The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Security Operations Centre (SOC)

The Security Operations Centre (SOC)

So, the board members at MyBiz have agreed upon making security as one of SC the foremost focus areas this year. With increasing capabilities of hackers and cyber thieves, the complexity of securing systems and data is enormous. The CISO has been evaluating having an in-house security team versus outsourcing to managed services, or creating a mix of ...
Hipster, Hacker & Hustler, meet Handler

Hipster, Hacker & Hustler, meet Handler

Great, innovative teams are characterised by their ability to move quickly, iterate fast, and learn even faster. These teams can be found in startups, but they can also exist in larger organisations as multidisciplinary teams. Such teams are often made up of individuals who possess unique skills and expertise that complement each other.
5 Reasons Why You Shouldn’t Just Build the Solution

5 Reasons Why You Shouldn’t Just Build the Solution

For most teams, the default mode is execution mode: build and deliver as soon as possible. However, when we are building something new, this way of operating can potentially lead to wasted time and missed opportunities. It is essential to get into exploration mode first and understand the problem in-depth before building a new solution.
From fluff to facts: how you can measure innovation

From fluff to facts: how you can measure innovation

Innovation is a term that gets thrown around a lot, but what does it really mean? For me, innovation is implementing new ideas that bring value to people. You don't have to be a creative genius to be innovative - It's all about the context. What might be ordinary for startups could be groundbreaking for established corporations. Implementing these ...
3 Subtle Indicators of Major Innovation Blockers

3 Subtle Indicators of Major Innovation Blockers

Throughout my career, I've had the incredible opportunity to dive headfirst into many innovation projects. They ranged from strategic innovation projects to customer experience improvements, and from exploring new ways of working to executing human-centred automation solutions.
3 Ways to Get Everyone Onboard the Innovation Train

3 Ways to Get Everyone Onboard the Innovation Train

When it comes to innovation and introducing change in an organisation, some people instantly embrace the journey while others resist it.
Is Australia set to follow the UK, for banking liabilities?

Is Australia set to follow the UK, for banking liabilities?

As the digital world continues to dominate the banking industry, concerns about data security and privacy are coming to the forefront. As algorithms become more advanced, building a profile based on users data, and identifying abnormal transactions that could indicate fraudulent activity. This has led to concerns about privacy, as individuals feel like ...
I Have Been Attacked by Ransomware. What Should I Do Now?

I Have Been Attacked by Ransomware. What Should I Do Now?

Retro Blockbuster Plot: Sometime in the 1980s – a filthy rich industrialist – his beautiful daughter – a constant target for kidnappers – always accompanied by bodyguards – one fateful day – kidnapping succeeds – hefty ransom asked – her big strong bloke comes to rescue – happy ending!Nah!! Kidnappers today have become very tech-savvy and, if I might ...
No results found.

In The News

Datadog Report Finds Only 18% of Critical Vulnerabilities are Worth Prioritising

Datadog Report Finds Only 18% of Critical Vulnerabilities are Worth Prioritising

Cloud application monitoring and security platform Datadog today released its new report, the State of DevSecOps 2025, which found that only a fraction of critical vulnerabilities are truly worth prioritising. To better understand the severity of a vulnerability, Datadog developed a prioritisation algorithm that factored in runtime context to its ...
Bitdefender Redefines Endpoint Security, Announces Global Launch of GravityZone PHASR

Bitdefender Redefines Endpoint Security, Announces Global Launch of GravityZone PHASR

Bitdefender has announced the worldwide availability of Bitdefender GravityZone Proactive Hardening and Attack Surface Reduction (PHASR), the industry’s first endpoint security solution to dynamically tailor hardening for each user—ensuring that security configurations align precisely with user-intended privileges and behaviours and continuously adapt ...
Datadog Makes Strategic Acquisition of Metaplane

Datadog Makes Strategic Acquisition of Metaplane

Datadog has announced it has acquired Metaplane, an end-to-end data observability platform that provides advanced machine learning-powered monitoring and column-level lineage to prevent, detect and resolve data quality issues across a company’s entire data stack. With the emergence of AI and widespread adoption of platforms like Snowflake and ...
Veeam Unveils Inaugural ESG Report Highlighting Sustainability, Social Impact, And Corporate Governance Initiatives

Veeam Unveils Inaugural ESG Report Highlighting Sustainability, Social Impact, And Corporate Governance Initiatives

Veeam announced the release of its first Environmental, Social, and Governance (ESG) Report, coinciding with the 55th anniversary of Earth Day. This landmark report showcases Veeam's commitment to inclusively creating a sustainable future while maintaining the highest standards of trust and governance. “Today at VeeamON, we are proud to launch our ...
CrowdStrike and Veeam Partner to Strengthen Data Resilience for Customers

CrowdStrike and Veeam Partner to Strengthen Data Resilience for Customers

Veeam announced a new partnership with CrowdStrike to deliver centralised visibility of critical data and advanced threat detection through integration with the Veeam Data Platform. The jointly developed product integration creates a more secure environment for shared customers, helping identify threats before, during and after an attack to enable ...
SecurityBridge Unveils AI-Powered Code Vulnerability Analyzer to Strengthen SAP Security

SecurityBridge Unveils AI-Powered Code Vulnerability Analyzer to Strengthen SAP Security

This innovative tool leverages artificial intelligence (AI) to identify and explain vulnerabilities in custom Advanced Business Application Programming (ABAP) code, empowering SAP developers and security teams to remediate risks faster and more efficiently.
NinjaOne Introduces New Capabilities to Strengthen Organisations’ Cyber Hygiene

NinjaOne Introduces New Capabilities to Strengthen Organisations’ Cyber Hygiene

NinjaOne today announced new capabilities that unify vulnerability management and patching workflows, ensuring a risk-based approach to patching and reducing time to remediate vulnerabilities. The new tools automate the import of vulnerability data, giving IT teams continuous visibility into vulnerabilities, so they can prioritise and verify the ...
CrowdStrike Unveils Falcon Privileged Access, Delivering the Only Platform that Unifies End-to-End Hybrid Identity Security

CrowdStrike Unveils Falcon Privileged Access, Delivering the Only Platform that Unifies End-to-End Hybrid Identity Security

CrowdStrike Unveils Falcon Privileged Access, Delivering the Only Platform that Unifies End-to-End Hybrid Identity Security Falcon platform secures the entire identity attack lifecycle – from initial access to privilege escalation and lateral movement – across hybrid environments; extends Charlotte AI Agentic Detection Triage to identity-based attacks
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This