The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How Economists Can Help Protect Personal Data

How Economists Can Help Protect Personal Data

If you are about to hand over your private details in exchange for a store loyalty card, are you confident that your data remains in safe hands? It can be difficult to predict if the supermarket manages your sensitive details securely and responsibly. The company may store them on vulnerable servers waiting for hackers to attack. Also, your data might ...
TikTok – Not a Shock?

TikTok – Not a Shock?

The new app on the block; TikTok has been on our radar for a while; in a way that was questionable in terms of the value it provided, but even bigger concerns about the security and privacy side of it.
What’s up Doc?

What’s up Doc?

So I am pretty bad at going to the doctor on time, yes I am one of those people who get the overdue notifications on the weekly. I finally had enough courage to turn up to get my regular medication. Generally, when doctors release scripts it’s one of those situations where you put your script in your bag and run out. When I needed to return back to ...
Women Needed in Cyber for Australia’s Economic Prosperity

Women Needed in Cyber for Australia’s Economic Prosperity

Many of you in the cybersecurity industry already know about my dedication and passion to encourage more women to enter into and remain in the cybersecurity and broader tech sector. Having spoken around the world at numerous conferences, founded ISACA’s SheLeadsTech program, and participated in the United Nations Commission on the Status of Women in ...
Five Ways to Identify Phishing Emails

Five Ways to Identify Phishing Emails

As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags you should be looking for before clicking on a new message. Here is our up-to-date guide to help you recognise the latest email-based scams. What is phishing? Phishing is a cyber-attack typically ...
Why multi-factor authentication on the PEXA platform leaves security concerns

Why multi-factor authentication on the PEXA platform leaves security concerns

We published an article yesterday explaining why we see problems with the newly-introduced multi-factor authentication security measure on the PEXA electronic conveyancing platform. As a response to the growing number of conveyancing scams, such as the highly-publicised case involving the former MasterChef contestant, PEXA decided to introduce 2FA to ...
How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

Iron Bastion’s cybersecurity expert Gabor Szathmari, recently published novel research on abandoned internet domains, and how they are a significant cyber risk which threatens businesses and in particular the Australian legal profession. What is an Abandoned Domain Name? A domain name is a name you can register to identify your business on the ...
The Alphabet of Electronic Conveyancing

The Alphabet of Electronic Conveyancing

ARNECC, ELN, ELNO, ECNL, PEXA... A recent cyber-attack incident against a property settlement transaction processed through the PEXA network has raised concerns over the transition from the traditional paper-based settlement process to electronic conveyancing. A number of cyber security experts have expressed their concerns about the cyber security ...
No results found.

In The News

CyberArk Unveils First-Of-Its-Kind Machine Identity Security Solution To Secure Workloads Across Every Environment

CyberArk Unveils First-Of-Its-Kind Machine Identity Security Solution To Secure Workloads Across Every Environment

Platform delivers the industry's most comprehensive protection for all non-human identities that matter Combines the application of unique and universal identities to all workloads with secrets management, reducing machine identity complexity and risk New discovery capabilities to provide contextual understanding of workload identity risk
Ping Identity Doubles Down on Partner Strategy with New Partner Program and Advisory Board

Ping Identity Doubles Down on Partner Strategy with New Partner Program and Advisory Board

Ping’s partner-first investments reinforce commitment to delivering exceptional experiences for partners and customers
CyberArk Announces Identity Security Solution to Secure AI Agents At Scale

CyberArk Announces Identity Security Solution to Secure AI Agents At Scale

Millions of autonomous, unpredictable AI agents represent new, rapidly expanding identity security attack surface New CyberArk end-to-end solution will help secure AI agents' privileged access across entire environment Delivered through the CyberArk Identity Security Platform, securing all identities - human, machine, and AI - in one place.
Fastly Application Security Solutions Delivered 235% ROI Over Three Years

Fastly Application Security Solutions Delivered 235% ROI Over Three Years

Study shows Fastly provides enhanced security, improved user experiences, and significant cost savings
New WatchGuard Threat Lab Report Discovers 94% Increase in Network Malware as Cybercriminals Exploit Advanced, Encrypted Connections

New WatchGuard Threat Lab Report Discovers 94% Increase in Network Malware as Cybercriminals Exploit Advanced, Encrypted Connections

Other key findings show an increase in crypto miner detections, a spike in zero-day malware, a drop in endpoint malware, a rise in Linux-based threats, and more.
Akamai Announces App & API Protector Hybrid for Expanded WAF Defence

Akamai Announces App & API Protector Hybrid for Expanded WAF Defence

Hybrid solution delivers consistent, scalable security for applications and APIs across multicloud, on-premises, and CDN-agnostic infrastructures
Fortinet Expands FortiAI Across Its Security Fabric Platform

Fortinet Expands FortiAI Across Its Security Fabric Platform

New AI capabilities empower organisations to protect against emerging threats, accelerate security and network operations with agentic AI 
SailPoint Rolls Out Identity Security Cloud and Customer Success Program Updates to Boost Productivity and Enhance Comprehensive Identity Security

SailPoint Rolls Out Identity Security Cloud and Customer Success Program Updates to Boost Productivity and Enhance Comprehensive Identity Security

Cutting-edge capabilities, with tailored support from enhanced customer success program, help enhance performance, streamline operations, and scale in the modern digital landscape
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This