The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Leadership That Empowers

Leadership That Empowers

Empowering Voices: Corien Shares Insights on Strong Leadership and Empowerment.
Women in Tech: Facing the Challenges Head On

Women in Tech: Facing the Challenges Head On

As we commemorate International Women’s Day, I’ve been thinking both about the strides women in tech have made as well as the hurdles that remain. The overall female representation in large global technology firms was expected to reach 33% in 2022, inching up 2% since 2019, according to the most recent update from Deloitte. Moreover, the percentage of ...
From Chef to Cybersecurity Practitioner and a 25-year Cyber Career – Two Inspiring Stories Ahead of This International Women’s Day

From Chef to Cybersecurity Practitioner and a 25-year Cyber Career – Two Inspiring Stories Ahead of This International Women’s Day

Heidi Mejia, Client Executive, Tesserent Heidi was working as a chef at several hospitality venues when Covid hit when work dried up overnight as the pandemic closed restaurants across Melbourne. Heidi had been thinking of working in cybersecurity for a long time and during lockdown, in her late 30s, began to contemplate what she really wanted to do ...
Inspiring Inclusion on International Women’s Day 2024

Inspiring Inclusion on International Women’s Day 2024

Joanne Wong discusses inclusivity in the cybersecurity industry on the occasion of International Women's Day 2024.
How to Build a Successful Data Security Strategy

How to Build a Successful Data Security Strategy

Businesses once managed limited data, stored in physical formats or on local servers. Today, data has grown exponentially in volume, variety, and accessibility, seamlessly flowing through complex online networks and cloud platforms. This means securing that information is more important (and complicated) than ever before, and organisations must build a ...
Detecting Script-Based Attacks Against SAP

Detecting Script-Based Attacks Against SAP

Cyberattacks against SAP systems have become more common with SAP customers generating 87% of total global commerce ($46 trillion), according to SAP.com. Attackers gain network access and then explore critical applications through port scanning and script-based exploration, and two two easy to identify attack examples are the password lock attack and ...

How AI Can Advance Your SAP Security Posture

This article explores AI’s role in SAP Security, highlighting some SAP security platform challenges and the importance of system hardening against exploit chains within SAP vulnerabilities.
QR Code Phishing Attacks (Quishing): What to Know and How to Stay Secure

QR Code Phishing Attacks (Quishing): What to Know and How to Stay Secure

Another new kind of phishing attack is on the rise and it’s coming from an unexpected source: QR codes. Like with other kinds of phishing, this kind of attack leverages trust—trust in the QR code itself as well as the brand attached to it. So what does a QR-based phishing attack look like and how can you protect yourself one? Josh Cigna from Yubico ...
No results found.

In the News

Teradata Unveils Autonomous Customer Intelligence – Agents, Operating Across Data and Applications, Will Leverage Decades of Teradata IP and Industry Knowledge to Autonomously Generate Business Value From Meaningful Customer Signals

Teradata Unveils Autonomous Customer Intelligence – Agents, Operating Across Data and Applications, Will Leverage Decades of Teradata IP and Industry Knowledge to Autonomously Generate Business Value From Meaningful Customer Signals

Teradata (NYSE: TDC) today announced the launch of Autonomous Customer Intelligence, a software and services offering designed to transform raw data and customer signals into context-aware, real-time actions at scale. This significant enhancement to Teradata's customer experience (CX) offerings will embed agents throughout the entire process — from ...
NetApp Takes on CEO Dare to Cure in Support of Childhood Cancer Research

NetApp Takes on CEO Dare to Cure in Support of Childhood Cancer Research

NetApp, the intelligent data infrastructure company, is proud to continue its partnership with Children’s Cancer Institute (the Institute) in its third year as the Presenting Partner of the CEO Dare to Cure initiative, a major fundraising event supporting critical research into childhood cancer.  Globally, according to the World Health Organisation, ...
KnowBe4 Pioneers Training AI Agents for the Next Generation Workforce

KnowBe4 Pioneers Training AI Agents for the Next Generation Workforce

HRM+ platform trains the most critical elements of security: humans and AI agents 
DroneShield Announces South Australia R&D Facility

DroneShield Announces South Australia R&D Facility

DroneShield has announced a $13 million investment in a new research and development (R&D) facility in Adelaide, South Australia. This $13 million investment is a direct contribution to South Australia’s economy, covering three years of operational and capital expenditure. It will initially create around 20 high-skilled engineering roles in ...
DriveSavers Partners With Computer Troubleshooters Australia to Provide Industry-Leading Data Recovery and Ransomware Response Services

DriveSavers Partners With Computer Troubleshooters Australia to Provide Industry-Leading Data Recovery and Ransomware Response Services

Melbourne, October 7, 2025 – In an era marked by rising cyber threats and growing data loss incidents, DriveSavers has officially announced a strategic partnership with Computer Troubleshooters Australia, one of the country’s most trusted IT franchise service networks. With a focus on servicing the small-to-medium business market this collaboration ...
Quorum Cyber Is a Proud Participant in the Microsoft Sentinel Partner Ecosystem

Quorum Cyber Is a Proud Participant in the Microsoft Sentinel Partner Ecosystem

Quorum Cyber is working with Microsoft product teams to shape Sentinel product development, including validation of new scenarios, feedback on product operations, and API extensibility - while also extending Sentinel’s capabilities as part of the partner ecosystem. By creating solutions such as connectors, analytics, playbooks, hunting queries, Jupyter ...
Fastly Recognised as a Gartner® Peer Insights™ Customer’s Choice for Seventh Consecutive Year, Trusted by Customers for Cloud Web Application and API Protection

Fastly Recognised as a Gartner® Peer Insights™ Customer’s Choice for Seventh Consecutive Year, Trusted by Customers for Cloud Web Application and API Protection

Sydney, 3 October 2025 - Fastly, Inc. (NYSE: FSLY), a leader in global edge cloud platforms, has announced that it was named a 2025 Gartner® Peer Insights™ Customers’ Choice for Cloud Web Application and API Protection (WAAP). Fastly received overall high ratings and is the only vendor to earn this recognition for seven consecutive years. The ...
New Infoblox Research Uncovers DNS TXT Abuse in Stealth Malware Campaign Infecting Thousands of Sites

New Infoblox Research Uncovers DNS TXT Abuse in Stealth Malware Campaign Infecting Thousands of Sites

New Infoblox Threat Intel research reveals that a long-running threat actor compromising websites, coined as “Detour Dog,” has evolved from scam redirects to deliver information stealing malware. This allows compromised sites to fetch and relay malicious execution output without any visible cues to the user, all using the domain name system (DNS) for ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This