The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Pamela Philip

Pamela Philip

Name: Pamela Philip Company: Tenable Title: Sr. PR Manager, APJ   Why do you enjoy working in the cyber security field?  When you tell someone you’re a lawyer, you get asked for legal advice. Similarly, when you tell someone you’re working in cybersecurity, you instantly become a magnet for all their theories about well-known cyberattacks and ...
Jaspreet Randhawa

Jaspreet Randhawa

Name: Jaspreet Randhawa Title: Solutions Architect Company: Ping Identity   Why do you enjoy working in the cyber security field? Cyber Security is never boring or monotonous. Every customer has a unique vector they operate across and thus has explicit cyber security challenges that must be addressed. This is where it gets interesting to map our ...
Soumi Mukherjee

Soumi Mukherjee

Name: Soumi Mukherjee Company: Rapid7 Title: Manager, ANZ North Why do you enjoy working in the cyber security field? To start with, there's no boring day in Cybersec. But on a serious note, I feel Cyber Security is crucial for digital transformation which provides the promise of a better tomorrow for all.   What are your words of advice to ...
Heather Gantt-Evans

Heather Gantt-Evans

Name: Heather Gantt-Evans Company: SailPoint Technologies, Inc Title: Chief Information Security Officer, SailPoint   Why do you enjoy working in the cyber security field? I enjoy the field of cybersecurity for so many reasons. To list a few, I enjoy the continuous learning involved with keeping up with the evolving best practices and threat ...
Jana Dekanovska

Jana Dekanovska

Name: Jana Dekanovska Company: CrowdStrike Title: Strategic Threat Advisor   Why do you enjoy working in the cyber security field? Not one day is the same in the field of cyber threat intelligence. Things move very quickly, giving you little chance to get bored. The other aspect of cyber threat intelligence that resonates with me is its ...
Harini Sudarshan

Harini Sudarshan

Name: Harini Sudarshan Company: Ping Identity Title: Senior Manager - Technical Support   Why do you enjoy working in the cyber security field? At Ping Identity, I oversee a group of product support engineers who assist our customers in securing logins to applications for our customers, freeing them to focus on their core objectives without ...
Mia Guo

Mia Guo

Name: Mia Guo Company: WatchGuard Technologies Title: ANZ Field Marketing Manager   Why do you enjoy working in the cyber security field? Cybersecurity is a rapidly evolving field and it’s impacting our day to day life. It’s exciting to constantly learn about new technologies, threats, policies and solutions to stay ahead of the curve. There are ...
Abigail Showman

Abigail Showman

Abigail Showman Title: Senior Team Lead Company: Flashpoint   Why do you enjoy working in the cybersecurity field? Issues in cybersecurity are dynamic and constantly evolving, and there’s always a puzzle to solve regarding what threat actors are doing now and what they will decide to do next. As an intelligence analyst by trade, for me it means ...

In The News

Würth NZ Accelerates Automation and Data Protection with Cloudian Object Storage

Würth NZ Accelerates Automation and Data Protection with Cloudian Object Storage

Leading New Zealand automotive and construction trade supplier deploys Cloudian object storage to protect data from ransomware, accelerate workloads, and create data runway for future digital services like AI
Sophos Supports Shift to Hybrid Environments with New Generation of   Remotely Managed Wi-Fi 6 Access Points

Sophos Supports Shift to Hybrid Environments with New Generation of Remotely Managed Wi-Fi 6 Access Points

Sophos, a global leader in innovating and delivering cybersecurity as a service, today announced the Sophos AP6 Series to support the shift to hybrid environments with a new generation of remotely managed Wi-Fi 6 access points. The new offering adds another component to Sophos’ secure access portfolio, which includes Sophos Firewall and Sophos Switch.
Arctic Wolf advances global security operations portfolio with launch of incident response services in EMEA and ANZ Regions

Arctic Wolf advances global security operations portfolio with launch of incident response services in EMEA and ANZ Regions

International customers, channel community, and cyber insurance partners can now leverage Arctic Wolf’s response and recovery expertise
Pax8 Announces Strategic Relationship and Growth Capital Financing with Global Banking Leader HSBC

Pax8 Announces Strategic Relationship and Growth Capital Financing with Global Banking Leader HSBC

Relationship Demonstrates Shared Focus for Driving Innovation Worldwide
SolarWinds Unveils Enhancements to Channel Partner Program

SolarWinds Unveils Enhancements to Channel Partner Program

SolarWinds updates Transform Partner Program, announces new tier qualifications and improved benefits to accelerate growth and drive revenue for partners
Tenable Unveils Comprehensive Web Application and API Scanning Capabilities for Nessus Expert

Tenable Unveils Comprehensive Web Application and API Scanning Capabilities for Nessus Expert

Tenable®, the Exposure Management company, today announced web application and API scanning in Tenable Nessus Expert, new features that provide simple and comprehensive vulnerability scanning for modern web applications and APIs.
Absolute Software Expands Application Resilience Ecosystem

Absolute Software Expands Application Resilience Ecosystem

Empowers joint customers to strengthen cyber resiliency and fortify more than 80 mission-critical security and business tools
Adversary-Sponsored Research Contests on Cybercriminal Forums Focus on New Methods of Attack and Evasion, Sophos Research Reveals

Adversary-Sponsored Research Contests on Cybercriminal Forums Focus on New Methods of Attack and Evasion, Sophos Research Reveals

Criminal Community-Sponsored Contests Mirror Cybercrime Trends, Such as Disabling AV/EDR, Cryptocurrency Fraud, and C2 Frameworks

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governements, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This