The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

What’s up Doc?

What’s up Doc?

So I am pretty bad at going to the doctor on time, yes I am one of those people who get the overdue notifications on the weekly. I finally had enough courage to turn up to get my regular medication. Generally, when doctors release scripts it’s one of those situations where you put your script in your bag and run out. When I needed to return back to ...
Women Needed in Cyber for Australia’s Economic Prosperity

Women Needed in Cyber for Australia’s Economic Prosperity

Many of you in the cybersecurity industry already know about my dedication and passion to encourage more women to enter into and remain in the cybersecurity and broader tech sector. Having spoken around the world at numerous conferences, founded ISACA’s SheLeadsTech program, and participated in the United Nations Commission on the Status of Women in ...
Five Ways to Identify Phishing Emails

Five Ways to Identify Phishing Emails

As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags you should be looking for before clicking on a new message. Here is our up-to-date guide to help you recognise the latest email-based scams. What is phishing? Phishing is a cyber-attack typically ...
Why multi-factor authentication on the PEXA platform leaves security concerns

Why multi-factor authentication on the PEXA platform leaves security concerns

We published an article yesterday explaining why we see problems with the newly-introduced multi-factor authentication security measure on the PEXA electronic conveyancing platform. As a response to the growing number of conveyancing scams, such as the highly-publicised case involving the former MasterChef contestant, PEXA decided to introduce 2FA to ...
How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

Iron Bastion’s cybersecurity expert Gabor Szathmari, recently published novel research on abandoned internet domains, and how they are a significant cyber risk which threatens businesses and in particular the Australian legal profession. What is an Abandoned Domain Name? A domain name is a name you can register to identify your business on the ...
The Alphabet of Electronic Conveyancing

The Alphabet of Electronic Conveyancing

ARNECC, ELN, ELNO, ECNL, PEXA... A recent cyber-attack incident against a property settlement transaction processed through the PEXA network has raised concerns over the transition from the traditional paper-based settlement process to electronic conveyancing. A number of cyber security experts have expressed their concerns about the cyber security ...

Why You Need Professional Email Hosting for Your Business

Your business deserves a reliable, safe and secure email service provider so that you can focus on your clients and not have to worry about cyber attacks. Email is an essential service for every business. However, not all email service providers are created equal. Some email services are more susceptible to hacking and data loss than others. In this ...
How To Prevent Payment Redirection Fraud At Your Conveyancing Practice

How To Prevent Payment Redirection Fraud At Your Conveyancing Practice

Enforcing Two-factor Authentication (2FA) on your email service is a robust security measure that can prevent payment redirection fraud. In the following article, we demonstrate how you can enable this powerful security feature on your corporate email accounts hosted on Office 365 or G Suite. By making this simple change, you can reduce the chances of ...
No results found.

In The News

BeyondTrust Celebrates Partner Success With Australian Partner Regional Awards

Sydney – 10 June, 2025 – BeyondTrust, the global cybersecurity leader protecting Paths to Privilege™, has announced the winners of its 2024 Australian partner awards at the company’s regional PartnerTrust Live event staged last week in Melbourne. As part of a day of enablement and positioning partners for growth, subject matter experts from ...
Dangerous Blind Spots Costing Enterprises Time, Trust, and Agility Exposed in Check Point’s 2025 Cloud Security Report

Dangerous Blind Spots Costing Enterprises Time, Trust, and Agility Exposed in Check Point’s 2025 Cloud Security Report

Report finds 65% of organisations suffered a cloud-security incident in the past year – yet only 6% remediated it within an hour Redwood City, CA – June 5, 2025 – Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today released its 2025 Cloud Security Report. Based on a global survey of ...
Check Point Software Technologies Expands Comprehensive Cybersecurity Portfolio on Pax8 Marketplace

Check Point Software Technologies Expands Comprehensive Cybersecurity Portfolio on Pax8 Marketplace

SYDNEY, NSW (June 10, 2025) – Pax8, the leading cloud commerce Marketplace, today announced that Check Point Software Technologies (NASDAQ: CHKP) is significantly expanding its presence on the Pax8 Marketplace by expanding its cybersecurity portfolio available to partners. This expansion provides Pax8's global partner ecosystem with access to Check ...
Claroty Unveils New xDome Platform

Claroty Unveils New xDome Platform

Claroty Introduces New Impact-centric Approach to CPS Risk Reduction with Device Purpose and Risk Benchmarking Capabilities Organisations Can Now Prioritise CPS Remediation Efforts Based on Potential Impact to Business Outcomes
Bitdefender Launches Powerful Compliance Management Solution Unified With Endpoint Security

Bitdefender Launches Powerful Compliance Management Solution Unified With Endpoint Security

Bitdefender today announced GravityZone Compliance Manager, a new addition to its GravityZone platform that helps organisations reduce the burden of compliance and streamline audit readiness. Designed specifically for today’s complex regulatory landscape, the solution provides real-time visibility, automated remediation, audit-ready reports, and ...
Fortinet Launches Cybersecurity Curriculum for Classrooms in Australia to Strengthen Digital Resilience in Education

Fortinet Launches Cybersecurity Curriculum for Classrooms in Australia to Strengthen Digital Resilience in Education

Fortinet showcases free, education-focused training service that builds foundational cyber awareness among students at the 2025 AIS NSW ICT Management and Leadership Conference – Digital Directors    
New Research Shows ANZ Security Leaders Are Optimistic about AI Agents, But Trust and Compliance Are Key

New Research Shows ANZ Security Leaders Are Optimistic about AI Agents, But Trust and Compliance Are Key

IT security leaders across ANZ expect AI agents to be beneficial, yet most see significant readiness gaps in deploying proper safeguards As AI adoption accelerates and cyber threats increase, 75 per cent of Australian and New Zealand (ANZ) IT security leaders recognise their security practices need transformation. New data from the latest ...
CrowdStrike Reports First Quarter Fiscal Year 2026 Financial Results

CrowdStrike Reports First Quarter Fiscal Year 2026 Financial Results

• Ending ARR surpasses $4.4 billion, adding $194 million in net new ARR • Delivers strong Falcon Flex deal momentum with accounts exceeding $3.2 billion in total deal value, growing more than 6x year-over-year • Achieves record cash flow from operations of $384 million and robust free cash flow of $279 million • Announces share repurchase authorization ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This