The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Five Ways To Include More Women In Your ICT Organisation

Five Ways To Include More Women In Your ICT Organisation

There’s lots that companies can do to create workplaces that appeal to ambitious, high performing women.
Navigating Fair Compensation Like a Main Character

Navigating Fair Compensation Like a Main Character

Unpaid Expertise: Navigating the Challenges of Being Asked to Work for Free
Leadership That Empowers

Leadership That Empowers

Empowering Voices: Corien Shares Insights on Strong Leadership and Empowerment.
Women In Tech: Facing The Challenges Head On

Women In Tech: Facing The Challenges Head On

As we commemorate International Women’s Day, I’ve been thinking both about the strides women in tech have made as well as the hurdles that remain. The overall female representation in large global technology firms was expected to reach 33% in 2022, inching up 2% since 2019, according to the most recent update from Deloitte. Moreover, the percentage of ...
From Chef To Cybersecurity Practitioner And A 25-Year Cyber Career – Two Inspiring Stories Ahead Of This International Women’s Day

From Chef To Cybersecurity Practitioner And A 25-Year Cyber Career – Two Inspiring Stories Ahead Of This International Women’s Day

Heidi Mejia, Client Executive, Tesserent Heidi was working as a chef at several hospitality venues when Covid hit when work dried up overnight as the pandemic closed restaurants across Melbourne. Heidi had been thinking of working in cybersecurity for a long time and during lockdown, in her late 30s, began to contemplate what she really wanted to do ...
Inspiring Inclusion on International Women’s Day 2024

Inspiring Inclusion on International Women’s Day 2024

Joanne Wong discusses inclusivity in the cybersecurity industry on the occasion of International Women's Day 2024.
How To Build A Successful Data Security Strategy

How To Build A Successful Data Security Strategy

Businesses once managed limited data, stored in physical formats or on local servers. Today, data has grown exponentially in volume, variety, and accessibility, seamlessly flowing through complex online networks and cloud platforms. This means securing that information is more important (and complicated) than ever before, and organisations must build a ...
Detecting Script-Based Attacks Against SAP

Detecting Script-Based Attacks Against SAP

Cyberattacks against SAP systems have become more common with SAP customers generating 87% of total global commerce ($46 trillion), according to SAP.com. Attackers gain network access and then explore critical applications through port scanning and script-based exploration, and two two easy to identify attack examples are the password lock attack and ...
No results found.

In The News

Autonomous AI Agents Expand Attack Surface: Key Insights from Radware’s “Internet of Agents” Report

Autonomous AI Agents Expand Attack Surface: Key Insights from Radware’s “Internet of Agents” Report

Radware’s latest threat intelligence report, The Internet of Agents: The Next Threat Surface, delivers a stark warning for cybersecurity leaders. The rise of agentic AI—autonomous agents capable of reasoning, invoking tools, and interacting via emerging inter-agent protocols—marks a fundamental shift in how digital systems operate. But as organisations ...
Age Checks Set to Transform How Kids Play and Interact Online

Age Checks Set to Transform How Kids Play and Interact Online

Sydney, Australia, 17 September 2025 – With kids in Australia spending an average of over two hours each day on gaming platforms, and nearly one in three young gamers reporting bullying or abuse, regulatory pressure is mounting on online platforms to provide age-appropriate environments for kids. As well as the upcoming under-16s social media ban, ...
Sophos Report Finds Education Sector Strengthening Against Ransomware, but IT Teams Pay Personal Price

Sophos Report Finds Education Sector Strengthening Against Ransomware, but IT Teams Pay Personal Price

Recovery times improving with 97% of victims recovering encrypted data; ransom payments fall sharply
Anomali Launches Protect Virtual Conference ANZ 2025

Anomali Launches Protect Virtual Conference ANZ 2025

A Virtual User Conference for Cybersecurity and IT Leaders and Professionals Navigating Cyber Risk in the AI Era 
Check Point Acquires Lakera to Deliver End-to-End AI Security for Enterprises

Check Point Acquires Lakera to Deliver End-to-End AI Security for Enterprises

Together, Check Point and Lakera deliver one of the most advanced AI-native security platform, built to protect the full lifecycle of AI 
CrowdStrike and Salesforce Partner to Secure the Future of AI-Powered Business

CrowdStrike and Salesforce Partner to Secure the Future of AI-Powered Business

Integration of Falcon Shield with Salesforce Security Center and Charlotte AI with Agentforce delivers enhanced protection, visibility, and faster response for mission-critical AI agents, applications, and workflows
CrowdStrike Teams with NVIDIA to Build, Power, and Secure the Agentic Ecosystem

CrowdStrike Teams with NVIDIA to Build, Power, and Secure the Agentic Ecosystem

With Charlotte AI AgentWorks integrated with NVIDIA Nemotron models, analysts can build custom, no-code security agents; Falcon protects security and non-security agents across the AI ecosystem
CrowdStrike Unleashes the Agentic Security Workforce to Transform Security Operations

CrowdStrike Unleashes the Agentic Security Workforce to Transform Security Operations

CrowdStrike introduces new, mission-ready agents out of the box to automate high-impact workflows; Unveils Charlotte AI AgentWorks, the first no-code security agent development platform that enables teams to build, orchestrate, and scale AI agents securely
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This