The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How Businesses Today can Prevent Advanced Cyber Threats

How Businesses Today can Prevent Advanced Cyber Threats

In recent years workforces have become increasingly mobile, with employees using laptops at home, airports, cafes etc. Then, with the onset of COVID-19, the number of people accessing corporate resources from devices outside the corporate network increased enormously.
Tenable CEO and Chairman calls out Microsoft for unacceptable cybersecurity practices

Tenable CEO and Chairman calls out Microsoft for unacceptable cybersecurity practices

In a recent article, Amit Yoran, the Chairman and CEO of Tenable, criticised Microsoft for its cybersecurity practices. He mentioned that Senator Ron Wyden had written to various government agencies, urging them to hold Microsoft accountable for negligent cybersecurity practices that have allowed Chinese espionage against the US government. Data from ...
Doing more with less: the three key focus areas for cybersecurity

Doing more with less: the three key focus areas for cybersecurity

In an ever-evolving cybersecurity landscape, organisations face the daunting challenge of effectively managing their security initiatives. This responsibility falls not only on the IT teams, but also on the board of directors, who play a critical role in overseeing the organisation's cybersecurity strategy.
Bitdefender releases macOS Threat Landscape Report

Bitdefender releases macOS Threat Landscape Report

Bitdefender has revealed at Black Hat USA 2023 the macOS Threat Landscape Report, which looks at the top threats and trends targeting Apple’s macOS operating system over the duration of 12 months.
CrowdStrike 2023 Threat Hunting Report shows adversary breakout time falls to record low, technology companies most targeted in APJ region

CrowdStrike 2023 Threat Hunting Report shows adversary breakout time falls to record low, technology companies most targeted in APJ region

Adversaries took just 79 minutes, on average, to ‘breakout’ of their initial beach head into a victim’s system, with fastest recorded time being just seven minutes.
Poorly Purged Medical Devices Present Downstream Security Concerns When Sold on Secondary Market

Poorly Purged Medical Devices Present Downstream Security Concerns When Sold on Secondary Market

Rapid7, Inc., a leader in cloud risk and threat detection, has released a new research report that assesses the security implications from improper de-acquisition of infusion pumps to illustrate the importance of securing networks, applications, and devices.
API Security: Protecting Against Persistent Automated Attacks

API Security: Protecting Against Persistent Automated Attacks

As use of Application Programming Interfaces (APIs) within organisations of all sizes continues to increase, the approach taken to ensuring their security has changed.
Improving an Organisations Cyber Efficacy and Effectiveness

Improving an Organisations Cyber Efficacy and Effectiveness

While the capability of cybersecurity tools continues to rapidly increase, there is no room for complacency within the organisations deploying them.
No results found.

In The News

New Body Camera by Motorola Solutions Boosts Safety for Frontline Workers

New Body Camera by Motorola Solutions Boosts Safety for Frontline Workers

Motorola Solutions today unveiled the V200, a body camera designed specifically to help protect frontline workers in stores, hospitals, hotels, schools and stadiums. Workers in these settings regularly face safety concerns – from unwelcome behaviour to theft and medical emergencies – and the V200, with its GoLive Audio safety feature, offers a direct ...
Infoblox Threat Intel Research Sheds Light On The Use Of Spoofed Domains In Malicious Spam Campaigns

Infoblox Threat Intel Research Sheds Light On The Use Of Spoofed Domains In Malicious Spam Campaigns

Infoblox Threat Intel researchers have discovered new insights into the use of spoofed domains in modern malicious spam (malspam) campaigns, sending unsolicited emails that contain harmful attachments or links designed to infect the recipient's computer with malware or to steal sensitive information. This reveals how threat actors exploit domain ...
Sophos grows MDR customer base by 37% in 2024, defending 26,000 organisations globally

Sophos grows MDR customer base by 37% in 2024, defending 26,000 organisations globally

Sophos today announced that its Sophos Managed Detection and Response (MDR) service has reached a major milestone, now protecting more than 26,000 organisations globally, growing its customer base by 37% in 2024. This achievement highlights the increasing demand for Sophos’ proactive, expert-led security solutions, which help organisations of all sizes ...
WatchGuard Acquires ActZero to Add Scalable and Open-Platform AI Security to Deliver Simplified 24/7 MDR Services

WatchGuard Acquires ActZero to Add Scalable and Open-Platform AI Security to Deliver Simplified 24/7 MDR Services

With demand for WatchGuard’s existing MDR service soaring, this acquisition lets MSPs easily add best-in-class MDR capabilities without building and maintaining their own in-house security operations center (SOC).
Trend Micro and Intel Innovate to Weed Out Covert Threats

Trend Micro and Intel Innovate to Weed Out Covert Threats

Harnessing the power of software and hardware security to drive stronger ransomware detection for businesses, released at CES 2025
Exabeam Rips Up The Rule Book On SOC Automation

Exabeam Rips Up The Rule Book On SOC Automation

Exabeam leads the way in security operations productivity as the first platform to embrace Open API compatibility BROOMFIELD, Colo. & FOSTER CITY, Calif. -- January, 7, 2025 -- Exabeam, a global cybersecurity leader that delivers AI-driven security operations, is cementing its position as the industry’s leading innovation force in security ...
Steffen Fischer Joins SecurityBridge As CFO

Steffen Fischer Joins SecurityBridge As CFO

"My responsibilities will also include managing operating costs and searching for efficiency improvements in existing financial processes. I look forward to contributing to data-driven decision-making at SecurityBridge by providing transparent and reliable figures." - Steffen Fischer
Only 41 Percent Of Businesses Have Programs In Place To Hire More Women In Tech, According To ISACA Research

Only 41 Percent Of Businesses Have Programs In Place To Hire More Women In Tech, According To ISACA Research

The global ISACA survey finds that 87 percent believe women are underrepresented in the IT sector
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This