The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Security Emerges As A Critical Input To User Experience Decisions

Security Emerges As A Critical Input To User Experience Decisions

Security is shifting even further ‘left’, away from developers and into the design thinking of CX and UX teams, writes Ping Identity’s Head of APAC & Japan Ashley Diffey.
IBM Report: Ransomware Persisted Despite Improved Detection in 2022

IBM Report: Ransomware Persisted Despite Improved Detection in 2022

Manufacturing Most Extorted Industry; Email Thread Hijacking Attempts Spike; Time to Ransom Moves from Months to Days.
Synopsys Study Underscores Need for Comprehensive SBOM as Best Defence in Software Supply Chain Security

Synopsys Study Underscores Need for Comprehensive SBOM as Best Defence in Software Supply Chain Security

84% of codebases contained at least one known open source vulnerability, an almost 4% increase from last year’s findings.
Haste Is Waste! Is Google’s Fear Of Missing Out Hurting The Holistic Development Of Artificial Intelligence (AI)

Haste Is Waste! Is Google’s Fear Of Missing Out Hurting The Holistic Development Of Artificial Intelligence (AI)

23 Feb 2023 6:00 AM   Dr Samar Fatima, Research Fellow, Enterprise AI and Data Analytics Hub  Topics: Google, Bard, AI, artificial intelligence, ChatGPT  “The race for search engine supremacy is getting fierce amongst tech giants with the release of Open AI’s ChatGPT instilling competitive fear in those bigger companies such as ...
How Businesses Are Faring With The Rise Of Cyber Threats: 15 Years In Review

How Businesses Are Faring With The Rise Of Cyber Threats: 15 Years In Review

The year 2022 has been dubbed the "year of the cyber plague" due to the occurrence of two of the worst breaches in Australian history happening within weeks of each other, with Optus and Medibank falling victim. These attacks are a testament to the severity of the havoc that cyber attacks can cause, which has been documented over the last 15 years by ...
Report: 2022 a breakthrough year in the development of malware targeting critical infrastructure

Report: 2022 a breakthrough year in the development of malware targeting critical infrastructure

Scaled ransomware attacks against manufacturing and geopolitical tensions brought increased attention to the industrial cyber threat landscape
The majority of business cyber security decisions are made without insight into the attacker, according to new Mandiant report

The majority of business cyber security decisions are made without insight into the attacker, according to new Mandiant report

Global survey of cyber security decision makers finds that while nearly all respondents are satisfied with the quality of their threat intelligence, nearly half struggle with effectively applying it
Qualys Expands Cloud Platform for Both Large Enterprises and Small/Medium Businesses Looking to Prioritise and Reduce Risk

Qualys Expands Cloud Platform for Both Large Enterprises and Small/Medium Businesses Looking to Prioritise and Reduce Risk

Introducing value-based, all-inclusive cybersecurity packages that include patch management and EDR to protect small and medium businesses from cyber threats

In The News

Camelot Secure’s Myrddin (Cybersecurity Maturity Model Certification (CMMC) Bot Assistant) Wins 2024 CSO Award

Camelot Secure’s Myrddin (Cybersecurity Maturity Model Certification (CMMC) Bot Assistant) Wins 2024 CSO Award

In its second year of being recognized by the CSO Awards program, Camelot was honored for Myrddin, which integrates Natural Language Processing (NLP) technologies and the latest AI Generative Pretrained Transformer (GPT) to assist IT personnel in conducting CMMC gap assessments in a secure environment.
60 Hurts per Second – How We Got Access to Enough Solar Power to Run the United States

60 Hurts per Second – How We Got Access to Enough Solar Power to Run the United States

The electricity grid – the buzzing, crackling marvel that supplies the lifeblood of modernity – is by far the largest structure humanity ever built. It’s so big, in fact, that few people even notice it, like a fish can’t see the ocean.   Until the grid goes down, that is. Then, like the fish dangling from the angler’s hook, we see our ...
Fortinet Enhances The Industry’s Most Comprehensive Operational Technology Security Platform To Protect Cyber-Physical Systems

Fortinet Enhances The Industry’s Most Comprehensive Operational Technology Security Platform To Protect Cyber-Physical Systems

Updates across the Fortinet OT security platform include new ruggedised appliances, advanced secure networking and security operations capabilities, and expanded partnerships with leading OT vendors
2024 Qualys Midyear Threat Landscape Review

2024 Qualys Midyear Threat Landscape Review

According to the Qualys 2024 Midyear Threat Landscape Review: The number of reported Common Vulnerabilities and Exposures (CVEs) rose by 30% in the last year to 22,254. These numbers reflect rising software complexity and the broader use of technology, necessitating advanced and dynamic vulnerability management strategies to mitigate evolving ...
Rapid7 Ransomware Radar Report Charts Ransomware Group Activity and Methodologies for Fresh Insights

Rapid7 Ransomware Radar Report Charts Ransomware Group Activity and Methodologies for Fresh Insights

New research from Rapid7 analyses more than 70 active ransomware groups, 21 of which were new in 2024. The Ransomware Radar Report provides a fresh perspective on the global ransomware threat by analysing, comparing, and contrasting attacker activity and techniques over an 18-month period ending June 30, 2024.
Infoblox Unveils New Ecosystem Program to Boost Enterprise Security and Enhance Network Visibility with Certified Integrations

Infoblox Unveils New Ecosystem Program to Boost Enterprise Security and Enhance Network Visibility with Certified Integrations

Infoblox today unveiled its new Infoblox Ecosystem Program. Key to the program is a self-service portal that features certified out-of-the-box integrations for leading technology providers. Infoblox-certified integrations undergo rigorous testing, optimisation, validation, and ongoing updates to ensure seamless compatibility, and are backed by support ...
Absolute Security Showcases Next Generation Cyber Resilience

Absolute Security Showcases Next Generation Cyber Resilience

Absolute Security Showcases Next Generation Cyber Resilience, which provides a new remote rehydration capability that automates recovery and remediation for ransomware, BSOD, and other disruptions
Armis Surpasses US$200M ARR, Doubling ARR in less than 18 months

Armis Surpasses US$200M ARR, Doubling ARR in less than 18 months

Rapid Growth and Unmatched Scale Cements Armis’ Position as a Global Cybersecurity Leader, as it Continues Prep for IPO

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This