The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

How Economists Can Help Protect Personal Data
If you are about to hand over your private details in exchange for a store loyalty card, are you confident that your data remains in safe hands?
It can be difficult to predict if the supermarket manages your sensitive details securely and responsibly. The company may store them on vulnerable servers waiting for hackers to attack. Also, your data might ...

TikTok – Not a Shock?
The new app on the block; TikTok has been on our radar for a while; in a way that was questionable in terms of the value it provided, but even bigger concerns about the security and privacy side of it.

What’s up Doc?
So I am pretty bad at going to the doctor on time, yes I am one of those people who get the overdue notifications on the weekly.
I finally had enough courage to turn up to get my regular medication. Generally, when doctors release scripts it’s one of those situations where you put your script in your bag and run out.
When I needed to return back to ...

Women Needed in Cyber for Australia’s Economic Prosperity
Many of you in the cybersecurity industry already know about my dedication and passion to encourage more women to enter into and remain in the cybersecurity and broader tech sector. Having spoken around the world at numerous conferences, founded ISACA’s SheLeadsTech program, and participated in the United Nations Commission on the Status of Women in ...

Five Ways to Identify Phishing Emails
As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags you should be looking for before clicking on a new message. Here is our up-to-date guide to help you recognise the latest email-based scams.
What is phishing? Phishing is a cyber-attack typically ...

Why multi-factor authentication on the PEXA platform leaves security concerns
We published an article yesterday explaining why we see problems with the newly-introduced multi-factor authentication security measure on the PEXA electronic conveyancing platform.
As a response to the growing number of conveyancing scams, such as the highly-publicised case involving the former MasterChef contestant, PEXA decided to introduce 2FA to ...

How Abandoned Domain Names Pose a Major Cyber Risk to Your Business
Iron Bastion’s cybersecurity expert Gabor Szathmari, recently published novel research on abandoned internet domains, and how they are a significant cyber risk which threatens businesses and in particular the Australian legal profession.
What is an Abandoned Domain Name?
A domain name is a name you can register to identify your business on the ...

The Alphabet of Electronic Conveyancing
ARNECC, ELN, ELNO, ECNL, PEXA...
A recent cyber-attack incident against a property settlement transaction processed through the PEXA network has raised concerns over the transition from the traditional paper-based settlement process to electronic conveyancing. A number of cyber security experts have expressed their concerns about the cyber security ...
No results found.
In The News
Cisco and ServiceNow Partner to Simplify and Secure AI Adoption for Businesses at Scale
Cisco and ServiceNow deepen partnership to ensure customers can adopt and scale AI securely and efficiently.
Companies will bring portfolios closer together to help enterprises evolve their organizations as they embrace AI.
First planned integration will tackle AI security and risk with Cisco AI Defense and ServiceNow’s Security Operations ...
Qualys Unveils Policy Audit with Enhanced Efficiency for Continuous Audit Readiness
Enhancements streamline evidence collection, prioritise risk-based remediation, and ensure continuous audit readiness, helping organisations reduce compliance costs and regulatory exposure
Rapid7 Launches Managed Detection & Response (MDR) for Enterprise, a Fully Managed and Customised Service
Rapid7 has launched Managed Detection & Response (MDR) for Enterprise, a fully managed and customisable detection and response service designed to meet the unique demands of complex, distributed enterprise environments.
Check Point Software Technologies and Illumio Accelerate Zero Trust Adoption with Proactive Threat Prevention and Unified Intelligence
Integration accelerates breach identification and containment, effectively stops lateral movement of threats across the enterprise
Honeywell To Provide Automation And Safety Controls For First Fully Integrated Rare Earths Refinery In Australia
Honeywell today announced its Integrated Controls and Safety System (ICSS) will be designed and implemented in Iluka Resources’ (Iluka) Eneabba rare earths refinery in Western Australia to help improve production efficiency and create a safer environment for its workers. Through a strategic partnership between the Australian Government and Iluka, the ...
Wild Tech Malaysia Awarded Major Microsoft Dynamics 365 ERP Implementation Project by New Hoong Fatt Group
Wild Tech Malaysia is proud to announce its selection as the service provider for a comprehensive Microsoft Dynamics 365 Enterprise Resource Planning (ERP) implementation project for New Hoong Fatt (“NHF”) Group, a leading Malaysian automotive replacement parts solutions provider.
This strategic implementation will modernise and integrate business ...
Tenable Research in Verizon DBIR: Additional Research Analysis
Vulnerability exploitation surged as the initial access vector for 20% of breaches—a 34% increase year over year and now rivalling the top initial access vector (credential abuse), according to the newly released 2025 Verizon Data Breach Investigation Report (DBIR). To dig deep into this risk, Tenable contributed enriched data on the most exploited ...
New Report Reveals Overconfidence In Cyber Preparedness Among Australian Businesses
Veeam announced the findings of their latest research, From Risk to Resilience: Veeam 2025 Ransomware Trends and Proactive Strategies Report, revealing alarming insights into the evolving threat landscape of ransomware attacks. With cyber threats becoming more sophisticated and frequent, the report underlines the need for organisations to prioritise ...
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
