Marketplace
Genetec Unveils New Office And State-Of-The-Art Experience Centre In Sydney, Australia

Genetec Unveils New Office And State-Of-The-Art Experience Centre In Sydney, Australia

New Experience Centre supports the company's expanding footprint In the ANZ region.
NinjaOne® and SentinelOne® Launch Joint Integration to Enhance Risk Mitigation and IT Security

NinjaOne® and SentinelOne® Launch Joint Integration to Enhance Risk Mitigation and IT Security

New solution provides comprehensive endpoint control in one centralised view and single-click visibility, protection, and response, revolutionising endpoint protection
Ping Identity Named an Overall Leader in 2024 KuppingerCole Identity Fabrics Leadership Compass

Ping Identity Named an Overall Leader in 2024 KuppingerCole Identity Fabrics Leadership Compass

Ping Identity has announced that the company has been named an Overall leader in the 2024 KuppingerCole Leadership Compass for Identity Fabrics
Redefining Cybersecurity: Check Point Unveils Quantum Force Gateway Series – The Ultimate AI-Powered Cloud – Delivered Security Solution

Redefining Cybersecurity: Check Point Unveils Quantum Force Gateway Series – The Ultimate AI-Powered Cloud – Delivered Security Solution

Quantum Force sets new standards with unmatched Threat Prevention, superior efficiency, and seamless management for the digital age, empowering businesses of all sizes with Next-Generation Firewall technology

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This