The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Navigating Fair Compensation Like a Main Character

Navigating Fair Compensation Like a Main Character

Unpaid Expertise: Navigating the Challenges of Being Asked to Work for Free
Leadership That Empowers

Leadership That Empowers

Empowering Voices: Corien Shares Insights on Strong Leadership and Empowerment.
Women In Tech: Facing The Challenges Head On

Women In Tech: Facing The Challenges Head On

As we commemorate International Women’s Day, I’ve been thinking both about the strides women in tech have made as well as the hurdles that remain. The overall female representation in large global technology firms was expected to reach 33% in 2022, inching up 2% since 2019, according to the most recent update from Deloitte. Moreover, the percentage of ...
From Chef To Cybersecurity Practitioner And A 25-Year Cyber Career – Two Inspiring Stories Ahead Of This International Women’s Day

From Chef To Cybersecurity Practitioner And A 25-Year Cyber Career – Two Inspiring Stories Ahead Of This International Women’s Day

Heidi Mejia, Client Executive, Tesserent Heidi was working as a chef at several hospitality venues when Covid hit when work dried up overnight as the pandemic closed restaurants across Melbourne. Heidi had been thinking of working in cybersecurity for a long time and during lockdown, in her late 30s, began to contemplate what she really wanted to do ...
Inspiring Inclusion on International Women’s Day 2024

Inspiring Inclusion on International Women’s Day 2024

Joanne Wong discusses inclusivity in the cybersecurity industry on the occasion of International Women's Day 2024.
How To Build A Successful Data Security Strategy

How To Build A Successful Data Security Strategy

Businesses once managed limited data, stored in physical formats or on local servers. Today, data has grown exponentially in volume, variety, and accessibility, seamlessly flowing through complex online networks and cloud platforms. This means securing that information is more important (and complicated) than ever before, and organisations must build a ...
Detecting Script-Based Attacks Against SAP

Detecting Script-Based Attacks Against SAP

Cyberattacks against SAP systems have become more common with SAP customers generating 87% of total global commerce ($46 trillion), according to SAP.com. Attackers gain network access and then explore critical applications through port scanning and script-based exploration, and two two easy to identify attack examples are the password lock attack and ...

How AI Can Advance Your SAP Security Posture

This article explores AI’s role in SAP Security, highlighting some SAP security platform challenges and the importance of system hardening against exploit chains within SAP vulnerabilities.
No results found.

In The News

Backing Local, Securing National: Minister Opens New Cube Cyber Cybersecurity Operations Centre in Queensland

Backing Local, Securing National: Minister Opens New Cube Cyber Cybersecurity Operations Centre in Queensland

Brisbane, 5 September 2025 - In a significant step forward for sovereign cyber defence, The Hon. Steven Minnikin MP, Minister for Customer Services and Open Data and Minister for Small and Family Business, has officially opened Queensland headquartered Cube Cyber’s new Security Operations Centre (SOC) in Brisbane. The Cube Cyber centre represents a ...
Boomi Enterprise Platform Delivered 347% ROI and $9.8M NPV, According To New Independent TEI Study

Boomi Enterprise Platform Delivered 347% ROI and $9.8M NPV, According To New Independent TEI Study

SYDNEY, AUSTRALIA – Sept. 5, 2025 – Boomi™, the leader in AI-driven automation, today announced the results of a new Total Economic Impact™ (TEI) study conducted by Forrester Consulting. The study found that organisations using the Boomi Enterprise Platform achieved a 347 per cent return on investment (ROI) and a net present value (NPV) of $9.8 million ...
Claroty Named a Leader In IoT Security By Leading Independent Research Firm

Claroty Named a Leader In IoT Security By Leading Independent Research Firm

New analyst report gives Claroty highest score possible across 10 current offering and strategy criteria
Check Point Software Technologies Appoints Brett Theiss as Chief Marketing Officer to Drive Global Brand and Growth Strategy

Check Point Software Technologies Appoints Brett Theiss as Chief Marketing Officer to Drive Global Brand and Growth Strategy

Redwood City, CA – September 2, 2025 – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced the appointment of Brett Theiss as Chief Marketing Officer (CMO). As CMO, Theiss will shape and accelerate Check Point’s global growth agenda, strengthening brand presence, fuelling ...
Threat Spotlight: Tycoon Phishing Kit Reveals New Techniques to Hide Malicious Links

Threat Spotlight: Tycoon Phishing Kit Reveals New Techniques to Hide Malicious Links

SYDNEY, Australia – 4 September 2025 – Barracuda threat analysts have published a report on the latest techniques being used by the Tycoon phishing-as-a-service (PhaaS) kit to hide malicious links in emails. The techniques are designed to obscure, muddle and disrupt the structure of links, or URLs, with the aim of confusing automated detection systems ...
Veeam Launches Its First Fully Preconfigured, Software-only Appliance

Veeam Launches Its First Fully Preconfigured, Software-only Appliance

Veeam® Software, the #1 global leader by market share in Data Resilience, today announced the availability of its first fully pre-built, pre-hardened software appliance: the new Veeam Software Appliance. Built to give IT teams instant protection without complexity, the appliance eliminates the friction of manual setup, OS patching, and Windows ...
Sophos Endpoint Now Integrated with Taegis MDR and XDR

Sophos Endpoint Now Integrated with Taegis MDR and XDR

Sophos has announced that its endpoint Solution is now natively integrated and automatically included in all Taegis™ Extended Detection and Response (XDR) and Taegis Managed Detection and Response (MDR) subscriptions. This milestone gives customers immediate access to combined prevention, detection, and response capabilities in a single platform – ...
BT Enters Agreement with TNS for the Sale of its Radianz Business

BT Enters Agreement with TNS for the Sale of its Radianz Business

BT and Transaction Network Services (TNS) today announced that TNS has agreed to acquire BT’s Radianz business. The transaction is expected to complete during the first half of 2026, subject to customary closing conditions, including regulatory clearance.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This