The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Is the Cybersecurity of Your Business PEXA Ready?
You may have read about the highly publicised PEXA fraud which was reported whereby a Melbourne family was left homeless. As it transpired, the family’s conveyancer had their email hijacked by a cybercriminal. This lead to the conveyancer’s PEXA account being compromised and ultimately the theft of $250,000 by the criminal misdirecting settlement ...

Cybersecurity Tips for Conveyancers and Solicitors using PEXA
You may have heard of the recent cybercrime perpetrated against the Australian e-conveyancing platform PEXA. A former MasterChef finalist and her family had $250,000 stolen from a property purchase transaction on the platform at settlement. In the following article, we explain the likely ways the fraud occurred and what practical things you can do ...
How you can protect your Microsoft Exchange email service from cyber attacks
Microsoft Exchange is a popular choice for providing email services for businesses. Its email features and seamless integration with Microsoft Outlook are undoubtedly convenient and easy to use, but what about security?
Microsoft Exchange runs exclusively on Windows Server, which in 2017 was affected by various critical vulnerabilities, putting ...
Report: Australia’s Top Law Firms Lead the Way in the Use of Anti-Phishing Technologies
Most of Australia’s top-tier and mid-tier law firms are well prepared in defending against phishing attacks, Iron Bastion's new study can now reveal.
Iron Bastion have assessed Australia’s top one hundred law firms for their use of anti-phishing technology. The details were gathered from various public data sources to determine whether email services ...

Zooming Around
How is Zoom changing us, and how are we changing Zoom?🧐 With the current state of the world, how reliable and secure is the platform upon which so many now rely?

WHAT IS CPS234 AND WHAT DOES IT MEAN FOR ME?
An increase in the risk of cyber security brings an increase in the publicity surrounding the issue and the regulations governing it. This year we have already seen a number of new regulations coming into effect that will impact the majority of both Australian and international organisations.
In March 2018, the Australian Prudential Regulation ...

To Infinity & Beyond… With Artificial Intelligence
We are always hearing about technologies that are trending. But what happens next for technology disruptors? For me, it's about understanding these developments and actually looking intrinsically about why these particular trends are going to accelerate the cloud computing space. The way I see it is that machine learning algorithms and advanced ...

Critical Communications
Topic: Communication for internal teams on the importance of understanding risk
If all communication was abolished, society would crumble. Fast. Yet one area that I have noticed in the security industry which I believe needs a lot of attention - and often goes unmentioned - is how we communicate internally to our teams on the importance of ...
No results found.
In The News
WatchGuard Unveils FireCloud Internet Access to Drive Hybrid SASE Implementations
FireCloud Internet Access is the first of the FireCloud suite of products in WatchGuard’s SASE portfolio.
New Claroty Research – 89% of Healthcare Orgs Use High-Risk Medical Devices Containing Known Security Vulnerabilities
Claroty, the cyber-physical systems (CPS) protection company, today released new research on the riskiest exposures to connected medical devices most coveted for exploitation by adversaries. Based on analysis of over 2.25 million Internet of Medical Things (IoMT) and 647,000-plus operational technology (OT) devices across 351 healthcare organisations, ...
New Trustwave Research Finds Patient Lives at Risk In Healthcare With Cybersecurity Vulnerabilities
March 27, 2025 – Trustwave, a leading cybersecurity and managed security services provider, has released a series of reports detailing the threats facing the healthcare sector. The combination of highly-sensitive patient data, legacy systems, increasing reliance on telehealth services, and more connected devices, means healthcare is a prime target for ...
The Great AI Divide: New Survey Finds Financial Services Leaders Struggle with Data Governance and Infrastructure Demands
Hitachi Vantara report reveals 84% of leaders fear catastrophic data loss as AI strains infrastructure and 41% say AI is already a critical part of their function
Proofpoint Establishes Global Strategic Alliance with Microsoft to Build on Azure and Strengthen Human-Centric Cybersecurity for Organisations
Companies deepen technology collaboration by making Azure the platform for Proofpoint innovation, providing joint customers with more powerful, seamless human-centric security
Trend Micro Customers Lower Cyber Risk Scores Through Proactive Security
Newly published report harnesses data from Trend’s platform insights on cyber risk
Fastly Empowers Organisations to Prioritise Security Without Disrupting End-User Experiences
Latest Fastly Bot Management update reduces CAPTCHA reliance, enhances bot detection, and highlights compromised credentials
Confluent launches Tableflow to power AI and next-gen applications
Data streaming company Confluent has announced today major advancements in Tableflow, the simplest way to access operational data from data lakes and warehouses. With Tableflow, all streaming data in Confluent Cloud can be accessed in popular open table formats, unlocking limitless possibilities for advanced analytics, real-time artificial ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
