The Voice of Cyber®
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles

How Economists Can Help Protect Personal Data
If you are about to hand over your private details in exchange for a store loyalty card, are you confident that your data remains in safe hands?
It can be difficult to predict if the supermarket manages your sensitive details securely and responsibly. The company may store them on vulnerable servers waiting for hackers to attack. Also, your data might ...

TikTok – Not a Shock?
The new app on the block; TikTok has been on our radar for a while; in a way that was questionable in terms of the value it provided, but even bigger concerns about the security and privacy side of it.

What’s up Doc?
So I am pretty bad at going to the doctor on time, yes I am one of those people who get the overdue notifications on the weekly.
I finally had enough courage to turn up to get my regular medication. Generally, when doctors release scripts it’s one of those situations where you put your script in your bag and run out.
When I needed to return back to ...

Women Needed in Cyber for Australia’s Economic Prosperity
Many of you in the cybersecurity industry already know about my dedication and passion to encourage more women to enter into and remain in the cybersecurity and broader tech sector. Having spoken around the world at numerous conferences, founded ISACA’s SheLeadsTech program, and participated in the United Nations Commission on the Status of Women in ...

Five Ways to Identify Phishing Emails
As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags you should be looking for before clicking on a new message. Here is our up-to-date guide to help you recognise the latest email-based scams.
What is phishing? Phishing is a cyber-attack typically ...

Why multi-factor authentication on the PEXA platform leaves security concerns
We published an article yesterday explaining why we see problems with the newly-introduced multi-factor authentication security measure on the PEXA electronic conveyancing platform.
As a response to the growing number of conveyancing scams, such as the highly-publicised case involving the former MasterChef contestant, PEXA decided to introduce 2FA to ...

How Abandoned Domain Names Pose a Major Cyber Risk to Your Business
Iron Bastion’s cybersecurity expert Gabor Szathmari, recently published novel research on abandoned internet domains, and how they are a significant cyber risk which threatens businesses and in particular the Australian legal profession.
What is an Abandoned Domain Name?
A domain name is a name you can register to identify your business on the ...

The Alphabet of Electronic Conveyancing
ARNECC, ELN, ELNO, ECNL, PEXA...
A recent cyber-attack incident against a property settlement transaction processed through the PEXA network has raised concerns over the transition from the traditional paper-based settlement process to electronic conveyancing. A number of cyber security experts have expressed their concerns about the cyber security ...
No results found.
In The News
Pax8 Announces Voyager Alliance Rewards
SYDNEY, NSW (June 11, 2025) Pax8, the leading cloud commerce Marketplace, today announced Pax8 Voyager Alliance Rewards, an upcoming points-based rewards system that will include curated redemption opportunities and an exclusive partner dashboard to track points. Voyager Alliance Rewards will be structured based on partners’ Voyager Alliance tiers and ...
Pax8 to Unlock the Era of Managed Intelligence for SMBs
Pax8 Empowers MSPs to build, orchestrate, and deliver AI-powered business outcomes through agentic innovation leveraging Microsoft technology
UniSQ Partners With Fortinet To Lead Regional Cybersecurity Workforce Development
The University of Southern Queensland (UniSQ) has partnered with global cybersecurity leader Fortinet to deliver industry-recognised certifications and hands-on training as part of its Bachelor of Cyber Security.
Designed for aspiring cybersecurity professionals and career changers, the program addresses Australia’s digital skills shortage by ...
Semperis and Akamai Collaborate to Combat High-Severity Vulnerability in Windows Server 2025
Semperis and Akamai Collaborate to Combat High-Severity Active Directory Vulnerability in Windows Server 2025
Semperis Enhances DSP with Indicators to Detect and Mitigate BadSuccessor Exploits
Sydney, Australia — 10 June, 2025 — Semperis, a leader in AI-powered identity security and cyber resilience, today announced new detection capabilities in ...
BeyondTrust Celebrates Partner Success With Australian Partner Regional Awards
Sydney – 10 June, 2025 – BeyondTrust, the global cybersecurity leader protecting Paths to Privilege™, has announced the winners of its 2024 Australian partner awards at the company’s regional PartnerTrust Live event staged last week in Melbourne.
As part of a day of enablement and positioning partners for growth, subject matter experts from ...
Dangerous Blind Spots Costing Enterprises Time, Trust, and Agility Exposed in Check Point’s 2025 Cloud Security Report
Report finds 65% of organisations suffered a cloud-security incident in the past year – yet only 6% remediated it within an hour
Redwood City, CA – June 5, 2025 – Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today released its 2025 Cloud Security Report. Based on a global survey of ...
Check Point Software Technologies Expands Comprehensive Cybersecurity Portfolio on Pax8 Marketplace
SYDNEY, NSW (June 10, 2025) – Pax8, the leading cloud commerce Marketplace, today announced that Check Point Software Technologies (NASDAQ: CHKP) is significantly expanding its presence on the Pax8 Marketplace by expanding its cybersecurity portfolio available to partners. This expansion provides Pax8's global partner ecosystem with access to Check ...
Claroty Unveils New xDome Platform
Claroty Introduces New Impact-centric Approach to CPS Risk Reduction with Device Purpose and Risk Benchmarking Capabilities
Organisations Can Now Prioritise CPS Remediation Efforts Based on Potential Impact to Business Outcomes
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
- 224
- 225
- 226
- 227
- 228
- 229
- 230
- 231
- 232
- 233
- 234
- 235
- 236
- 237
- 238
- 239
- 240
- 241
- 242
- 243
- 244
- 245
- 246
- 247
- 248
- 249
- 250
- 251
- 252
- 253
- 254
- 255
- 256
- 257
- 258
- 259
- 260
- 261
- 262
- 263
- 264
- 265
- 266
- 267
- 268
- 269
- 270
- 271
- 272
- 273
- 274
- 275
- 276
- 277
- 278
- 279
- 280
- 281
- 282
- 283
- 284
- 285
- 286
- 287
- 288
- 289
- 290
- 291
- 292
- 293
- 294
- 295
- 296
- 297
- 298
- 299
- 300
- 301
- 302
- 303
- 304
- 305
- 306
- 307
- 308
- 309
- 310
- 311
- 312
- 313
- 314
- 315
- 316
- 317
- 318
- 319
- 320
- 321
- 322
- 323
- 324
- 325
- 326
- 327
- 328
- 329
- 330
- 331
- 332
- 333
- 334
- 335
- 336
No results found.
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..
