The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Poorly Purged Medical Devices Present Downstream Security Concerns When Sold on Secondary Market
Rapid7, Inc., a leader in cloud risk and threat detection, has released a new research report that assesses the security implications from improper de-acquisition of infusion pumps to illustrate the importance of securing networks, applications, and devices.

API Security: Protecting Against Persistent Automated Attacks
As use of Application Programming Interfaces (APIs) within organisations of all sizes continues to increase, the approach taken to ensuring their security has changed.

Improving an Organisations Cyber Efficacy and Effectiveness
While the capability of cybersecurity tools continues to rapidly increase, there is no room for complacency within the organisations deploying them.

Fastly Deploys Industry-Leading Threat Intelligence Capabilities to Publish Network Effect Threat Report Fastly Deploys Industry-Leading Threat Intelligence Capabilities to Publish Network Effect Threat Report
Fastly, Inc. (NYSE: FSLY), a leader in global edge cloud platforms, has announced the publication of its first threat intelligence report, the "Network Effect Threat Report".

Cado Security Labs Releases Inaugural 2023 Cloud Threat Findings Report
Cado Security, provider of the first cloud forensics and incident response platform, today announced the release of Cado Security Labs 2023 Cloud Threat Findings Report. The report reveals noteworthy discoveries about the evolving cloud threat landscape, shedding light on the heightened risk of cyberattacks due to the rapid adoption of cloud-focused services.

Nozomi Labs Report Reveals Surge in OT &Amp; IoT Security Threats
In the first half of 2023, malware activity in OT and IoT environments worldwide jumped 10x and alerts on unwanted applications doubled as nation-states, criminal groups and hacktivists continue to target healthcare, energy and manufacturing.

Zscaler VPN Report Finds Nearly Half of Organizations Are Concerned About Enterprise Security Due to Unsafe VPNs
Insecure VPNs, Email, and End User Devices Identified as Primary Attack Vectors, Stressing the Need for a Zero Trust Architecture
Dragos Industrial Ransomware Attack Analysis: Q2 2023
Quarter two 2023 proved to be an exceptionally active period for ransomware groups, posing significant threats to industrial organisations and infrastructure, according to Dragos’ latest ransomware attack analysis.
No results found.
In the News
CrowdStrike Unleashes the Agentic Security Workforce to Transform Security Operations
CrowdStrike introduces new, mission-ready agents out of the box to automate high-impact workflows; Unveils Charlotte AI AgentWorks, the first no-code security agent development platform that enables teams to build, orchestrate, and scale AI agents securely
CrowdStrike to Acquire Pangea to Secure Every Layer of Enterprise AI
With AI prompt-layer protection for secure enterprise AI development and workforce usage, CrowdStrike will deliver the industry’s first complete AI Detection and Response (AIDR)
CrowdStrike Unveils the Falcon Platform Fall Release to Lead Cybersecurity Into the Agentic Era
Revolutionizing the Falcon platform with the industry’s richest AI-ready data layer – the foundation for unifying human and agent-based security
BeyondTrust Delivers Identity Security Controls for AI, Turning Agent Visibility Into Action
BeyondTrust delivers three powerful capabilities to Identity Security Insights® and BeyondTrust Pathfinder Platform customers today: AI Agent Insights, secure Model Context Protocol (MCP) orchestration, and an omnipresent AI decision-support layer; the first production-ready identity security controls for the new era of agentic AI
Cyber Security Predictions for 2026
Among the key trends, Excite Cyber, CEO, Bryan Saba highlights new AI regulations, stronger governance over LLM development and predicts cyber risks will become encompassed in comprehensive enterprise-wide business risk registers and demand will surge for digital forensics training. Excite Cyber also anticipates that Australia will see rapid adoption ...
Exabeam and Cribl Partner to Power Scalable, High-Fidelity Threat Detection With Next-Gen Data Pipelines
Partnership advances an outcome-driven data strategy, decoupling security outcomes from data volume
Swift AI Innovation Creates Blueprint for Banks to Stop Fraud Faster Through Cross-Border Collaboration
Swift and 13 international banks doubled real time fraud detection in trials involving ten million test transactions Privacy-enhancing technologies enabled institutions to share transaction data while maintaining end-to-end privacy and security Used at scale, this technology could enable a joined-up fraud defence across global finance, lead to faster ...
Canalys Study Finds Every $1 of Falcon Platform Sales Leads up to $7 in Partner Services Revenue
Independent research validates Falcon platform transformation as the leading engine of partner profitability, fueling growth and sustained returns
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
- 348
- 349
- 350
- 351
- 352
- 353
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
