The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

From fluff to facts: how you can measure innovation

From fluff to facts: how you can measure innovation

Innovation is a term that gets thrown around a lot, but what does it really mean? For me, innovation is implementing new ideas that bring value to people. You don't have to be a creative genius to be innovative - It's all about the context. What might be ordinary for startups could be groundbreaking for established corporations. Implementing these ...
3 Subtle Indicators of Major Innovation Blockers

3 Subtle Indicators of Major Innovation Blockers

Throughout my career, I've had the incredible opportunity to dive headfirst into many innovation projects. They ranged from strategic innovation projects to customer experience improvements, and from exploring new ways of working to executing human-centred automation solutions.
3 Ways to Get Everyone Onboard the Innovation Train

3 Ways to Get Everyone Onboard the Innovation Train

When it comes to innovation and introducing change in an organisation, some people instantly embrace the journey while others resist it.
Is Australia set to follow the UK, for banking liabilities?

Is Australia set to follow the UK, for banking liabilities?

As the digital world continues to dominate the banking industry, concerns about data security and privacy are coming to the forefront. As algorithms become more advanced, building a profile based on users data, and identifying abnormal transactions that could indicate fraudulent activity. This has led to concerns about privacy, as individuals feel like ...
I Have Been Attacked by Ransomware. What Should I Do Now?

I Have Been Attacked by Ransomware. What Should I Do Now?

Retro Blockbuster Plot: Sometime in the 1980s – a filthy rich industrialist – his beautiful daughter – a constant target for kidnappers – always accompanied by bodyguards – one fateful day – kidnapping succeeds – hefty ransom asked – her big strong bloke comes to rescue – happy ending!Nah!! Kidnappers today have become very tech-savvy and, if I might ...
66% of Malware is Delivered Through PDFs, New Report from Palo Alto Networks Unit 42 Finds

66% of Malware is Delivered Through PDFs, New Report from Palo Alto Networks Unit 42 Finds

Vulnerabilities continue to be a popular method for threat actors to infect victims, with exploit attempts of vulnerabilities increasing by 55% in the past year
How Safe are bit.ly (or Tiny URL) Links?

How Safe are bit.ly (or Tiny URL) Links?

What are shortened or tiny URLs?In the world of shortcuts, how could URLs stay behind. With domain names getting stranger and web links getting obnoxiously longer, tiny URLs come to the rescue. These are like capsule covers that make medicines easy to digest. Usually web addresses are attached with a lot of information (called query string) that helps ...
How to remove the roadblocks to going passwordless

How to remove the roadblocks to going passwordless

The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity
No results found.

In The News

Tenable Comment on DeepSeek Ban In AU Government

Tenable Comment on DeepSeek Ban In AU Government

Governments in the U.S, Italy, and now Australia have moved to ban access to DeepSeek, a Chinese-developed large language model (LLM), on government devices. These bans stem from concerns over data security and the potential exposure of sensitive information to the PRC. However, blocking access to DeepSeek is not as simple as restricting its website ...
Kyndryl Introduces SASE Services Combined With Palo Alto Networks Prisma SASE to Provide a Unified Network Security Posture for Customers

Kyndryl Introduces SASE Services Combined With Palo Alto Networks Prisma SASE to Provide a Unified Network Security Posture for Customers

Kyndryl’s end-to-end SASE services will help customers drive adoption of Palo Alto Networks’ cloud-first, zero-trust solution for network security
CyberArk and SentinelOne Team Up to Enable Step Change in Endpoint and Identity Security

CyberArk and SentinelOne Team Up to Enable Step Change in Endpoint and Identity Security

Mutual customers will benefit from boosted endpoint threat detection and response capabilities
Dynatrace Expands Security Portfolio With Cloud Security Posture Management Solution

Dynatrace Expands Security Portfolio With Cloud Security Posture Management Solution

Unified security and observability enable continuous compliance and response automation for major cloud platforms LAS VEGAS, NV, February 4, 2025 – Dynatrace (NYSE: DT), the leading AI-powered observability platform, today announced the expansion of its security portfolio with a new Cloud Security Posture Management (CSPM) solution. For enterprises ...
Do The CONTEC CMS8000 Patient Monitors Contain A Chinese Backdoor? The Reality Is More Complicated

Do The CONTEC CMS8000 Patient Monitors Contain A Chinese Backdoor? The Reality Is More Complicated

On 30 January, The Cybersecurity Infrastructure & Security Agency (CISA) released an alert, complemented by a notification from the U.S. Food and Drug Administration (FDA) suggesting that the Contec CMS8000 patient monitor and OEM white-label variants contain a backdoor communicating to a Chinese IP address. Team82 investigated the firmware and ...
New Research From Claroty’s Team82 Highlights Urgent Ransomware And Insecure Connectivity Threats To Mission-Critical OT Assets

New Research From Claroty’s Team82 Highlights Urgent Ransomware And Insecure Connectivity Threats To Mission-Critical OT Assets

State of CPS Security 2025: OT Exposures” Reveals the OT Device Exposures Most Coveted for Exploitation by Adversaries SYDNEY, Australia, 5 February 2025 – Claroty, the cyber-physical systems (CPS) protection company, today released a new report revealing the exposures that are most coveted for exploitation by adversaries in operational technology ...
GitHub Brings Data Residency To Australia With GitHub Enterprise Cloud

GitHub Brings Data Residency To Australia With GitHub Enterprise Cloud

GitHub, the most widely adopted Copilot-powered developer platform, now offers organisations in Australia more control over where their code is stored
Check Point Announces New AI-Powered Innovations To Bolster Unified Security Management For The Infinity Platform

Check Point Announces New AI-Powered Innovations To Bolster Unified Security Management For The Infinity Platform

Six new capabilities reduce complexity, enhance threat prevention, and set the stage for autonomous zero trust across the Infinity Platform Vienna, Austria – February 4, 2025 – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced new Infinity Platform capabilities to accelerate ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This