The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Hipster, Hacker & Hustler, meet Handler
Great, innovative teams are characterised by their ability to move quickly, iterate fast, and learn even faster. These teams can be found in startups, but they can also exist in larger organisations as multidisciplinary teams. Such teams are often made up of individuals who possess unique skills and expertise that complement each other.
5 Reasons Why You Shouldn’t Just Build the Solution
For most teams, the default mode is execution mode: build and deliver as soon as possible. However, when we are building something new, this way of operating can potentially lead to wasted time and missed opportunities. It is essential to get into exploration mode first and understand the problem in-depth before building a new solution.
From fluff to facts: how you can measure innovation
Innovation is a term that gets thrown around a lot, but what does it really mean? For me, innovation is implementing new ideas that bring value to people. You don't have to be a creative genius to be innovative - It's all about the context. What might be ordinary for startups could be groundbreaking for established corporations. Implementing these ...
3 Subtle Indicators of Major Innovation Blockers
Throughout my career, I've had the incredible opportunity to dive headfirst into many innovation projects. They ranged from strategic innovation projects to customer experience improvements, and from exploring new ways of working to executing human-centred automation solutions.
3 Ways to Get Everyone Onboard the Innovation Train
When it comes to innovation and introducing change in an organisation, some people instantly embrace the journey while others resist it.
Is Australia set to follow the UK, for banking liabilities?
As the digital world continues to dominate the banking industry, concerns about data security and privacy are coming to the forefront. As algorithms become more advanced, building a profile based on users data, and identifying abnormal transactions that could indicate fraudulent activity. This has led to concerns about privacy, as individuals feel like ...
I Have Been Attacked by Ransomware. What Should I Do Now?
Retro Blockbuster Plot: Sometime in the 1980s โ a filthy rich industrialist โ his beautiful daughter โ a constant target for kidnappers โ always accompanied by bodyguards โ one fateful day โ kidnapping succeeds โ hefty ransom asked โ her big strong bloke comes to rescue โ happy ending!Nah!! Kidnappers today have become very tech-savvy and, if I might ...
66% of Malware is Delivered Through PDFs, New Report from Palo Alto Networks Unit 42 Finds
Vulnerabilities continue to be a popular method for threat actors to infect victims, with exploit attempts of vulnerabilities increasing by 55% in the past year
In The News
Absolute Security Showcases Next Generation Cyber Resilience
Absolute Security Showcases Next Generation Cyber Resilience, which provides a new remote rehydration capability that automates recovery and remediation for ransomware, BSOD, and other disruptions
Armis Surpasses US$200M ARR, Doubling ARR in less than 18 months
Rapid Growth and Unmatched Scale Cements Armisโ Position as a Global Cybersecurity Leader, as it Continues Prep for IPO
Ransomware Groups Weaponise Stolen Data to Increase Pressure on Targets Who Refuse to Pay, Sophos Finds
Sophos today released a new dark web report, โTurning the Screws: The Pressure Tactics of Ransomware Gangs,โ which details how cybercriminals are weaponising stolen data to increase pressure on targets who refuse to pay. This includes sharing the contact details or doxing the family members of targeted CEOs and business owners, as well as threatening ...
Popular OT/IoT Router Firmware Images Contain Outdated Software and Exploitable N-Day Vulnerabilities Affecting the Kernel
Forescout and Finite State today announced today the release of a new report, โRough Around the Edges,โ that analyses the state of software supply chain in OT/IoT routers, which are essential for connecting critical devices across various environments to the internet. The research revealed that OT and IoT cellular routers, and others used in small ...
ColorTokens Lands & Expands In APAC Region with New Hires
Microsegmentation company establishes strong presence in APAC with key appointments across ASEAN and ANZ, with growth and global commitment to breach readiness.
SentinelOneยฎ Continues to Redefine End-to-End Security with Singularityโข Platform
Major new advancements delivered on secure-by-design, unified agent unleash power of industry-leading AI-security technology, turbocharging protection across every endpoint, identity and cloud workload
LAS VEGAS, NV - August 5, 2024 - SentinelOne ย (NYSE: S), a global leader in AI-powered security,ย today announced a series of groundbreaking ...
Arctic Wolf Expands Cyber JumpStart Portal Program to Help Business Leaders Fast-track Their Security Journey and Improve Insurability At No Cost
With the support of its global insurance community, Arctic Wolf opens Cyber JumpStart program directly to businesses to manage cyber risk and advance insurability and business resilience
Newgen Recognized in an Analyst Report on Task-Centric Automation Software Landscape
Newgen Software, a global provider of a unified low-code platform, announced that it has been acknowledged in Forrester's report, The Task-Centric Automation Software Landscape, Q3 2024, among notable vendors.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..