The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How Economists Can Help Protect Personal Data

How Economists Can Help Protect Personal Data

If you are about to hand over your private details in exchange for a store loyalty card, are you confident that your data remains in safe hands? It can be difficult to predict if the supermarket manages your sensitive details securely and responsibly. The company may store them on vulnerable servers waiting for hackers to attack. Also, your data might ...
TikTok – Not a Shock?

TikTok – Not a Shock?

The new app on the block; TikTok has been on our radar for a while; in a way that was questionable in terms of the value it provided, but even bigger concerns about the security and privacy side of it.
What’s up Doc?

What’s up Doc?

So I am pretty bad at going to the doctor on time, yes I am one of those people who get the overdue notifications on the weekly. I finally had enough courage to turn up to get my regular medication. Generally, when doctors release scripts it’s one of those situations where you put your script in your bag and run out. When I needed to return back to ...
Women Needed in Cyber for Australia’s Economic Prosperity

Women Needed in Cyber for Australia’s Economic Prosperity

Many of you in the cybersecurity industry already know about my dedication and passion to encourage more women to enter into and remain in the cybersecurity and broader tech sector. Having spoken around the world at numerous conferences, founded ISACA’s SheLeadsTech program, and participated in the United Nations Commission on the Status of Women in ...
Five Ways to Identify Phishing Emails

Five Ways to Identify Phishing Emails

As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags you should be looking for before clicking on a new message. Here is our up-to-date guide to help you recognise the latest email-based scams. What is phishing? Phishing is a cyber-attack typically ...
Why multi-factor authentication on the PEXA platform leaves security concerns

Why multi-factor authentication on the PEXA platform leaves security concerns

We published an article yesterday explaining why we see problems with the newly-introduced multi-factor authentication security measure on the PEXA electronic conveyancing platform. As a response to the growing number of conveyancing scams, such as the highly-publicised case involving the former MasterChef contestant, PEXA decided to introduce 2FA to ...
How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

Iron Bastion’s cybersecurity expert Gabor Szathmari, recently published novel research on abandoned internet domains, and how they are a significant cyber risk which threatens businesses and in particular the Australian legal profession. What is an Abandoned Domain Name? A domain name is a name you can register to identify your business on the ...
The Alphabet of Electronic Conveyancing

The Alphabet of Electronic Conveyancing

ARNECC, ELN, ELNO, ECNL, PEXA... A recent cyber-attack incident against a property settlement transaction processed through the PEXA network has raised concerns over the transition from the traditional paper-based settlement process to electronic conveyancing. A number of cyber security experts have expressed their concerns about the cyber security ...
No results found.

In The News

Bitdefender Redefines Endpoint Security, Announces Global Launch of GravityZone PHASR

Bitdefender Redefines Endpoint Security, Announces Global Launch of GravityZone PHASR

Bitdefender has announced the worldwide availability of Bitdefender GravityZone Proactive Hardening and Attack Surface Reduction (PHASR), the industry’s first endpoint security solution to dynamically tailor hardening for each user—ensuring that security configurations align precisely with user-intended privileges and behaviours and continuously adapt ...
Datadog Makes Strategic Acquisition of Metaplane

Datadog Makes Strategic Acquisition of Metaplane

Datadog has announced it has acquired Metaplane, an end-to-end data observability platform that provides advanced machine learning-powered monitoring and column-level lineage to prevent, detect and resolve data quality issues across a company’s entire data stack. With the emergence of AI and widespread adoption of platforms like Snowflake and ...
Veeam Unveils Inaugural ESG Report Highlighting Sustainability, Social Impact, And Corporate Governance Initiatives

Veeam Unveils Inaugural ESG Report Highlighting Sustainability, Social Impact, And Corporate Governance Initiatives

Veeam announced the release of its first Environmental, Social, and Governance (ESG) Report, coinciding with the 55th anniversary of Earth Day. This landmark report showcases Veeam's commitment to inclusively creating a sustainable future while maintaining the highest standards of trust and governance. “Today at VeeamON, we are proud to launch our ...
CrowdStrike and Veeam Partner to Strengthen Data Resilience for Customers

CrowdStrike and Veeam Partner to Strengthen Data Resilience for Customers

Veeam announced a new partnership with CrowdStrike to deliver centralised visibility of critical data and advanced threat detection through integration with the Veeam Data Platform. The jointly developed product integration creates a more secure environment for shared customers, helping identify threats before, during and after an attack to enable ...
SecurityBridge Unveils AI-Powered Code Vulnerability Analyzer to Strengthen SAP Security

SecurityBridge Unveils AI-Powered Code Vulnerability Analyzer to Strengthen SAP Security

This innovative tool leverages artificial intelligence (AI) to identify and explain vulnerabilities in custom Advanced Business Application Programming (ABAP) code, empowering SAP developers and security teams to remediate risks faster and more efficiently.
NinjaOne Introduces New Capabilities to Strengthen Organisations’ Cyber Hygiene

NinjaOne Introduces New Capabilities to Strengthen Organisations’ Cyber Hygiene

NinjaOne today announced new capabilities that unify vulnerability management and patching workflows, ensuring a risk-based approach to patching and reducing time to remediate vulnerabilities. The new tools automate the import of vulnerability data, giving IT teams continuous visibility into vulnerabilities, so they can prioritise and verify the ...
CrowdStrike Unveils Falcon Privileged Access, Delivering the Only Platform that Unifies End-to-End Hybrid Identity Security

CrowdStrike Unveils Falcon Privileged Access, Delivering the Only Platform that Unifies End-to-End Hybrid Identity Security

CrowdStrike Unveils Falcon Privileged Access, Delivering the Only Platform that Unifies End-to-End Hybrid Identity Security Falcon platform secures the entire identity attack lifecycle – from initial access to privilege escalation and lateral movement – across hybrid environments; extends Charlotte AI Agentic Detection Triage to identity-based attacks
CrowdStrike Named a Leader and Fast Mover in the 2025 GigaOm Radar Report for XDR

CrowdStrike Named a Leader and Fast Mover in the 2025 GigaOm Radar Report for XDR

Earns high overall scores across Key and Emerging Features categories, with perfect marks in Threat Detection, Cloud Security Integration, Unified Telemetry and Scalability criteria
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This