The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How Safe are bit.ly (or Tiny URL) Links?

How Safe are bit.ly (or Tiny URL) Links?

What are shortened or tiny URLs?In the world of shortcuts, how could URLs stay behind. With domain names getting stranger and web links getting obnoxiously longer, tiny URLs come to the rescue. These are like capsule covers that make medicines easy to digest. Usually web addresses are attached with a lot of information (called query string) that helps ...
How to remove the roadblocks to going passwordless

How to remove the roadblocks to going passwordless

The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity
How to remove the roadblocks to going passwordless

How to remove the roadblocks to going passwordless

The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity
How to protect against double-extortion ransomware attacks

How to protect against double-extortion ransomware attacks

Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
How to protect against double-extortion ransomware attacks

How to protect against double-extortion ransomware attacks

Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
Insikt Report – Deepfakes : I Have No Mouth, And I Must Do Crime

Insikt Report – Deepfakes : I Have No Mouth, And I Must Do Crime

Intelligence company Recorded Future today released the findings of its latest deepfakes research. Titled “I Have No Mouth, And I Must Do Crime”, the report looks at how the spread of deepfake technologies, specifically through advancements in AI-based voice cloning, is pushing scams to a new level.
Shadow API Usage Surges 900%, Revealing Alarming Lack of API Visibility Among Enterprise

Shadow API Usage Surges 900%, Revealing Alarming Lack of API Visibility Among Enterprise

New Research Highlights APIs are Now a Leading Attack Vector, Posing New and Significant Threats to Organisation
Rethinking how to engage Australian directors in security budget discussions

Rethinking how to engage Australian directors in security budget discussions

Boards are still fractured when it comes to cybersecurity capability, skills and buy-in, but there are ways for CISOs to navigate this to keep their programs funded.
No results found.

In The News

Trend Micro Delivers AI-Powered Threat Detection with AWS Infrastructure Support and NVIDIA Integration

Trend Micro Delivers AI-Powered Threat Detection with AWS Infrastructure Support and NVIDIA Integration

Proactive security with AI-powered model built for modern enterprise workloads
Workato Launches Workato One Platform, UAI and Industry’s Leading Orchestration Offering to Bring Agents to The Core of The Enterprise

Workato Launches Workato One Platform, UAI and Industry’s Leading Orchestration Offering to Bring Agents to The Core of The Enterprise

Customers now have a single place to rapidly build, deploy, and orchestrate powerful enterprise agents with complete enterprise context, skills, and governance
Genetec Launches AutoVu Plugin, ALPR Analysis Reports To Speed Up Investigations

Genetec Launches AutoVu Plugin, ALPR Analysis Reports To Speed Up Investigations

ALPR-based forensic searches increase investigator efficiency and provide actionable insights.
New Research Reveals Over Half of Cybersecurity Incidents in Australia Occur Due to Unmanaged Assets

New Research Reveals Over Half of Cybersecurity Incidents in Australia Occur Due to Unmanaged Assets

Trend Micro evaluation highlights alarmingly low use of attack surface management tools
Check Point Research Launches AI Security Report: Exposing the Rise of AI-Powered Cybercrime and Defences

Check Point Research Launches AI Security Report: Exposing the Rise of AI-Powered Cybercrime and Defences

New report unveils four key AI-driven cyber threats and how organisations can outsmart attackers in an AI-driven world 
Enterprises to Redefine Cyber Resilience with Rackspace and Rubrik

Enterprises to Redefine Cyber Resilience with Rackspace and Rubrik

Rackspace Cyber Recovery Cloud powered by Rubrik Enables Organisations to Restore Critical Operations Faster and More Securely than Traditional Offerings in the Event of a Cyber Attack
UiPath Launches the First Enterprise-Grade Platform for Agentic Automation

UiPath Launches the First Enterprise-Grade Platform for Agentic Automation

UiPath (NYSE: PATH), a global leader in agentic automation, today launched its next-generation UiPath Platform™ for agentic automation, a groundbreaking platform designed to unify AI agents, robots, and people on a single intelligent system. With open and secure orchestration at its core, the platform transforms workflows by enabling the creation, ...
Genetec Partners With Western Sydney University to Empower and Inspire the Technology Workforce of Tomorrow

Genetec Partners With Western Sydney University to Empower and Inspire the Technology Workforce of Tomorrow

SYDNEY, May 1, 2025 — Genetec Inc. (“Genetec”), the global leader in enterprise physical security software, has signed a five-year agreement with Western Sydney University, to offer full-time students semester-long internships, providing them with practical skills in a fast-growing industry. As part of the program, students will gain valuable ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This