The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Women In Tech: Facing The Challenges Head On
As we commemorate International Women’s Day, I’ve been thinking both about the strides women in tech have made as well as the hurdles that remain. The overall female representation in large global technology firms was expected to reach 33% in 2022, inching up 2% since 2019, according to the most recent update from Deloitte. Moreover, the percentage of ...

From Chef To Cybersecurity Practitioner And A 25-Year Cyber Career – Two Inspiring Stories Ahead Of This International Women’s Day
Heidi Mejia, Client Executive, Tesserent
Heidi was working as a chef at several hospitality venues when Covid hit when work dried up overnight as the pandemic closed restaurants across Melbourne. Heidi had been thinking of working in cybersecurity for a long time and during lockdown, in her late 30s, began to contemplate what she really wanted to do ...

Inspiring Inclusion on International Women’s Day 2024
Joanne Wong discusses inclusivity in the cybersecurity industry on the occasion of International Women's Day 2024.
How To Build A Successful Data Security Strategy
Businesses once managed limited data, stored in physical formats or on local servers. Today, data has grown exponentially in volume, variety, and accessibility, seamlessly flowing through complex online networks and cloud platforms. This means securing that information is more important (and complicated) than ever before, and organisations must build a ...
Detecting Script-Based Attacks Against SAP
Cyberattacks against SAP systems have become more common with SAP customers generating 87% of total global commerce ($46 trillion), according to SAP.com. Attackers gain network access and then explore critical applications through port scanning and script-based exploration, and two two easy to identify attack examples are the password lock attack and ...
How AI Can Advance Your SAP Security Posture
This article explores AI’s role in SAP Security, highlighting some SAP security platform challenges and the importance of system hardening against exploit chains within SAP vulnerabilities.
QR Code Phishing Attacks (Quishing): What To Know and How To Stay Secure
Another new kind of phishing attack is on the rise and it’s coming from an unexpected source: QR codes. Like with other kinds of phishing, this kind of attack leverages trust—trust in the QR code itself as well as the brand attached to it. So what does a QR-based phishing attack look like and how can you protect yourself one? Josh Cigna from Yubico ...

How Generative AI Can Lend A Helping Hand To IT Security Teams
As security teams continue their constant battle against evolving threats and attackers, growing numbers are exploring the assistance that can be provided by new generative AI tools.
No results found.
In The News
JFrog Enables Trusted AI – Uncovers Critical Security Threats Emerging from AI’s Expansion in the Software Supply Chain
The Software Supply Chain State of the Union 2025 Report Reveals “Quad-fecta” of Security Exploits, Mis-scored CVEs, Poor ML Model Governance, & more are Jeopardising Trust in Newly Created Software
Tenable Research Uncovers A Privilege Escalation Vulnerability In Google Cloud Run – Security Flaw Highlights The Cascading Risks Of Cloud Service Dependencies
Tenable, the cloud exposure management company, has identified a privilege escalation vulnerability in Google Cloud Run called ImageRunner. The vulnerability could have allowed attackers to bypass permissions, gain unauthorised access to container images and potentially expose sensitive data.
Cloud Run, Google’s serverless container platform, uses a ...

World Cloud Security Day – CyberArk’s Insights On Effective Cloud Identity Security
“World Cloud Security Day is a timely reminder of the critical need for robust cloud identity security. Cloud-native organisations operating in complex, multi-cloud environments are navigating a rapidly evolving landscape and an explosion of identities – both human and machine - that traditional security models struggle to manage. The lack of ...
Motorola Solutions Delivers Resilient Security for Critical Infrastructure with New Pelco Portfolio
Motorola Solutions has announced the new Pelco, an innovative portfolio of artificial-intelligence-powered devices that are purpose-built for enterprises operating in some of the most challenging environments, like oil and gas and ports. Backed by the company’s deep engineering expertise and significant investments in research and development, Pelco’s ...
Rapid7 Recognises Top Global Partners With 2025 Partner Of The Year Awards
Annual channel awards program honours Rapid7 partners’ excellence in cybersecurity product and services delivery, customer retention, and more
Databricks Momentum Continues as ANZ Organisations Demand More AI, Data Intelligence
Databricks, the Data and AI company, today announced its strong momentum in the Australia & New Zealand (ANZ) market continues, with unrelenting demand for data and artificial intelligence (AI) capabilities across Australian enterprises and public sector organisations. Databricks has kept up with this growth by investing in ANZ headcount, and ...
Informatica Announces Krish Vitaldevara as EVP, Chief Product Officer
Informatica (NYSE: INFA), an AI-powered enterprise cloud data management leader, today announced the appointment of Krish Vitaldevara as Executive Vice President and Chief Product Officer. Bringing extensive experience from Microsoft, Google and most recently, NetApp, Vitaldevara will also join Informatica’s Executive Committee.
Databricks to Upskill NSW Public Sector in AI, Data Analytics
The strategic programme will upskill 100+ staff across various NSW State Government departments in data and AI skills
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..