The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Security Operations Centre (SOC)

The Security Operations Centre (SOC)

So, the board members at MyBiz have agreed upon making security as one of SC the foremost focus areas this year. With increasing capabilities of hackers and cyber thieves, the complexity of securing systems and data is enormous. The CISO has been evaluating having an in-house security team versus outsourcing to managed services, or creating a mix of ...
Hipster, Hacker & Hustler, meet Handler

Hipster, Hacker & Hustler, meet Handler

Great, innovative teams are characterised by their ability to move quickly, iterate fast, and learn even faster. These teams can be found in startups, but they can also exist in larger organisations as multidisciplinary teams. Such teams are often made up of individuals who possess unique skills and expertise that complement each other.
5 Reasons Why You Shouldn’t Just Build the Solution

5 Reasons Why You Shouldn’t Just Build the Solution

For most teams, the default mode is execution mode: build and deliver as soon as possible. However, when we are building something new, this way of operating can potentially lead to wasted time and missed opportunities. It is essential to get into exploration mode first and understand the problem in-depth before building a new solution.
From fluff to facts: how you can measure innovation

From fluff to facts: how you can measure innovation

Innovation is a term that gets thrown around a lot, but what does it really mean? For me, innovation is implementing new ideas that bring value to people. You don't have to be a creative genius to be innovative - It's all about the context. What might be ordinary for startups could be groundbreaking for established corporations. Implementing these ...
3 Subtle Indicators of Major Innovation Blockers

3 Subtle Indicators of Major Innovation Blockers

Throughout my career, I've had the incredible opportunity to dive headfirst into many innovation projects. They ranged from strategic innovation projects to customer experience improvements, and from exploring new ways of working to executing human-centred automation solutions.
3 Ways to Get Everyone Onboard the Innovation Train

3 Ways to Get Everyone Onboard the Innovation Train

When it comes to innovation and introducing change in an organisation, some people instantly embrace the journey while others resist it.
Is Australia set to follow the UK, for banking liabilities?

Is Australia set to follow the UK, for banking liabilities?

As the digital world continues to dominate the banking industry, concerns about data security and privacy are coming to the forefront. As algorithms become more advanced, building a profile based on users data, and identifying abnormal transactions that could indicate fraudulent activity. This has led to concerns about privacy, as individuals feel like ...
I Have Been Attacked by Ransomware. What Should I Do Now?

I Have Been Attacked by Ransomware. What Should I Do Now?

Retro Blockbuster Plot: Sometime in the 1980s – a filthy rich industrialist – his beautiful daughter – a constant target for kidnappers – always accompanied by bodyguards – one fateful day – kidnapping succeeds – hefty ransom asked – her big strong bloke comes to rescue – happy ending!Nah!! Kidnappers today have become very tech-savvy and, if I might ...
No results found.

In The News

Databricks Achieves FedRAMP High Authorization for AWS GovCloud

Databricks Achieves FedRAMP High Authorization for AWS GovCloud

Hires industry veteran Mike Daniels to lead public sector practice amid rapidly growing demand for data intelligence
Veeam Releases Kasten for Kubernetes v7.5 With Enhanced Security and Modern Virtualisation

Veeam Releases Kasten for Kubernetes v7.5 With Enhanced Security and Modern Virtualisation

Veeam announces Veeam Kasten for Kubernetes v7.5, designed to deliver unmatched Kubernetes-native data resilience for enterprises. This latest release improves Kubernetes data protection with significant advancements in scalability, notable improvement in backup and restore times, and features to safeguard against emerging threats and simplify ...
2025 CrowdStrike Global Threat Report: China’s Cyber Espionage Surges 150% with Increasingly Aggressive Tactics, Weaponization of AI-powered Deception Rises

2025 CrowdStrike Global Threat Report: China’s Cyber Espionage Surges 150% with Increasingly Aggressive Tactics, Weaponization of AI-powered Deception Rises

The industry’s preeminent source on adversary intelligence exposes a 442% increase in vishing  as GenAI-driven social engineering attacks increase; DPRK insider threats spike
Radware’s Cyber Threat Report: Web DDoS Attacks Surge 550% in 2024

Radware’s Cyber Threat Report: Web DDoS Attacks Surge 550% in 2024

Geopolitics, growing threat surface, and AI-tech drive bigger, longer, more intense attacks
F5 Unveils Industry’s First Converged Application Delivery and Security Platform for the Hybrid Multicloud Infrastructures of the AI Era

F5 Unveils Industry’s First Converged Application Delivery and Security Platform for the Hybrid Multicloud Infrastructures of the AI Era

F5 Application Delivery and Security Platform converges high-performance traffic management and advanced security capabilities. New solutions further enhance F5 platform with capabilities that reduce complexity, simplify operations, and strengthen security for every app.
New Trustwave Research Highlights Cybersecurity Vulnerabilities In Manufacturing

New Trustwave Research Highlights Cybersecurity Vulnerabilities In Manufacturing

February 27, 2025 – Trustwave, a leading cybersecurity and managed security services provider, has released a series of reports detailing the threats facing the manufacturing sector. As manufacturers increasingly integrate digital systems and physical infrastructure, the sector has become a prime target for cybercriminals aiming to disrupt production, ...
Arctic Wolf Threat Report: 96 Percent of Ransomware Cases Included Data Theft as Cybercriminals Double Down on Extortion

Arctic Wolf Threat Report: 96 Percent of Ransomware Cases Included Data Theft as Cybercriminals Double Down on Extortion

Arctic Wolf®, a global leader in security operations, today released its annual Arctic Wolf Threat Report, offering an in-depth analysis of the evolving cyber threat landscape. This year’s findings underscore how cybercriminals are adapting their methods to bypass stronger security defenses—prioritising data theft, refining business email compromise ...
BeyondTrust Pathfinder Delivers a One-Platform Approach to Identity-Centric Security

BeyondTrust Pathfinder Delivers a One-Platform Approach to Identity-Centric Security

Unified platform empowers customers to break free from fragmented, siloed solutions that leave organisations vulnerable to identity threats, and to benefit from adaptive, intelligent, and risk-aware identity security Fully integrated, AI-driven, identity security platform unifies visualisation, management, and governance of identities, entitlements, ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This