The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Nozomi Networks Labs Discovers Flaws in Energy and Industrial Machinery Protection Systems
Nozomi Networks has identified three vulnerabilities on the Bently Nevada 3500 rack model manufactured by Baker Hughes, a company that develops and deploys technology solutions for energy and industrial companies.
How deep is the depth of the deepfake?
Use of deepfakes has risen dramatically over the last two years. Weโve witnessed celebrities push back over their likeness being used to mock or embarrass. But it doesnโt stop there.
It’s been 12 Months since the Optus Breach. Now What?
Optus, an Australian telecommunications company, experienced a cyberattack last year on September 22, 2022. One of the most prominent breaches in Australian history. As a result, customers had their personal information stolen and leaked on the dark web. Outrage from customers and businesses was rampant across social media, in the media and of course ...
Why a supportive security culture will bolster disaster recovery efforts during a cyberattack
In today's complex and fast-moving threat landscape, cybercriminals continuously adapt their tactics to breach systems and gain access to sensitive data.
How purpose-built database security solutions ensure vulnerabilities arenโt overlooked
The perimeters of technological defences are shifting, andโin some casesโdisappearing altogether.
IT Trends Report 2023: Observability Advances Automation and Empowers Innovation, Yet Adoption Still in Early Stages
SolarWinds, the leading provider in software management solutions and observability serving 96% of the Fortune 500, has released its 10th annual IT Trends Report, detailing the impact observability solutions have on navigating challenges from digital transformation, moving to the cloud and remote workโboth within the IT department and beyond.
Automating evidence collection will improve your cloud incident response process
A primary concern of any security team is having the ability to respond to security events efficiently and in a timely manner, well before they are at risk of escalating. The lack of automation coupled with alert fatigue often leads to overlooked risk, where seemingly low-severity detections may actually be connected to something far more malicious. To ...
How Water Utilities can Boost Their Cybersecurity Resilience
Around the world, water utilities are fighting an increasing battle against a rapidly evolving foe. Cybercriminals are targeting supply infrastructure intent on causing disruption, confusion, and losses.
In The News
VAST Data Announces Amy Shapero as Companyโs First Chief Financial Officer
VAST Data today named Amy Shapero as its first ever Chief Financial Officer (CFO). As the company prepares for its next stage of growth, this strategic appointment will enable VAST to scale faster, better serve customers and further expand VASTโs global business while accelerating market adoption of the only data platform built for the AI ...
SentinelOneยฎ and Intezer Team to Simplify Reverse Engineering of Rust Malware
Companies developing methodology and open-source tools to tame complexities of complex language, empowering organizations to get and stay ahead of attackersย
LAS VEGAS, NV - Augustย 7, 2024 - SentinelOne ย (NYSE: S), a global leader in AI-powered security, and Intezer, a leader in AI-powered technology for autonomous security operations, today launched ...
SentinelOneยฎ Launches Singularityโข MDR
Full-scale service provides industryโs most complete expert coverage across entire enterprise, helping companies efficiently and effectively scale their security operations to defend against modern threats
LAS VEGAS, NV โ August 6, 2024 - SentinelOne ย (NYSE: S), a global leader in AI-powered security, today announced the general availability of ...
Fortinet reports second quarter 2024 financial results
Record quarterly generally accepted accounting principles (GAAP) and non-GAAP operating margins.
Raises 2024 revenue and non-GAAP operating margin guidance.
Continuing to invest in the fast-growing unified secure access service edge (SASE) and security operations markets.
Second quarter 2024 highlights
Total revenue of US$1.43 billion, up ...
Microsoft Strengthens Phishing-Resistant Security For Entra ID With FIDO2 Provisioning APIs
Yubico hasย worked closelyย with Microsoft for over a decade to keep businesses around the world and the Microsoft solutions they use both secure and phishing-resistant. Recognising the importance of multi-factor authentication (MFA), Microsoft recentlyย mandatedย that MFA be used by all Azure users โ a critical move to require stronger authentication for ...
Cloudian and Supermicro Come Together to Enhance AI Infrastructure
Cloudian and Supermicro today announced a strategic collaboration to deliver a groundbreaking data management solution designed to simplify and accelerate large-scale AI implementations. This comprehensive solution integrates exabyte-scalable storage and GPU-based computing to accelerate and simplify AI deployment in data-intensive use cases such as ...
Camelot Secureโs Myrddin (Cybersecurity Maturity Model Certification (CMMC) Bot Assistant) Wins 2024 CSO Award
In its second year of being recognized by the CSO Awards program, Camelot was honored for Myrddin, which integrates Natural Language Processing (NLP) technologies and the latest AI Generative Pretrained Transformer (GPT) to assist IT personnel in conducting CMMC gap assessments in a secure environment.
60 Hurts per Second โ How We Got Access to Enough Solar Power to Run the United States
The electricity grid โ the buzzing, crackling marvel that supplies the lifeblood of modernity โ is by far the largest structure humanity ever built. Itโs so big, in fact, that few people even notice it, like a fish canโt see the ocean.
Until the grid goes down, that is. Then, like the fish dangling from the anglerโs hook, we see our ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..