The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Forescout Uncovers The 5 Riskiest Connected Devices in 2023: IT, IoT, OT, IoMT

Forescout Uncovers The 5 Riskiest Connected Devices in 2023: IT, IoT, OT, IoMT

Since 2020, Forescout Research - Vedere Labs has been tracking the riskiest devices on organisations’ networks. In 2020, Forescout released the first Enterprise of Things Security Report, followed in 2022 with the Riskiest Connected Devices in Enterprise Networks report.
Five Ways to Ensure Compliance when Managing Customer Data

Five Ways to Ensure Compliance when Managing Customer Data

As commercial interactions become increasingly digital, businesses are finding themselves custodians of rapidly increasing volumes of customer data.
Hitachi Vantara Study Shows Three-Quarters of Australian Companies Overwhelmed by Data as Security, Sustainability Challenges Grow

Hitachi Vantara Study Shows Three-Quarters of Australian Companies Overwhelmed by Data as Security, Sustainability Challenges Grow

Survey shows data is the most valuable asset, but leaders are concerned about their infrastructure’s resilience
Recorded Future’s Latest Insikt Report: China’s Targeting of International Companies In Geopolitical Competition

Recorded Future’s Latest Insikt Report: China’s Targeting of International Companies In Geopolitical Competition

Intelligence company Recorded Future today released the latest report from its threat research division Insikt Group - China’s targeting of international companies in geopolitical competition.
How Visible Is My Profile on the Internet?

How Visible Is My Profile on the Internet?

There are a lot of good things about being famous, but there are a few not so good things too. – Sharon Stone What is profile visibility?Simply put, profile visibility means how “famous” you are on the internet and what information about you is visible publicly. A simple Google search for your name will often reveal the answer to that ...
Cloud assets the biggest targets for cyber-attacks in Australia as more sensitive data moves to cloud

Cloud assets the biggest targets for cyber-attacks in Australia as more sensitive data moves to cloud

Thales today announced the release of the 2023 Thales Cloud Security Study, its annual assessment on the latest cloud security threats, trends and emerging risks based on a survey of nearly 3,000 IT and security professionals across 18 countries including Australia.
Closing the Gap: How Modern Forensic Platforms Enhance Cloud Security Investigations

Closing the Gap: How Modern Forensic Platforms Enhance Cloud Security Investigations

While data is migrating to the cloud at unprecedented rates, the number of cloud security incidents is growing rapidly in response. In its recent cloud threat report, Palo Alto’s Unit 42 concluded threat actors have become adept at exploiting common, everyday issues in the cloud. These range from misconfigurations, weak credentials and lack of ...
Rapid7 Threat Report: Japanese Companies Exposed to Increased Ransomware Risk Through Global Business Footprint

Rapid7 Threat Report: Japanese Companies Exposed to Increased Ransomware Risk Through Global Business Footprint

Overseas entities present a serious cyber risk of ransomware and state-sponsored threats
No results found.

In The News

Fortinet Unveils New Artificial Intelligence-Powered Workspace Security Suite To Protect The Modern Enterprise

Fortinet Unveils New Artificial Intelligence-Powered Workspace Security Suite To Protect The Modern Enterprise

Introducing FortiMail Workspace Security and powerful FortiDLP upgrades—redefining protection for email, browsers, and collaboration tools while securing sensitive data against insider threats 
Azul Introduces 100 – 1000x More Accurate In-Production Java Vulnerability Detection

Azul Introduces 100 – 1000x More Accurate In-Production Java Vulnerability Detection

Azul Intelligence Cloud detects known vulnerabilities down to the class-level, eliminating up to 99% of false positives and boosting DevOps capacity and productivity
CyberArk For MSPs: Enhanced Console And New Program Enable MSPs To Build Differentiated, Converged Identity Security Services

CyberArk For MSPs: Enhanced Console And New Program Enable MSPs To Build Differentiated, Converged Identity Security Services

CyberArk (NASDAQ: CYBR), the global leader in identity security, today announced console and partner program updates designed to help Managed Services Providers (MSPs) drive profitable identity security-based growth. CyberArk MSP Hub is an evolved SaaS-based management console that offers a one-stop-shop entry point for MSPs to offer the CyberArk ...
SentinelOne Takes Top Honour As Pax8’s Partner’s Most Valuable Vendor At Beyond 2025

SentinelOne Takes Top Honour As Pax8’s Partner’s Most Valuable Vendor At Beyond 2025

Award celebrates SentinelOne’s role in delivering next-generation security solutions and driving growth for MSPs in the Pax8 ecosystem. DENVER, CO – June 12, 2025 – SentinelOne® (NYSE: S), today announced it has received a Pax8 Beyond Partner's Most Valuable Vendor Award during Pax8’s 2025 Beyond conference. The Awards program recognises vendors ...
SentinelOne Accelerates Secure Cloud Migrations For AWS Customers

SentinelOne Accelerates Secure Cloud Migrations For AWS Customers

With real-time protection, deep visibility, and end-to-end workload security from on-prem to cloud, SentinelOne secures every step of the cloud migration journey with AWS MOUNTAIN VIEW, CA - June 11, 2025 - SentinelOne® (NYSE: S), a global leader in AI-powered security,  announced today that it has joined the Amazon Web Services (AWS) Independent ...
Datadog Unveils New Log Management Offerings

Datadog Unveils New Log Management Offerings

Datadog, Inc. (NASDAQ: DDOG), the monitoring and security platform for cloud applications, today at DASH announced new capabilities in its log management suite, which are designed to help organisations optimise logging costs at scale and meet the stringent data retention, auditability and data residency requirements of regulated ...
Trend Micro Enhances AI Safety and Security in NVIDIA Enterprise AI Factories 

Trend Micro Enhances AI Safety and Security in NVIDIA Enterprise AI Factories 

Trend Secure AI Factory supports NVIDIA NeMo continuous model safety evaluation and improvement lifecycle
FS-ISAC and Akamai Reveal 245% Year-on-Year Surge in DDoS Attacks Targeting APAC Financial Sector

FS-ISAC and Akamai Reveal 245% Year-on-Year Surge in DDoS Attacks Targeting APAC Financial Sector

Joint report reveals rise in sophisticated, persistent DDoS attacks threatening trust and resilience across Asia Pacific’s financial sector
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This