The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Quality over Quantity: Algorithmic Transparency, accountability and Intellectual Property- A Call for Explainable AI

Quality over Quantity: Algorithmic Transparency, accountability and Intellectual Property- A Call for Explainable AI

Our society is populated by artificial entities known as the programmable race. While their presence is often apparent, comprehension sometimes takes a back seat. They serve us in customer service roles, engage with us in video games, and inundate our personalised social media feeds. Today, they have even infiltrated our financial lives, using AI tools ...
How CIAM Platforms Improve Customer Privacy and Security

How CIAM Platforms Improve Customer Privacy and Security

As consumers undertake a growing proportion of transactions online, awareness is increasing of the need to have both strong security and privacy protection-measures in place. Businesses that can tick these boxes will find it much easier to attract and retain customers.
Secure Code Warrior to Host 3rd Annual Devlympics Competition

Secure Code Warrior to Host 3rd Annual Devlympics Competition

Held during Cybersecurity Awareness Month, global tournament enables DevOps community to test their skills against vulnerabilities
Nozomi Networks Labs Discovers Flaws in Energy and Industrial Machinery Protection Systems

Nozomi Networks Labs Discovers Flaws in Energy and Industrial Machinery Protection Systems

Nozomi Networks has identified three vulnerabilities on the Bently Nevada 3500 rack model manufactured by Baker Hughes, a company that develops and deploys technology solutions for energy and industrial companies.
How deep is the depth of the deepfake?

How deep is the depth of the deepfake?

Use of deepfakes has risen dramatically over the last two years. Weโ€™ve witnessed celebrities push back over their likeness being used to mock or embarrass. But it doesnโ€™t stop there.
It’s been 12 Months since the Optus Breach.  Now What?

It’s been 12 Months since the Optus Breach. Now What?

Optus, an Australian telecommunications company, experienced a cyberattack last year on September 22, 2022. One of the most prominent breaches in Australian history. As a result, customers had their personal information stolen and leaked on the dark web. Outrage from customers and businesses was rampant across social media, in the media and of course ...
Why a supportive security culture will bolster disaster recovery efforts during a cyberattack

Why a supportive security culture will bolster disaster recovery efforts during a cyberattack

In today's complex and fast-moving threat landscape, cybercriminals continuously adapt their tactics to breach systems and gain access to sensitive data.
How purpose-built database security solutions ensure vulnerabilities arenโ€™t overlooked

How purpose-built database security solutions ensure vulnerabilities arenโ€™t overlooked

The perimeters of technological defences are shifting, andโ€”in some casesโ€”disappearing altogether.

In The News

Check Point Software Named a Leader in GigaOm Radar for Security Policy as Code

Check Point Software Named a Leader in GigaOm Radar for Security Policy as Code

Built for the Modern CISO, Check Point's CloudGuard is recognised for delivering a cohesive approach to protecting cloud infrastructures, from code to cloud
Rapid7 Named a Leader in IDC MarketScape for Worldwide SIEM for SMB

Rapid7 Named a Leader in IDC MarketScape for Worldwide SIEM for SMB

Rapid7 has been positioned as a Leader in the IDC MarketScape: Worldwide SIEM for SMB 2024. SIEM technology often sits at the heart of the security operations centre (SOC) as it is core to compliance, monitoring, threat detection, and incident response across the attack surface.
Tenable Patch Tuesday Comments

Tenable Patch Tuesday Comments

This month, Microsoft patched two zero-day vulnerabilities that can bypass security features in Microsoft Office and Windows Mark of the Web. Both vulnerabilities were exploited in the wild, though specifics about these attacks were not publicly disclosed, though given the prevalence of Microsoft Office and Windows Mark of the Web, these ...
Trustwave’s 2024 Financial Services Threat Reports Highlight Alarming Trends In Insider Threats And Phishing-As-A-Service

Trustwave’s 2024 Financial Services Threat Reports Highlight Alarming Trends In Insider Threats And Phishing-As-A-Service

September 11, 2024โ€ฏโ€“โ€ฏTrustwave, a leading cybersecurity and managed security services provider, has released aโ€ฏseries of reportsโ€ฏdetailing the threats facing the financial services sector, marking the second year of its ongoing research into these critical security issues. In its annual research, Trustwave SpiderLabs highlights the unique factors at ...
Ping Identity Named a Leader in KuppingerColeโ€™s Passwordless for Enterprises Leadership Compass

Ping Identity Named a Leader in KuppingerColeโ€™s Passwordless for Enterprises Leadership Compass

DENVER, September 10, 2024 โ€” Ping Identity, a leading provider of seamless and secure digital experiences, has been named an Overall Leader in the 2024 KuppingerCole Leadership Compass report on Passwordless Authentication for Enterprises. The report explores workforce-focused passwordless authentication technologies and shares guidance on the most ...
Tenable Introduces AI Aware: A Groundbreaking Proactive Security Solution for AI and Large Language Models

Tenable Introduces AI Aware: A Groundbreaking Proactive Security Solution for AI and Large Language Models

Tenableยฎ, the exposure management company, today announced the release of AI Aware, advanced detection capabilities designed to rapidly surface artificial intelligence solutions, vulnerabilities and weaknesses available in Tenable Vulnerability Management, the worldโ€™s #1 vulnerability management solution. Tenable AI Aware provides exposure insight into ...
KBI.Media to Cover NetApp INSIGHT 2024 in Las Vegas – Exploring the Future of Intelligent Data Infrastructure and the AI Advantage

KBI.Media to Cover NetApp INSIGHT 2024 in Las Vegas – Exploring the Future of Intelligent Data Infrastructure and the AI Advantage

KBI.Media to Cover NetApp INSIGHT 2024 in Las Vegas
Elastic Joins The Content Authenticity Initiative To Combat Digital Misinformation

Elastic Joins The Content Authenticity Initiative To Combat Digital Misinformation

Elastic, the Search AI Company, announced it has joined theย Content Authenticity Initiativeย (CAI.) Through its participation, Elastic will help combat digital misinformation, and promote transparency and authenticity across AI-generated content. "In today's digital wild west, content authenticity is essential,โ€ saidย Carolyn Herzog, chief legal ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This