The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Women in Tech: Facing the Challenges Head On

Women in Tech: Facing the Challenges Head On

As we commemorate International Women’s Day, I’ve been thinking both about the strides women in tech have made as well as the hurdles that remain. The overall female representation in large global technology firms was expected to reach 33% in 2022, inching up 2% since 2019, according to the most recent update from Deloitte. Moreover, the percentage of ...
From Chef to Cybersecurity Practitioner and a 25-year Cyber Career – Two Inspiring Stories Ahead of This International Women’s Day

From Chef to Cybersecurity Practitioner and a 25-year Cyber Career – Two Inspiring Stories Ahead of This International Women’s Day

Heidi Mejia, Client Executive, Tesserent Heidi was working as a chef at several hospitality venues when Covid hit when work dried up overnight as the pandemic closed restaurants across Melbourne. Heidi had been thinking of working in cybersecurity for a long time and during lockdown, in her late 30s, began to contemplate what she really wanted to do ...
Inspiring Inclusion on International Women’s Day 2024

Inspiring Inclusion on International Women’s Day 2024

Joanne Wong discusses inclusivity in the cybersecurity industry on the occasion of International Women's Day 2024.
How to Build a Successful Data Security Strategy

How to Build a Successful Data Security Strategy

Businesses once managed limited data, stored in physical formats or on local servers. Today, data has grown exponentially in volume, variety, and accessibility, seamlessly flowing through complex online networks and cloud platforms. This means securing that information is more important (and complicated) than ever before, and organisations must build a ...
Detecting Script-Based Attacks Against SAP

Detecting Script-Based Attacks Against SAP

Cyberattacks against SAP systems have become more common with SAP customers generating 87% of total global commerce ($46 trillion), according to SAP.com. Attackers gain network access and then explore critical applications through port scanning and script-based exploration, and two two easy to identify attack examples are the password lock attack and ...

How AI Can Advance Your SAP Security Posture

This article explores AI’s role in SAP Security, highlighting some SAP security platform challenges and the importance of system hardening against exploit chains within SAP vulnerabilities.
QR Code Phishing Attacks (Quishing): What to Know and How to Stay Secure

QR Code Phishing Attacks (Quishing): What to Know and How to Stay Secure

Another new kind of phishing attack is on the rise and it’s coming from an unexpected source: QR codes. Like with other kinds of phishing, this kind of attack leverages trust—trust in the QR code itself as well as the brand attached to it. So what does a QR-based phishing attack look like and how can you protect yourself one? Josh Cigna from Yubico ...
How Generative AI Can Lend a Helping Hand to IT Security Teams

How Generative AI Can Lend a Helping Hand to IT Security Teams

As security teams continue their constant battle against evolving threats and attackers, growing numbers are exploring the assistance that can be provided by new generative AI tools.
No results found.

In the News

DroneShield Strengthens Technology Leadership Team

DroneShield Strengthens Technology Leadership Team

DroneShield has announced the appointment of Angus Harris to the role of Chief Technology Officer (CTO). This appointment reflects the Company’s continued growth and organisational maturity as it scales to meet accelerating global demand across defence and government markets. Mr. Harris brings a wealth of technical and leadership experience from his ...
Quorum Cyber Named CyberSecurity Breakthrough’s Managed Security Service Provider of the Year 2025

Quorum Cyber Named CyberSecurity Breakthrough’s Managed Security Service Provider of the Year 2025

This latest award closely follows several other accolades for Quorum Cyber this year, including being named Security MSSP of the Year in the Microsoft Security Excellence Awards 2025, winning the Cybersecurity Company of the Year award at the 2025 Scottish Cyber Awards, and being named a finalist in the Cyber Security Team of the Year category at the ...
Camelot Secure and DigiFlight Win Top Honors at Maryland’s Cybersecurity Association 2025 Cybersecurity Awards

Camelot Secure and DigiFlight Win Top Honors at Maryland’s Cybersecurity Association 2025 Cybersecurity Awards

The high-profile recognition reflects Camelot Secure’s groundbreaking work in fostering new pipelines of cybersecurity talent through its partnerships with Universities and Historically Black Colleges and Universities (HBCUs). These initiatives empower students through real-world projects, capstones, internships, and hands-on use of Camelot Secure’s ...
Extortion and Ransomware Drive Over Half of Cyberattacks

Extortion and Ransomware Drive Over Half of Cyberattacks

In the first half of 2025, Microsoft data showed Australia ranked 10th globally among countries where customers were most frequently impacted by cyber activity.

BeyondTrust Named a Leader in 2025 Gartner Magic Quadrant for Privileged Access Management

BeyondTrust positioned highest for Ability to Execute, combined with its Completeness of Vision, contributed to its position as a Leader in this year’s report We believe placement in the Leaders Quadrant reflects BeyondTrust’s identity-first approach to protecting Paths to Privilege™ across hybrid, multicloud, and AI-driven environments
CyberArk Named a Leader in the 2025 Gartner® Magic Quadrant™ for Privileged Access Management

CyberArk Named a Leader in the 2025 Gartner® Magic Quadrant™ for Privileged Access Management

CyberArk (NASDAQ: CYBR), the global leader in identity security, today announced it has been named a Leader in the 2025 Gartner® Magic Quadrant™ for Privileged Access Management1. Recognised as a Leader for the seventh consecutive time, CyberArk is positioned furthest in Completeness of Vision which, from the company's standpoint, reflects CyberArk's ...
Semperis Announces Midnight in the War Room: A Groundbreaking Cyberwar Documentary Featuring the World’s Leading Defenders and Reformed Hackers

Semperis Announces Midnight in the War Room: A Groundbreaking Cyberwar Documentary Featuring the World’s Leading Defenders and Reformed Hackers

The first-of-its-kind feature film delves into the high-stakes conflict between cyber attackers and defenders, revealing untold stories of CISOs - their heroism, resilience, and the human cost of cyber war.
Threat Spotlight: Barracuda Unpacks a Stealthy New Phishing Kit Targeting Microsoft 365

Threat Spotlight: Barracuda Unpacks a Stealthy New Phishing Kit Targeting Microsoft 365

SYDNEY, Australia - 16 October 2025 - An emerging, stealthy and persistent phishing-as-a-service (PhaaS) kit is stealing credentials and authentication tokens from Microsoft 365 users, according to new research from Barracuda. Barracuda threat analysts have been tracking the new and rapidly evolving PhaaS since July 2025 and have named it Whisper ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This