The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

From Chef To Cybersecurity Practitioner And A 25-Year Cyber Career – Two Inspiring Stories Ahead Of This International Women’s Day

From Chef To Cybersecurity Practitioner And A 25-Year Cyber Career – Two Inspiring Stories Ahead Of This International Women’s Day

Heidi Mejia, Client Executive, Tesserent Heidi was working as a chef at several hospitality venues when Covid hit when work dried up overnight as the pandemic closed restaurants across Melbourne. Heidi had been thinking of working in cybersecurity for a long time and during lockdown, in her late 30s, began to contemplate what she really wanted to do ...
Inspiring Inclusion on International Women’s Day 2024

Inspiring Inclusion on International Women’s Day 2024

Joanne Wong discusses inclusivity in the cybersecurity industry on the occasion of International Women's Day 2024.
How To Build A Successful Data Security Strategy

How To Build A Successful Data Security Strategy

Businesses once managed limited data, stored in physical formats or on local servers. Today, data has grown exponentially in volume, variety, and accessibility, seamlessly flowing through complex online networks and cloud platforms. This means securing that information is more important (and complicated) than ever before, and organisations must build a ...

Detecting Script-Based Attacks Against SAP

Cyberattacks against SAP systems have become more common with SAP customers generating 87% of total global commerce ($46 trillion), according to SAP.com. Attackers gain network access and then explore critical applications through port scanning and script-based exploration, and two two easy to identify attack examples are the password lock attack and ...

How AI Can Advance Your SAP Security Posture

This article explores AI’s role in SAP Security, highlighting some SAP security platform challenges and the importance of system hardening against exploit chains within SAP vulnerabilities.
QR Code Phishing Attacks (Quishing): What To Know and How To Stay Secure

QR Code Phishing Attacks (Quishing): What To Know and How To Stay Secure

Another new kind of phishing attack is on the rise and it’s coming from an unexpected source: QR codes. Like with other kinds of phishing, this kind of attack leverages trust—trust in the QR code itself as well as the brand attached to it. So what does a QR-based phishing attack look like and how can you protect yourself one? Josh Cigna from Yubico ...
How Generative AI Can Lend A Helping Hand To IT Security Teams

How Generative AI Can Lend A Helping Hand To IT Security Teams

As security teams continue their constant battle against evolving threats and attackers, growing numbers are exploring the assistance that can be provided by new generative AI tools.
Why Taking A Customer-Centric Approach To Cybersecurity Incident Response Is Critical To Maintain Customer Trust

Why Taking A Customer-Centric Approach To Cybersecurity Incident Response Is Critical To Maintain Customer Trust

Introduction Cybersecurity is no longer just an IT issue; it directly impacts customer trust and loyalty. Customers expect their data to be secure and any breach can lead to a significant loss of customer confidence that impacts a company’s reputation and profitability. The increasing importance of regulatory compliance and legal obligations (1) mean ...
No results found.

In The News

Exabeam Named Triple Winner in 2025 Cybersecurity Excellence Awards

Exabeam Named Triple Winner in 2025 Cybersecurity Excellence Awards

Exabeam Secures Top Honors in SIEM, AI Security Solution, and Most Innovative Cybersecurity Company in 2025 Cybersecurity Excellence Awards
NinjaOne Announces New Capabilities to Improve Digital Employee Experience and Productivity

NinjaOne Announces New Capabilities to Improve Digital Employee Experience and Productivity

NinjaOne has announced expanded capabilities to help IT teams improve users’ experiences with their devices. The new use cases include self-service workflows, end-user dashboards, and user-centric automations to make organisations and their employees more efficient and productive. IT leaders are increasingly focusing not only on improving how they ...
CrowdStrike Fuels Partner Growth and Profitability with Expanded Accelerate Partner Program

CrowdStrike Fuels Partner Growth and Profitability with Expanded Accelerate Partner Program

New incentives, tools, training and resources make it easier for partners to consolidate cybersecurity on the Falcon platform, driving larger deals and superior customer outcomes
ISACA Study: 1 in 3 Tech Pros Switched Jobs in Past Two Years, leaving 74% of Firms Worried About IT Talent Retention

ISACA Study: 1 in 3 Tech Pros Switched Jobs in Past Two Years, leaving 74% of Firms Worried About IT Talent Retention

Heavy workloads and long hours cited as the top stressors for IT professionals, according to new ISACA research
CyberArk and Device Authority, in Collaboration with Microsoft, Deliver Secure Device Authentication for Manufacturers

CyberArk and Device Authority, in Collaboration with Microsoft, Deliver Secure Device Authentication for Manufacturers

CyberArk (NASDAQ: CYBR) and Device Authority, in collaboration with Microsoft, have launched a solution that strengthens and scales connected device authentication to enterprise applications with Zero Trust principles. It helps manufacturers reduce cyber risk from connected devices in factory floors and edge environments with robust identity security, ...
Check Point Software Technologies Partners with Cardano to Deliver Real-Time Threat Prevention Security Solution for Web3 and Blockchain

Check Point Software Technologies Partners with Cardano to Deliver Real-Time Threat Prevention Security Solution for Web3 and Blockchain

Unlocking Web3: How Real-Time Security Can Drive Blockchain Adoption
Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

Latest State of Security and Identity Report reveals a shift toward software-driven solutions and artificial intelligence in 2025
Quorum Cyber Receives Microsoft Security Excellence Awards Trifecta

Quorum Cyber Receives Microsoft Security Excellence Awards Trifecta

All finalists are members of the Microsoft Intelligent Security Association (MISA), an ecosystem of independent software vendors (ISVs) and managed security service providers (MSSPs) that have integrated their security products and services with Microsoft’s security technology.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This