The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

Leadership That Empowers
Empowering Voices: Corien Shares Insights on Strong Leadership and Empowerment.

Women in Tech: Facing the Challenges Head On
As we commemorate International Women’s Day, I’ve been thinking both about the strides women in tech have made as well as the hurdles that remain. The overall female representation in large global technology firms was expected to reach 33% in 2022, inching up 2% since 2019, according to the most recent update from Deloitte. Moreover, the percentage of ...

From Chef to Cybersecurity Practitioner and a 25-year Cyber Career – Two Inspiring Stories Ahead of This International Women’s Day
Heidi Mejia, Client Executive, Tesserent
Heidi was working as a chef at several hospitality venues when Covid hit when work dried up overnight as the pandemic closed restaurants across Melbourne. Heidi had been thinking of working in cybersecurity for a long time and during lockdown, in her late 30s, began to contemplate what she really wanted to do ...

Inspiring Inclusion on International Women’s Day 2024
Joanne Wong discusses inclusivity in the cybersecurity industry on the occasion of International Women's Day 2024.
How to Build a Successful Data Security Strategy
Businesses once managed limited data, stored in physical formats or on local servers. Today, data has grown exponentially in volume, variety, and accessibility, seamlessly flowing through complex online networks and cloud platforms. This means securing that information is more important (and complicated) than ever before, and organisations must build a ...

Detecting Script-Based Attacks Against SAP
Cyberattacks against SAP systems have become more common with SAP customers generating 87% of total global commerce ($46 trillion), according to SAP.com. Attackers gain network access and then explore critical applications through port scanning and script-based exploration, and two two easy to identify attack examples are the password lock attack and ...
How AI Can Advance Your SAP Security Posture
This article explores AI’s role in SAP Security, highlighting some SAP security platform challenges and the importance of system hardening against exploit chains within SAP vulnerabilities.
QR Code Phishing Attacks (Quishing): What to Know and How to Stay Secure
Another new kind of phishing attack is on the rise and it’s coming from an unexpected source: QR codes. Like with other kinds of phishing, this kind of attack leverages trust—trust in the QR code itself as well as the brand attached to it. So what does a QR-based phishing attack look like and how can you protect yourself one? Josh Cigna from Yubico ...
No results found.
In the News
Sophos Receives Recognition as IT Reaches Key Milestones With Secureworks Acquisition
Sophos today announced it has been named a Leader in the IDC MarketScape™: Worldwide Extended Detection and Response (XDR) Software 2025 Vendor Assessment (doc #US52997325, September 2025) report.
The IDC MarketScape for Extended Detection and Response cites Sophos’ protection capabilities as a strength, noting, “Sophos is viewed favourably in terms ...
WhatsApp-Enabled ‘Vote for My Child’ Scams Are Rapidly Spreading Across Europe, Bitdefender Lab Warns
If you’ve ever wondered how someone could lose access to their WhatsApp account in a matter of seconds, the answer lies in cleverly crafted scams. Cybercriminals don’t need advanced malware or sophisticated hacking tools – instead they exploit trust, urgency, and empathy.
Bitdefender Labs has been monitoring a rapidly expanding campaign that ...
Kaseya Acquires Leading AI-Powered Email Security Provider INKY
Acquisition strengthens Kaseya’s end-to-end cybersecurity platform and advances Kaseya 365 User with next-generation, AI-driven email protection.
Elastic 2025 Global Threat Report Reveals AI Is Supercharging Old-School Tactics With New Scale
Released just in time for Cyber Security Awareness Month, Elastic’s new 2025 Global Threat Report reveals a sharp rise in AI-driven cyberattacks — a trend already playing out across Australia. High-profile breaches at Qantas, CommBank, and Optus highlight how even the most secure organisations are being tested as threat actors turn to AI to scale and ...
Kaseya Announces Latest Innovations at DattoCon 2025
New Datto SIRIS 6 appliance, AI-assisted email security acquisition and Datto Backup for Entra ID unveiled
Exabeam Appoints Pete Harteveld as CEO
BROOMFIELD, Colo. & FOSTER CITY, Calif. – October 8, 2025 – Exabeam, a global leader in intelligence and automation that powers security operations, today announced Pete Harteveld as Chief Executive Officer. The leadership transition follows the decision by Chris O’Malley to step into retirement after three years of dedicated service to the company ...
Honeywell, LS Electric Announce Global Partnership to Accelerate Innovation for Data Centres and Battery Energy Storage Systems
Honeywell (NASDAQ: HON) today announced a global strategic collaboration with LS ELECTRIC (KRX:010120) to jointly develop and market hardware and software solutions that simplify the power management and distribution for data centres and other building operators, helping improve operational efficiency and resiliency.
By combining LS ELECTRIC’s deep ...
Armis and Fortinet Deepen Strategic Partnership to Streamline Security Programs of Global Organisations
Together, Armis and Fortinet provide asset visibility, management, and enforcement capabilities that help security teams make architectural improvements, automate security programs, and protect the modern, expanded attack surface – empowering organisations with a more proactive security posture.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
- 337
- 338
- 339
- 340
- 341
- 342
- 343
- 344
- 345
- 346
- 347
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
