The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Women In Tech: Facing The Challenges Head On

Women In Tech: Facing The Challenges Head On

As we commemorate International Women’s Day, I’ve been thinking both about the strides women in tech have made as well as the hurdles that remain. The overall female representation in large global technology firms was expected to reach 33% in 2022, inching up 2% since 2019, according to the most recent update from Deloitte. Moreover, the percentage of ...
From Chef To Cybersecurity Practitioner And A 25-Year Cyber Career – Two Inspiring Stories Ahead Of This International Women’s Day

From Chef To Cybersecurity Practitioner And A 25-Year Cyber Career – Two Inspiring Stories Ahead Of This International Women’s Day

Heidi Mejia, Client Executive, Tesserent Heidi was working as a chef at several hospitality venues when Covid hit when work dried up overnight as the pandemic closed restaurants across Melbourne. Heidi had been thinking of working in cybersecurity for a long time and during lockdown, in her late 30s, began to contemplate what she really wanted to do ...
Inspiring Inclusion on International Women’s Day 2024

Inspiring Inclusion on International Women’s Day 2024

Joanne Wong discusses inclusivity in the cybersecurity industry on the occasion of International Women's Day 2024.
How To Build A Successful Data Security Strategy

How To Build A Successful Data Security Strategy

Businesses once managed limited data, stored in physical formats or on local servers. Today, data has grown exponentially in volume, variety, and accessibility, seamlessly flowing through complex online networks and cloud platforms. This means securing that information is more important (and complicated) than ever before, and organisations must build a ...

Detecting Script-Based Attacks Against SAP

Cyberattacks against SAP systems have become more common with SAP customers generating 87% of total global commerce ($46 trillion), according to SAP.com. Attackers gain network access and then explore critical applications through port scanning and script-based exploration, and two two easy to identify attack examples are the password lock attack and ...

How AI Can Advance Your SAP Security Posture

This article explores AI’s role in SAP Security, highlighting some SAP security platform challenges and the importance of system hardening against exploit chains within SAP vulnerabilities.
QR Code Phishing Attacks (Quishing): What To Know and How To Stay Secure

QR Code Phishing Attacks (Quishing): What To Know and How To Stay Secure

Another new kind of phishing attack is on the rise and it’s coming from an unexpected source: QR codes. Like with other kinds of phishing, this kind of attack leverages trust—trust in the QR code itself as well as the brand attached to it. So what does a QR-based phishing attack look like and how can you protect yourself one? Josh Cigna from Yubico ...
How Generative AI Can Lend A Helping Hand To IT Security Teams

How Generative AI Can Lend A Helping Hand To IT Security Teams

As security teams continue their constant battle against evolving threats and attackers, growing numbers are exploring the assistance that can be provided by new generative AI tools.
No results found.

In The News

Kaseya Announces Latest Innovations at Connect 2025

Kaseya Announces Latest Innovations at Connect 2025

New capabilities and commercial policies launched to help drive efficiency and streamline IT operations
New CyberArk Report Reveals Surge in Machine Identities as Cyber Priorities Lag Behind in Australian Organisations

New CyberArk Report Reveals Surge in Machine Identities as Cyber Priorities Lag Behind in Australian Organisations

Machine identities – most with unsecured access - are skyrocketing, increasing enterprise risk    Fragmented identity strategies leave critical assets exposed as cyber risks escalate Business-first mindset leaves compliance and security trailing behind
Lenovo Unveils Largest-ever Storage Refresh to Power the AI Era

Lenovo Unveils Largest-ever Storage Refresh to Power the AI Era

Lenovo today announced its largest storage portfolio refresh in company history, unveiling new Lenovo Data Storage Solutions that prepare enterprise IT for the age of AI with better efficiency, performance and scalability. The complete portfolio includes storage arrays, software defined storage (SDI), and new AI and virtualisation innovations to ...
Elastic Launches Automatic Migration to Simplify SIEM Migration

Elastic Launches Automatic Migration to Simplify SIEM Migration

Automates switch from incumbent SIEM to Elastic Security without the need to manually rebuild existing detection rules
Qualys Expands Platform to Protect Against AI and LLM Model Risk from Development to Deployment

Qualys Expands Platform to Protect Against AI and LLM Model Risk from Development to Deployment

New enhancements inTotalAI strengthen AI security capabilities with extended threat coverage, multi‑modal protections, and internal LLM scanner 
CrowdStrike Unveils New Innovations to Secure Every Area of Cloud Risk, from AI Models to Runtime Data

CrowdStrike Unveils New Innovations to Secure Every Area of Cloud Risk, from AI Models to Runtime Data

New innovations secure AI, data, identities and SaaS applications – expanding CrowdStrike’s leadership in delivering unified protection across hybrid and multi-cloud environments
76% Of Australian Orgs Experienced High-Impact Cyber Events Halting Critical Business Functions In Past Year

76% Of Australian Orgs Experienced High-Impact Cyber Events Halting Critical Business Functions In Past Year

Semperis Launches Ready1 to Transform Cyber Crisis Response in ANZ.
Censys Launches Threat Hunting Solution to Proactively Track and Defend Against Targeted Adversaries

Censys Launches Threat Hunting Solution to Proactively Track and Defend Against Targeted Adversaries

This solution helps security teams hunt faster, accelerate investigations and eliminate threats before they attack
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This