The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Tenable CEO and Chairman calls out Microsoft for unacceptable cybersecurity practices

Tenable CEO and Chairman calls out Microsoft for unacceptable cybersecurity practices

In a recent article, Amit Yoran, the Chairman and CEO of Tenable, criticised Microsoft for its cybersecurity practices. He mentioned that Senator Ron Wyden had written to various government agencies, urging them to hold Microsoft accountable for negligent cybersecurity practices that have allowed Chinese espionage against the US government. Data from ...
Doing more with less: the three key focus areas for cybersecurity

Doing more with less: the three key focus areas for cybersecurity

In an ever-evolving cybersecurity landscape, organisations face the daunting challenge of effectively managing their security initiatives. This responsibility falls not only on the IT teams, but also on the board of directors, who play a critical role in overseeing the organisation's cybersecurity strategy.
Bitdefender releases macOS Threat Landscape Report

Bitdefender releases macOS Threat Landscape Report

Bitdefender has revealed at Black Hat USA 2023 the macOS Threat Landscape Report, which looks at the top threats and trends targeting Apple’s macOS operating system over the duration of 12 months.
CrowdStrike 2023 Threat Hunting Report shows adversary breakout time falls to record low, technology companies most targeted in APJ region

CrowdStrike 2023 Threat Hunting Report shows adversary breakout time falls to record low, technology companies most targeted in APJ region

Adversaries took just 79 minutes, on average, to ‘breakout’ of their initial beach head into a victim’s system, with fastest recorded time being just seven minutes.
Poorly Purged Medical Devices Present Downstream Security Concerns When Sold on Secondary Market

Poorly Purged Medical Devices Present Downstream Security Concerns When Sold on Secondary Market

Rapid7, Inc., a leader in cloud risk and threat detection, has released a new research report that assesses the security implications from improper de-acquisition of infusion pumps to illustrate the importance of securing networks, applications, and devices.
API Security: Protecting Against Persistent Automated Attacks

API Security: Protecting Against Persistent Automated Attacks

As use of Application Programming Interfaces (APIs) within organisations of all sizes continues to increase, the approach taken to ensuring their security has changed.
Improving an Organisations Cyber Efficacy and Effectiveness

Improving an Organisations Cyber Efficacy and Effectiveness

While the capability of cybersecurity tools continues to rapidly increase, there is no room for complacency within the organisations deploying them.
Fastly Deploys Industry-Leading Threat Intelligence Capabilities to Publish Network Effect Threat Report                Fastly Deploys Industry-Leading Threat Intelligence Capabilities to Publish Network Effect Threat Report

Fastly Deploys Industry-Leading Threat Intelligence Capabilities to Publish Network Effect Threat Report Fastly Deploys Industry-Leading Threat Intelligence Capabilities to Publish Network Effect Threat Report

Fastly, Inc. (NYSE: FSLY), a leader in global edge cloud platforms, has announced the publication of its first threat intelligence report, the "Network Effect Threat Report".
No results found.

In The News

Long Road to Recovery: Fastly Research Reveals Australian and New Zealand Businesses Taking 19% Longer To Recover From Cybersecurity Incidents Than Expected

Long Road to Recovery: Fastly Research Reveals Australian and New Zealand Businesses Taking 19% Longer To Recover From Cybersecurity Incidents Than Expected

Organisations are reassessing their cybersecurity budget allocations after taking 5.9 months to recover from incidents in 2024 - over a month longer than expected
Unlock Proactive Defense: Microsoft Security Exposure Management Now Generally Available

Unlock Proactive Defense: Microsoft Security Exposure Management Now Generally Available

As the digital landscape grows increasingly interconnected, defenders face a critical challenge: the data and insights from various security tools are often siloed or, at best, loosely integrated. This fragmented approach makes it difficult to gain a holistic view of threats or assess their potential impact on critical assets. In a world where a single ...
Thales Expands CipherTrust Data Security Platform as-a-Service Offerings

Thales Expands CipherTrust Data Security Platform as-a-Service Offerings

CipherTrust Transparent Encryption helps organisations meet compliance mandates and protect data wherever it resides New Cloud Service includes Live Data Transformation for non-disruptive encryption and Ransomware Protection to monitor continuously for abnormal activity
Unveiling LIMINAL PANDA: A Closer Look at China’s Cyber Threats to the Telecom Sector

Unveiling LIMINAL PANDA: A Closer Look at China’s Cyber Threats to the Telecom Sector

On Tuesday, November 19, 2024, Adam Meyers, CrowdStrike Senior Vice President of Counter Adversary Operations, will testify in front of the U.S. Senate Judiciary Subcommittee on Privacy, Technology, and the Law on Chinese cyber threats to critical infrastructure. Within his testimony, Adam will speak publicly for the first time about a China-nexus ...
Genetec Expands Access Control Market Share And Solidifies Its Global Leadership Position, According To The Latest Omdia Report

Genetec Expands Access Control Market Share And Solidifies Its Global Leadership Position, According To The Latest Omdia Report

Genetec bolsters #2 global ranking with six consecutive years of organic growth
OpenText Launches New Partner Enterprise Learning Subscription

OpenText Launches New Partner Enterprise Learning Subscription

New program helps Partners build skills and gives customers confidence in their Partner choice 
The Dark Side of Domain-Specific Languages: Tenable Uncovers New Attack Techniques in Open Source Software

The Dark Side of Domain-Specific Languages: Tenable Uncovers New Attack Techniques in Open Source Software

Tenable, the exposure management company, has disclosed that its Tenable Cloud Security Research team has uncovered new attack techniques in Domain-Specific Languages (DSLs) of popular policy-as-code (PaC) and infrastructure-as-code (IaC) platforms. These can lead to compromised cloud identities, lateral movement, and data ...
OpenText Makes Multi-Cloud Work with Cloud Editions 24.4

OpenText Makes Multi-Cloud Work with Cloud Editions 24.4

 Next-generation cloud, security, AI-integrated innovations unveiled at OpenText World 2024  About OpenText OpenText, The Information Company™, enables organisations to gain insight through market leading information management solutions, powered by OpenText Cloud Editions. For more information about OpenText (NASDAQ: OTEX, TSX: OTEX) ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This