The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Cybersecurity Tips for Conveyancers and Solicitors Using PEXA

Cybersecurity Tips for Conveyancers and Solicitors Using PEXA

You may have heard of the recent cybercrime perpetrated against the Australian e-conveyancing platform PEXA. A former MasterChef finalist and her family had $250,000 stolen from a property purchase transaction on the platform at settlement. In the following article, we explain the likely ways the fraud occurred and what practical things you can do ...

How You Can Protect Your Microsoft Exchange Email Service From Cyber Attacks

Microsoft Exchange is a popular choice for providing email services for businesses. Its email features and seamless integration with Microsoft Outlook are undoubtedly convenient and easy to use, but what about security? Microsoft Exchange runs exclusively on Windows Server, which in 2017 was affected by various critical vulnerabilities, putting ...

Report: Australia’s Top Law Firms Lead the Way in the Use of Anti-Phishing Technologies

Most of Australia’s top-tier and mid-tier law firms are well prepared in defending against phishing attacks, Iron Bastion's new study can now reveal. Iron Bastion  have assessed Australia’s top one hundred law firms for their use of anti-phishing technology. The details were gathered from various public data sources to determine whether email services ...
Zooming Around

Zooming Around

How is Zoom changing us, and how are we changing Zoom?🧐 With the current state of the world, how reliable and secure is the platform upon which so many now rely?
WHAT IS CPS234 AND WHAT DOES IT MEAN FOR ME?

WHAT IS CPS234 AND WHAT DOES IT MEAN FOR ME?

An increase in the risk of cyber security brings an increase in the publicity surrounding the issue and the regulations governing it. This year we have already seen a number of new regulations coming into effect that will impact the majority of both Australian and international organisations. In March 2018, the Australian Prudential Regulation ...
To Infinity & Beyond… With Artificial Intelligence

To Infinity & Beyond… With Artificial Intelligence

We are always hearing about technologies that are trending. But what happens next for technology disruptors? For me, it's about understanding these developments and actually looking intrinsically about why these particular trends are going to accelerate the cloud computing space. The way I see it is that machine learning algorithms and advanced ...
Critical Communications

Critical Communications

Topic: Communication for internal teams on the importance of understanding risk If all communication was abolished, society would crumble. Fast. Yet one area that I have noticed in the security industry which I believe needs a lot of attention - and often goes unmentioned - is how we communicate internally to our teams on the importance of ...
Start Your Engines

Start Your Engines

You had a neat idea. You’ve built on it, and now started to turn it into a commercial reality. It doesn’t matter if you’ve the best product or service in the universe, if it’s not developed, marketed, sold, and delivered in the best possible way you’re falling short of your potential, and will flounder. You can’t do it all on your own of course, so now ...
No results found.

In the News

Tenable Uncovers “GerriScary” Supply Chain Compromise Vulnerability in Popular Google’s Open Source Projects – GerriScary Allowed Unauthorised Code Submission to at Least 18 Popular Google Projects

Tenable Uncovers “GerriScary” Supply Chain Compromise Vulnerability in Popular Google’s Open Source Projects – GerriScary Allowed Unauthorised Code Submission to at Least 18 Popular Google Projects

Tenable, the exposure management company, has identified a vulnerability in Google’s open-source code review system, Gerrit, dubbed GerriScary. The vulnerability allowed unauthorised code submission to at least 18 major Google projects, including ChromiumOS (CVE-2025-1568), Chromium, Dart, and Bazel. GerriScary could have allowed attackers to submit ...
Genetec Accelerates NZ Business Momentum With Sektor Partner Appointment

Genetec Accelerates NZ Business Momentum With Sektor Partner Appointment

Auckland/Sydney - 18 June 2025— Genetec Inc. (“Genetec”), a global leader in enterprise physical security software, today announced the appointment of leading technology distributor, Sektor, as its official distribution partner in New Zealand. This collaboration is aimed at accelerating the growth of physical security solutions across large and ...
Secure Code Warrior Unveils Industry-First AI Coding Rulesets to Guide Safer AI Code Deployment

Secure Code Warrior Unveils Industry-First AI Coding Rulesets to Guide Safer AI Code Deployment

Community-driven resource empowers developer teams of all sizes to integrate AI safely into critical workflows SYDNEY – June 18, 2025 - Secure Code Warrior, the leading developer risk management company, today announced the availability of AI Security Rules on GitHub – a first-of-its-kind, free resource to help developers generate more secure code ...
CrowdStrike Falcon for AWS Security Incident Response Strengthens Cyber Resilience for AWS Customers

CrowdStrike Falcon for AWS Security Incident Response Strengthens Cyber Resilience for AWS Customers

New program offers AWS Security Incident Response customers best-in-class Falcon platform protection at preferred rates   AUSTIN, Texas – June 16, 2025 – CrowdStrike (NASDAQ: CRWD) today unveiled Falcon for AWS Security Incident Response at AWS re:Inforce 2025, a new program that provides AWS Security Incident Response customers with ...
Fastly Appoints Kip Compton as Chief Executive Officer

Fastly Appoints Kip Compton as Chief Executive Officer

SAN FRANCISCO - 16 June 2025 - Fastly, Inc. (NYSE: FSLY) a leader in global edge cloud platforms, today announced that Kip Compton, Fastly's current Chief Product Officer, has been appointed CEO of the company and named to the Board of Directors, effective immediately. Compton succeeds Todd Nightingale, who has stepped down as CEO, President, and as a ...
NinjaOne Expands Automated Endpoint Management Platform With MDM for MacOS

NinjaOne Expands Automated Endpoint Management Platform With MDM for MacOS

NinjaOne today introduced NinjaOne MDM™ for macOS, dramatically expanding its Mac management capabilities. IT teams and MSPs can fully manage Windows, macOS, and Linux devices, as well as mobile endpoints across iOS, iPadOS, and Android, from a single, intuitive interface. The addition of Mac MDM capabilities gives NinjaOne’s customers and partners ...
SecurityBridge Appoints Cybersecurity Veteran Roman Schubiger as Chief Revenue Officer to Lead Global Expansion

SecurityBridge Appoints Cybersecurity Veteran Roman Schubiger as Chief Revenue Officer to Lead Global Expansion

In addition, Schubiger will expand SecurityBridge’s footprint in the United States and amplify its strategic growth across EMEA and Southeast Asia. He also aims to strengthen the company’s partner ecosystem and broaden its global channel network.
Genetec Brings Powerful New Capabilities to Security Center SaaS

Genetec Brings Powerful New Capabilities to Security Center SaaS

Flexible, Open Platform Gives Security Professionals and Integrators the Freedom to Deploy and Scale Physical Security on Their Terms Sydney, June 16, 2025 — Genetec Inc. (“Genetec”), the global leader in enterprise physical security software, has announced new updates to Security Center SaaS, the company’s enterprise-grade Security-as-a-Service ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This