The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Women In Tech: Facing The Challenges Head On

Women In Tech: Facing The Challenges Head On

As we commemorate International Women’s Day, I’ve been thinking both about the strides women in tech have made as well as the hurdles that remain. The overall female representation in large global technology firms was expected to reach 33% in 2022, inching up 2% since 2019, according to the most recent update from Deloitte. Moreover, the percentage of ...
From Chef To Cybersecurity Practitioner And A 25-Year Cyber Career – Two Inspiring Stories Ahead Of This International Women’s Day

From Chef To Cybersecurity Practitioner And A 25-Year Cyber Career – Two Inspiring Stories Ahead Of This International Women’s Day

Heidi Mejia, Client Executive, Tesserent Heidi was working as a chef at several hospitality venues when Covid hit when work dried up overnight as the pandemic closed restaurants across Melbourne. Heidi had been thinking of working in cybersecurity for a long time and during lockdown, in her late 30s, began to contemplate what she really wanted to do ...
Inspiring Inclusion on International Women’s Day 2024

Inspiring Inclusion on International Women’s Day 2024

Joanne Wong discusses inclusivity in the cybersecurity industry on the occasion of International Women's Day 2024.
How To Build A Successful Data Security Strategy

How To Build A Successful Data Security Strategy

Businesses once managed limited data, stored in physical formats or on local servers. Today, data has grown exponentially in volume, variety, and accessibility, seamlessly flowing through complex online networks and cloud platforms. This means securing that information is more important (and complicated) than ever before, and organisations must build a ...
Detecting Script-Based Attacks Against SAP

Detecting Script-Based Attacks Against SAP

Cyberattacks against SAP systems have become more common with SAP customers generating 87% of total global commerce ($46 trillion), according to SAP.com. Attackers gain network access and then explore critical applications through port scanning and script-based exploration, and two two easy to identify attack examples are the password lock attack and ...
How AI Can Advance Your SAP Security Posture

How AI Can Advance Your SAP Security Posture

This article explores AI’s role in SAP Security, highlighting some SAP security platform challenges and the importance of system hardening against exploit chains within SAP vulnerabilities.
QR Code Phishing Attacks (Quishing): What To Know and How To Stay Secure

QR Code Phishing Attacks (Quishing): What To Know and How To Stay Secure

Another new kind of phishing attack is on the rise and it’s coming from an unexpected source: QR codes. Like with other kinds of phishing, this kind of attack leverages trust—trust in the QR code itself as well as the brand attached to it. So what does a QR-based phishing attack look like and how can you protect yourself one? Josh Cigna from Yubico ...
How Generative AI Can Lend A Helping Hand To IT Security Teams

How Generative AI Can Lend A Helping Hand To IT Security Teams

As security teams continue their constant battle against evolving threats and attackers, growing numbers are exploring the assistance that can be provided by new generative AI tools.

In The News

Wavelink and Orca Security Ink Distribution Agreement, Bringing Comprehensive Cloud Security to the Channel

Wavelink and Orca Security Ink Distribution Agreement, Bringing Comprehensive Cloud Security to the Channel

April 23, 2024 – Wavelink, a leader in providing enterprise solutions to the channel, has announced a new distribution agreement with Orca Security, the pioneer of agentless cloud security. Wavelink is distributing Orca Security’s agentless-first cloud security platform, offering customers an alternative to agent-based solutions in order to deliver ...
BeyondTrust’s Annual Microsoft Vulnerabilities Report Finds Vulnerability Numbers Remain High with Elevation of Privilege Remaining the #1 Vulnerability Category

BeyondTrust’s Annual Microsoft Vulnerabilities Report Finds Vulnerability Numbers Remain High with Elevation of Privilege Remaining the #1 Vulnerability Category

Elevation of Privilege is the top vulnerability category for the fourth year running, accounting for 40% of all Microsoft vulnerabilities in 2023 Total vulnerabilities maintain 4-year holding pattern near record highs Atlanta, GA – April 22, 2024 – BeyondTrust, the worldwide leader in intelligent identity and access security, today announced the ...
Employers Mutual Limited Insures Risk Management with SentinelOne®

Employers Mutual Limited Insures Risk Management with SentinelOne®

SYDNEY, April 23, 2024 - As an insurer, Employers Mutual Limited (EML) knows a few things about risk. The injury management specialist selected SentinelOne (NYSE: S), a global leader in AI-powered security, as its platform to mitigate it. “Security is a huge driver for our business,” said Hayden MacKellar, Information and Security Risk Manager, EML. ...
Macquarie Government Selected for Australian Defence Procurement Panel

Macquarie Government Selected for Australian Defence Procurement Panel

Macquarie Government today announced it has been added to the Information Communications Technology Provider Arrangement (ICTPA) panel. This will enable the Australian Defence Force to procure services directly from Macquarie Government. Established in 2018 to replace the Applications Managed Service Partner Agreement (AMSPA), the ICTPA has been ...
Tecala to Strengthen Customer Email Security Defences with Check Point Software Technologies Partnership

Tecala to Strengthen Customer Email Security Defences with Check Point Software Technologies Partnership

Sydney, 22 April 2024 - Leading technology service provider Tecala Group has announced that it has been appointed a Check Point Software Technologies partner in Australia with a focus on reinforcing customers’ email cybersecurity posture and providing comprehensive cybersecurity solutions that not only protect against known threats but also anticipate ...
Fortinet Named a Challenger in the 2024 Gartner® Magic Quadrant™ for Security Service Edge

Fortinet Named a Challenger in the 2024 Gartner® Magic Quadrant™ for Security Service Edge

Fortinet recognised in eight Gartner® Magic Quadrant™ reports, based on the Fortinet Security Fabric Platform
Cisco Reimagines Security for Data Centres and Clouds in Era of AI

Cisco Reimagines Security for Data Centres and Clouds in Era of AI

Cisco Hypershield Brings Power of Hyperscaler Security and Connectivity to the Enterprise
BeyondTrust Announces 2024 APJ Partner Experience Award Winners

BeyondTrust Announces 2024 APJ Partner Experience Award Winners

Sydney – 18 April 2024 - BeyondTrust, the leader in intelligent identity and access security, today announced the winners of its APJ Partner Experience Awards for those companies which have gone above and beyond in their commitment to meeting customer identity and access security needs this past year. The BeyondTrust Partner Experience Awards ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This