The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Navigating Fair Compensation Like a Main Character
Unpaid Expertise: Navigating the Challenges of Being Asked to Work for Free
Leadership That Empowers
Empowering Voices: Corien Shares Insights on Strong Leadership and Empowerment.
Women In Tech: Facing The Challenges Head On
As we commemorate International Womenโs Day, Iโve been thinking both about the strides women in tech have made as well as the hurdles that remain. The overall female representation in large global technology firms was expected to reach 33% in 2022, inching up 2% since 2019, according to the most recent update from Deloitte. Moreover, the percentage of ...
From Chef To Cybersecurity Practitioner And A 25-Year Cyber Career – Two Inspiring Stories Ahead Of This International Womenโs Day
Heidi Mejia, Client Executive, Tesserent
Heidi was working as a chef at several hospitality venues when Covid hit when work dried up overnight as the pandemic closed restaurants across Melbourne. Heidi had been thinking of working in cybersecurity for a long time and during lockdown, in her late 30s, began to contemplate what she really wanted to do ...
Inspiring Inclusion on International Women’s Day 2024
Joanne Wong discusses inclusivity in the cybersecurity industry on the occasion of International Women's Day 2024.
How To Build A Successful Data Security Strategy
Businesses once managed limited data, stored in physical formats or on local servers. Today, data has grown exponentially in volume, variety, and accessibility, seamlessly flowing through complex online networks and cloud platforms. This means securing that information is more important (and complicated) than ever before, and organisations must build a ...
Detecting Script-Based Attacks Against SAP
Cyberattacks against SAP systems have become more common with SAP customers generating 87% of total global commerce ($46 trillion), according to SAP.com. Attackers gain network access and then explore critical applications through port scanning and script-based exploration, and two two easy to identify attack examples are the password lock attack and ...
How AI Can Advance Your SAP Security Posture
This article explores AIโs role in SAP Security, highlighting some SAP security platform challenges and the importance of system hardening against exploit chains within SAP vulnerabilities.
In The News
JFrog-Sponsored IDC Study Shows Growing Developer Focus on Software Security, Impacting Companiesโ Competitive Advantage
Titled the "Hidden Costs of DevSecOps," the IDC InfoBrief Reveals Companies Spend an Average of $28K Per Developer Annually on Identifying, Evaluating, and Addressing Software Security Concerns
Trend Micro Achieves Google Cloud Ready – Regulated & Sovereignty Solutions Designation
Expanded collaboration to accelerate market growth and unleash new opportunities
SecurityBridgeโs Bill Oliver Selected By ASUG Organizers To Discuss SAP Cybersecurity Best Practices
Company Reveals Itโs New โCybersecurity Command Center for SAPโ Initiative at the Houston, TX, Event
Recorded Future Unveils AI-Driven Enhancements to Combat Ransomware Threats with Real-Time Intelligence
AI-Powered Threat Intelligence Delivers Enhanced Visibility, Faster Detection, and Proactive Response Across the Entire Ransomware Lifecycle
Fortinet Expands Its Cloud-Native Security Offerings With The Introduction Of Lacework FortiCNAPP
Combining Laceworkโs leading cloud-native application protection platform with the Fortinet Security Fabric delivers unmatched visibility and protection across multi-cloud environmentsย
AusCERT Launches New Tabletop Exercise Service To Boost Incident Response Readiness
AUSCERT'S new TTX service enables organisations of all sizes to focus on critical aspects of cyber incident response, business continuity and crisis management and uplift capabilities.ย ย
Tesserent Highlights Significant Pivot From NIST On Password Advice โ Australian Businesses, Public Sector And Consumers Advised Not To Bother With Complex Passwords
Tesserent highlights significant pivot from NIST on password advice โ Australian businesses, public sector and consumers advised not to bother with complex passwords
Genetec Retains World Leader Position In Video Management Software, Analysts Confirm
Ongoing innovation, open architecture, and hybrid cloud solutions underpin sustained global market leadership.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..