The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Navigating Fair Compensation Like a Main Character

Navigating Fair Compensation Like a Main Character

Unpaid Expertise: Navigating the Challenges of Being Asked to Work for Free
Leadership That Empowers

Leadership That Empowers

Empowering Voices: Corien Shares Insights on Strong Leadership and Empowerment.
Women In Tech: Facing The Challenges Head On

Women In Tech: Facing The Challenges Head On

As we commemorate International Women’s Day, I’ve been thinking both about the strides women in tech have made as well as the hurdles that remain. The overall female representation in large global technology firms was expected to reach 33% in 2022, inching up 2% since 2019, according to the most recent update from Deloitte. Moreover, the percentage of ...
From Chef To Cybersecurity Practitioner And A 25-Year Cyber Career – Two Inspiring Stories Ahead Of This International Women’s Day

From Chef To Cybersecurity Practitioner And A 25-Year Cyber Career – Two Inspiring Stories Ahead Of This International Women’s Day

Heidi Mejia, Client Executive, Tesserent Heidi was working as a chef at several hospitality venues when Covid hit when work dried up overnight as the pandemic closed restaurants across Melbourne. Heidi had been thinking of working in cybersecurity for a long time and during lockdown, in her late 30s, began to contemplate what she really wanted to do ...
Inspiring Inclusion on International Women’s Day 2024

Inspiring Inclusion on International Women’s Day 2024

Joanne Wong discusses inclusivity in the cybersecurity industry on the occasion of International Women's Day 2024.
How To Build A Successful Data Security Strategy

How To Build A Successful Data Security Strategy

Businesses once managed limited data, stored in physical formats or on local servers. Today, data has grown exponentially in volume, variety, and accessibility, seamlessly flowing through complex online networks and cloud platforms. This means securing that information is more important (and complicated) than ever before, and organisations must build a ...
Detecting Script-Based Attacks Against SAP

Detecting Script-Based Attacks Against SAP

Cyberattacks against SAP systems have become more common with SAP customers generating 87% of total global commerce ($46 trillion), according to SAP.com. Attackers gain network access and then explore critical applications through port scanning and script-based exploration, and two two easy to identify attack examples are the password lock attack and ...
How AI Can Advance Your SAP Security Posture

How AI Can Advance Your SAP Security Posture

This article explores AI’s role in SAP Security, highlighting some SAP security platform challenges and the importance of system hardening against exploit chains within SAP vulnerabilities.

In The News

SentinelOne® Transforms Cloud Security for AWS Customers

SentinelOne® Transforms Cloud Security for AWS Customers

New products deliver AI-driven protection for serverless resources running in AWS Fargate
OpenText Cybersecurity MSP/MSSP Survey Finds Customers Seek AI-led Comprehensive Security Expertise for Threat Detection and Vulnerability Management

OpenText Cybersecurity MSP/MSSP Survey Finds Customers Seek AI-led Comprehensive Security Expertise for Threat Detection and Vulnerability Management

OpenText Cybersecurity 2024 Global Managed Security Survey reveals enterprises and SMBs Need Holistic and Composable Security
Pax8 Launches New Security Program

Pax8 Launches New Security Program

Providing partners with a comprehensive enablement journey to security growth
The Riskiest Connected Devices in 2024

The Riskiest Connected Devices in 2024

More than ever this year, attackers are crossing siloes to find entry points across the full spectrum of devices, operating systems, and embedded firmware forming the basis for the report, The Riskiest Connected Devices in 2024. Forescout, a global cybersecurity leader, delivers this fourth annual review of data sourced from nearly 19 million devices ...
Tenable Poll Shows 79% of Australian IT and Cybersecurity Leaders Want More Federal Funding for Preventive Cybersecurity Measures

Tenable Poll Shows 79% of Australian IT and Cybersecurity Leaders Want More Federal Funding for Preventive Cybersecurity Measures

Strong correlation between proactive risk management and up to 15% reduction in cyber insurance premiums
CrowdStrike is Awarded with Frost & Sullivan 2024 Customer Value Leadership Award for Cloud Security

CrowdStrike is Awarded with Frost & Sullivan 2024 Customer Value Leadership Award for Cloud Security

CrowdStrike is Awarded with Frost & Sullivan 2024 Customer Value Leadership Award for Cloud Security. CrowdStrike’s Falcon platform delivers a complete CNAPP with unified visibility and threat protection across the entire cloud estate to help global customers stop cloud breaches.
Check Point Software Unveils Research Revealing How Organisations Are Harnessing GenAI To Improve Cyber Security

Check Point Software Unveils Research Revealing How Organisations Are Harnessing GenAI To Improve Cyber Security

Report shows the already widespread use of GenAI by security teams and how it is improving their efficiency and helping to bridge the skills gap
Forrester Names Palo Alto Networks a Leader In XDR

Forrester Names Palo Alto Networks a Leader In XDR

With Cortex XDR, Palo Alto Networks Is Recognised as a Leader in the 2024 Forrester Wave for Extended Detection and Response Platforms

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This