The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Phishing Is the Top Reason Behind Australian Data Breaches

Phishing Is the Top Reason Behind Australian Data Breaches

The latest Notifiable Data Breaches Quarterly Statistics Report by the Office of the Australian Information Commissioner (OAIC) confirms that half of the reported data breaches in July to September 2018 quarter are attributable to phishing. According to the report, the top five sectors by data breach notifications in the last quarter were: Health ...
How Economists Can Help Protect Personal Data

How Economists Can Help Protect Personal Data

If you are about to hand over your private details in exchange for a store loyalty card, are you confident that your data remains in safe hands? It can be difficult to predict if the supermarket manages your sensitive details securely and responsibly. The company may store them on vulnerable servers waiting for hackers to attack. Also, your data might ...
TikTok – Not a Shock?

TikTok – Not a Shock?

The new app on the block; TikTok has been on our radar for a while; in a way that was questionable in terms of the value it provided, but even bigger concerns about the security and privacy side of it.
What’s up Doc?

What’s up Doc?

So I am pretty bad at going to the doctor on time, yes I am one of those people who get the overdue notifications on the weekly. I finally had enough courage to turn up to get my regular medication. Generally, when doctors release scripts it’s one of those situations where you put your script in your bag and run out. When I needed to return back to ...
Women Needed in Cyber for Australia’s Economic Prosperity

Women Needed in Cyber for Australia’s Economic Prosperity

Many of you in the cybersecurity industry already know about my dedication and passion to encourage more women to enter into and remain in the cybersecurity and broader tech sector. Having spoken around the world at numerous conferences, founded ISACA’s SheLeadsTech program, and participated in the United Nations Commission on the Status of Women in ...
Five Ways to Identify Phishing Emails

Five Ways to Identify Phishing Emails

As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags you should be looking for before clicking on a new message. Here is our up-to-date guide to help you recognise the latest email-based scams. What is phishing? Phishing is a cyber-attack typically ...
Why multi-factor authentication on the PEXA platform leaves security concerns

Why multi-factor authentication on the PEXA platform leaves security concerns

We published an article yesterday explaining why we see problems with the newly-introduced multi-factor authentication security measure on the PEXA electronic conveyancing platform. As a response to the growing number of conveyancing scams, such as the highly-publicised case involving the former MasterChef contestant, PEXA decided to introduce 2FA to ...
How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

Iron Bastion’s cybersecurity expert Gabor Szathmari, recently published novel research on abandoned internet domains, and how they are a significant cyber risk which threatens businesses and in particular the Australian legal profession. What is an Abandoned Domain Name? A domain name is a name you can register to identify your business on the ...
No results found.

In The News

Exabeam Appoints Kiley LePage as Chief Legal Officer

Exabeam Appoints Kiley LePage as Chief Legal Officer

New appointment to drive growth and global partnerships
Rethinking IT Sustainability To Achieve Outcomes That Matter To the Planet and the Bottom Line

Rethinking IT Sustainability To Achieve Outcomes That Matter To the Planet and the Bottom Line

Sustainability has become a critical business priority, connecting environmental responsibility with financial performance. For many companies, the focus is shifting from simply upgrading technology to maximising value across the entire device lifecycle. As businesses rethink how they manage their IT infrastructure, embedding sustainability into daily ...
BeyondTrust Names Industry Veteran Sean Malone as Chief Information Security Officer

BeyondTrust Names Industry Veteran Sean Malone as Chief Information Security Officer

Experienced security leader joins BeyondTrust to drive innovation and strengthen identity security leadership Sean Malone brings deep expertise in offensive security, cyber risk, and threat management to CISO role
Palo Alto Networks Announces Intent to Acquire Protect AI, a Game-Changing Security for AI Company

Palo Alto Networks Announces Intent to Acquire Protect AI, a Game-Changing Security for AI Company

The acquisition will enable secure pursuit of AI innovation with confidence by helping customers discover, manage, and protect against AI-specific security risks—securing AI end to end from development to runtime.
Logicalis 2025 CIO Report: APAC CIOs Rethink Cybersecurity Investments Amid Rising Incidents and Underused Tools

Logicalis 2025 CIO Report: APAC CIOs Rethink Cybersecurity Investments Amid Rising Incidents and Underused Tools

29 April 2025: Logicalis, the leading global technology service provider, has revealed that chief information officers (CIOs) are struggling to derive value from security investments amid an expanding threat landscape according to its annual CIO Report. Logicalis surveyed 1,000 global IT leaders, including more than 300 from Asia Pacific (APAC), ...
BeyondTrust Launches Free Identity Security Risk Assessment to Reveal Hidden Paths to Privilege™

BeyondTrust Launches Free Identity Security Risk Assessment to Reveal Hidden Paths to Privilege™

Complimentary new assessment--powered by Identity Security Insights--provides actionable recommendations to secure against vulnerabilities and help organisations tackle identity threats New assessment quickly reveals hidden Paths to Privilege, employing AI-based detection, and provides an initial set of prioritised findings to help guide security decisions
Palo Alto Networks Cortex XSIAM Delivers Industry’s First AI-Driven SecOps Platform to Span Proactive and Reactive Security

Palo Alto Networks Cortex XSIAM Delivers Industry’s First AI-Driven SecOps Platform to Span Proactive and Reactive Security

Evolves industry-leading capabilities with AI-driven Cortex Exposure management and Advanced Email Security
CrowdStrike Delivers Industry-First Managed Threat Hunting Across Third-Party Data

CrowdStrike Delivers Industry-First Managed Threat Hunting Across Third-Party Data

Falcon Adversary OverWatch now hunts across third-party data in Falcon Next-Gen SIEM, extending expert-driven detection across every attack surface to stop stealthy adversaries
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This