The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Five Ways To Include More Women In Your ICT Organisation

Five Ways To Include More Women In Your ICT Organisation

There’s lots that companies can do to create workplaces that appeal to ambitious, high performing women.
Navigating Fair Compensation Like a Main Character

Navigating Fair Compensation Like a Main Character

Unpaid Expertise: Navigating the Challenges of Being Asked to Work for Free
Leadership That Empowers

Leadership That Empowers

Empowering Voices: Corien Shares Insights on Strong Leadership and Empowerment.
Women In Tech: Facing The Challenges Head On

Women In Tech: Facing The Challenges Head On

As we commemorate International Women’s Day, I’ve been thinking both about the strides women in tech have made as well as the hurdles that remain. The overall female representation in large global technology firms was expected to reach 33% in 2022, inching up 2% since 2019, according to the most recent update from Deloitte. Moreover, the percentage of ...
From Chef To Cybersecurity Practitioner And A 25-Year Cyber Career – Two Inspiring Stories Ahead Of This International Women’s Day

From Chef To Cybersecurity Practitioner And A 25-Year Cyber Career – Two Inspiring Stories Ahead Of This International Women’s Day

Heidi Mejia, Client Executive, Tesserent Heidi was working as a chef at several hospitality venues when Covid hit when work dried up overnight as the pandemic closed restaurants across Melbourne. Heidi had been thinking of working in cybersecurity for a long time and during lockdown, in her late 30s, began to contemplate what she really wanted to do ...
Inspiring Inclusion on International Women’s Day 2024

Inspiring Inclusion on International Women’s Day 2024

Joanne Wong discusses inclusivity in the cybersecurity industry on the occasion of International Women's Day 2024.
How To Build A Successful Data Security Strategy

How To Build A Successful Data Security Strategy

Businesses once managed limited data, stored in physical formats or on local servers. Today, data has grown exponentially in volume, variety, and accessibility, seamlessly flowing through complex online networks and cloud platforms. This means securing that information is more important (and complicated) than ever before, and organisations must build a ...
Detecting Script-Based Attacks Against SAP

Detecting Script-Based Attacks Against SAP

Cyberattacks against SAP systems have become more common with SAP customers generating 87% of total global commerce ($46 trillion), according to SAP.com. Attackers gain network access and then explore critical applications through port scanning and script-based exploration, and two two easy to identify attack examples are the password lock attack and ...

In The News

CIOs Sound Alarm on Network Security as a Top Priority as AI Fuels New Risks and Challenges

CIOs Sound Alarm on Network Security as a Top Priority as AI Fuels New Risks and Challenges

Survey of 200 CIOs and Senior IT professionals finds majority of respondents desire a single integrated platform for networking AI and security to improve productivity, streamline investments and ensure protection against evolving cyber threats 
Thales Reports Significant Drop In Breaches Against FinServ Organisations; Poor Ransomware Response And GenAI Growing Concerns

Thales Reports Significant Drop In Breaches Against FinServ Organisations; Poor Ransomware Response And GenAI Growing Concerns

Thales today released the findings of its 2024 Data Threat Report for Financial Services organisations, based on a subset of its global Data Threat Report survey which was released earlier this year. This Financial Services edition reveals a drop in data breaches against financial services organisations. However, ransomware response remains a challenge ...
Bitdefender Launches Scam Copilot, a Powerful Scam Defence Platform for its Digital Life Protection Solutions

Bitdefender Launches Scam Copilot, a Powerful Scam Defence Platform for its Digital Life Protection Solutions

Bitdefender today announced the launch of Scam Copilot, an advanced technology platform powered by artificial intelligence (AI) and designed to detect and fight scams along with fraud attempts across devices including computers, tablets and mobile phones. The platform has been integrated into several Bitdefender digital life protection consumer ...
OVHcloud Participates in 2024 OCP Global Summit Highlighting New Approach For Aluminium Heat Exchangers Cooling Solutions in Data Centres

OVHcloud Participates in 2024 OCP Global Summit Highlighting New Approach For Aluminium Heat Exchangers Cooling Solutions in Data Centres

OVHcloud, a global cloud player and the European Cloud leader, has taken part in the 2024 Open Compute Project (OCP) Global Summit opening in San Jose, California. Following the OCP EMEA Regional Summit 2024 this spring, where OVHcloud released two whitepapers for the broader community to use freely, the Group unveils a new workstream proposal aimed at ...
Forescout Achieves IRAP Certification

Forescout Achieves IRAP Certification

Forescout has today announced it has completed the Information Security Registered Assessors Program (IRAP) assessment at Protected level for its cloud security platform. This milestone underscores Forescout’s commitment to delivering industry-leading cybersecurity solutions that are designed to meet the highest standards of data protection and ...
OpenText Cybersecurity’s 2024 Ransomware Survey: Supply Chain Attacks Surge, Ransom Payments Persist

OpenText Cybersecurity’s 2024 Ransomware Survey: Supply Chain Attacks Surge, Ransom Payments Persist

While companies improve defenses, almost half of respondents still suffer ransomware attacks and the resulting ransom payments only perpetuate the cycle of vulnerability
BeyondTrust Named a Leader Once Again in KuppingerCole Leadership Compass for Privileged Access Management

BeyondTrust Named a Leader Once Again in KuppingerCole Leadership Compass for Privileged Access Management

Report reaffirms BeyondTrust’s position as a Leader for the fifth consecutive year in the Privileged Access Management (PAM) market Report highlights Innovation, Market Leadership, and Product Excellence
ColorTokens Appoints Former MD Anderson CTO Chuck Suitor As Strategic Advisor For Healthcare

ColorTokens Appoints Former MD Anderson CTO Chuck Suitor As Strategic Advisor For Healthcare

SAN JOSE, Calif., October 10, 2024 – ColorTokens Inc., the leading enterprise microsegmentation company, announced today that Chuck Suitor has joined its Board of Advisors to help accelerate its healthcare presence. Suitor will provide strategic guidance as ColorTokens continues to innovate its differentiated cybersecurity offerings for the healthcare ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This