The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Hipster, Hacker & Hustler, meet Handler
Great, innovative teams are characterised by their ability to move quickly, iterate fast, and learn even faster. These teams can be found in startups, but they can also exist in larger organisations as multidisciplinary teams. Such teams are often made up of individuals who possess unique skills and expertise that complement each other.
5 Reasons Why You Shouldn’t Just Build the Solution
For most teams, the default mode is execution mode: build and deliver as soon as possible. However, when we are building something new, this way of operating can potentially lead to wasted time and missed opportunities. It is essential to get into exploration mode first and understand the problem in-depth before building a new solution.
From fluff to facts: how you can measure innovation
Innovation is a term that gets thrown around a lot, but what does it really mean? For me, innovation is implementing new ideas that bring value to people. You don't have to be a creative genius to be innovative - It's all about the context. What might be ordinary for startups could be groundbreaking for established corporations. Implementing these ...
3 Subtle Indicators of Major Innovation Blockers
Throughout my career, I've had the incredible opportunity to dive headfirst into many innovation projects. They ranged from strategic innovation projects to customer experience improvements, and from exploring new ways of working to executing human-centred automation solutions.
3 Ways to Get Everyone Onboard the Innovation Train
When it comes to innovation and introducing change in an organisation, some people instantly embrace the journey while others resist it.
Is Australia set to follow the UK, for banking liabilities?
As the digital world continues to dominate the banking industry, concerns about data security and privacy are coming to the forefront. As algorithms become more advanced, building a profile based on users data, and identifying abnormal transactions that could indicate fraudulent activity. This has led to concerns about privacy, as individuals feel like ...
I Have Been Attacked by Ransomware. What Should I Do Now?
Retro Blockbuster Plot: Sometime in the 1980s โ a filthy rich industrialist โ his beautiful daughter โ a constant target for kidnappers โ always accompanied by bodyguards โ one fateful day โ kidnapping succeeds โ hefty ransom asked โ her big strong bloke comes to rescue โ happy ending!Nah!! Kidnappers today have become very tech-savvy and, if I might ...
66% of Malware is Delivered Through PDFs, New Report from Palo Alto Networks Unit 42 Finds
Vulnerabilities continue to be a popular method for threat actors to infect victims, with exploit attempts of vulnerabilities increasing by 55% in the past year
In The News
Fortinet reports second quarter 2024 financial results
Record quarterly generally accepted accounting principles (GAAP) and non-GAAP operating margins.
Raises 2024 revenue and non-GAAP operating margin guidance.
Continuing to invest in the fast-growing unified secure access service edge (SASE) and security operations markets.
Second quarter 2024 highlights
Total revenue of US$1.43 billion, up ...
Microsoft Strengthens Phishing-Resistant Security For Entra ID With FIDO2 Provisioning APIs
Yubico hasย worked closelyย with Microsoft for over a decade to keep businesses around the world and the Microsoft solutions they use both secure and phishing-resistant. Recognising the importance of multi-factor authentication (MFA), Microsoft recentlyย mandatedย that MFA be used by all Azure users โ a critical move to require stronger authentication for ...
Cloudian and Supermicro Come Together to Enhance AI Infrastructure
Cloudian and Supermicro today announced a strategic collaboration to deliver a groundbreaking data management solution designed to simplify and accelerate large-scale AI implementations. This comprehensive solution integrates exabyte-scalable storage and GPU-based computing to accelerate and simplify AI deployment in data-intensive use cases such as ...
Camelot Secureโs Myrddin (Cybersecurity Maturity Model Certification (CMMC) Bot Assistant) Wins 2024 CSO Award
In its second year of being recognized by the CSO Awards program, Camelot was honored for Myrddin, which integrates Natural Language Processing (NLP) technologies and the latest AI Generative Pretrained Transformer (GPT) to assist IT personnel in conducting CMMC gap assessments in a secure environment.
60 Hurts per Second โ How We Got Access to Enough Solar Power to Run the United States
The electricity grid โ the buzzing, crackling marvel that supplies the lifeblood of modernity โ is by far the largest structure humanity ever built. Itโs so big, in fact, that few people even notice it, like a fish canโt see the ocean.
Until the grid goes down, that is. Then, like the fish dangling from the anglerโs hook, we see our ...
Fortinet Enhances The Industryโs Most Comprehensive Operational Technology Security Platform To Protect Cyber-Physical Systems
Updates across the Fortinet OT security platform include new ruggedised appliances, advanced secure networking and security operations capabilities, and expanded partnerships with leading OT vendors
2024 Qualys Midyear Threat Landscape Review
According to the Qualys 2024 Midyear Threat Landscape Review:
The number of reported Common Vulnerabilities and Exposures (CVEs) rose by 30% in the last year to 22,254. These numbers reflect rising software complexity and the broader use of technology, necessitating advanced and dynamic vulnerability management strategies to mitigate evolving ...
Rapid7 Ransomware Radar Report Charts Ransomware Group Activity and Methodologies for Fresh Insights
New research from Rapid7 analyses more than 70 active ransomware groups, 21 of which were new in 2024. The Ransomware Radar Report provides a fresh perspective on the globalย ransomware threat by analysing, comparing, and contrasting attacker activity and techniques over an 18-month period ending June 30, 2024.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..