The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Email Impersonation Scams: What You or Your IT Staff Can Do to Protect Your Business

A major cyber threat to Australian businesses is email-based impersonation scams targeting key personnel. The scheme involves cybercriminals mimicking business owners and executives through the use of phishing emails. Criminals typically pose as personnel in positions of authority and ask victims to perform money transfers, pay invoices, or to send the ...

Businesses Require New Techniques to Combat Phishing

The Verizon 2018 Data Breach Investigations Report provides valuable insights into emerging phishing threats. CISOs, IT managers and cybersecurity consultants should be aware of new phishing techniques this report raises in order to better manage the associated risk they bring. The most exciting finding in this year's report is the increased ...
Is the Cybersecurity of Your Business PEXA Ready?

Is the Cybersecurity of Your Business PEXA Ready?

You may have read about the highly publicised PEXA fraud which was reported whereby a Melbourne family was left homeless. As it transpired, the family’s conveyancer had their email hijacked by a cybercriminal. This lead to the conveyancer’s PEXA account being compromised and ultimately the theft of $250,000 by the criminal misdirecting settlement ...
Cybersecurity Tips for Conveyancers and Solicitors using PEXA

Cybersecurity Tips for Conveyancers and Solicitors using PEXA

You may have heard of the recent cybercrime perpetrated against the Australian e-conveyancing platform PEXA. A former MasterChef finalist and her family had $250,000 stolen from a property purchase transaction on the platform at settlement. In the following article, we explain the likely ways the fraud occurred and what practical things you can do ...

How you can protect your Microsoft Exchange email service from cyber attacks

Microsoft Exchange is a popular choice for providing email services for businesses. Its email features and seamless integration with Microsoft Outlook are undoubtedly convenient and easy to use, but what about security? Microsoft Exchange runs exclusively on Windows Server, which in 2017 was affected by various critical vulnerabilities, putting ...

Report: Australia’s Top Law Firms Lead the Way in the Use of Anti-Phishing Technologies

Most of Australia’s top-tier and mid-tier law firms are well prepared in defending against phishing attacks, Iron Bastion's new study can now reveal. Iron Bastion  have assessed Australia’s top one hundred law firms for their use of anti-phishing technology. The details were gathered from various public data sources to determine whether email services ...
Zooming Around

Zooming Around

How is Zoom changing us, and how are we changing Zoom?🧐 With the current state of the world, how reliable and secure is the platform upon which so many now rely?
WHAT IS CPS234 AND WHAT DOES IT MEAN FOR ME?

WHAT IS CPS234 AND WHAT DOES IT MEAN FOR ME?

An increase in the risk of cyber security brings an increase in the publicity surrounding the issue and the regulations governing it. This year we have already seen a number of new regulations coming into effect that will impact the majority of both Australian and international organisations. In March 2018, the Australian Prudential Regulation ...

In The News

ExtraHop® Recognised with a Customers’ Choice Distinction in Gartner Peer Insights™ Voice of the Customer for Network Detection and Response

ExtraHop® Recognised with a Customers’ Choice Distinction in Gartner Peer Insights™ Voice of the Customer for Network Detection and Response

ExtraHop recognised as one of the highly rated providers of NDR solutions for customers looking to modernise security operations
Pax8 and CrowdStrike Announce Strategic Partnership to Revolutionise Cybersecurity for Managed Service Providers in the  IT Channel

Pax8 and CrowdStrike Announce Strategic Partnership to Revolutionise Cybersecurity for Managed Service Providers in the IT Channel

 Pax8, the leading cloud commerce marketplace and CrowdStrike (Nasdaq: CRWD), a leader in cloud-delivered protection of endpoints, cloud workloads, identity and data have announced a strategic partnership. The new alliance will give Managed Service Providers (MSPs) access to bundled product offerings of the CrowdStrike Falcon platform, available ...
Cipherpoint Subsidiary Excite IT Signs SOCaaS Agreement with Trend Micro

Cipherpoint Subsidiary Excite IT Signs SOCaaS Agreement with Trend Micro

Cipherpoint Limited [ASX: CPT] (the Company) has announced that Excite IT Pty Ltd, its recently acquired wholly owned subsidiary, has entered into an agreement with Trend Micro Australia Pty Ltd to provide security operations services to support Trend’s managed detection and response service in Australia.
MINTERELLISON CONSULTING expands cyber security practice

MINTERELLISON CONSULTING expands cyber security practice

MinterEllison Consulting, the consulting business of MinterEllison, is pleased to announce the addition of four experienced consultants to its national cyber security practice.
Palo Alto Networks and Ingram Micro Australia and New Zealand join forces to bring cutting-edge cybersecurity solutions to businesses

Palo Alto Networks and Ingram Micro Australia and New Zealand join forces to bring cutting-edge cybersecurity solutions to businesses

Palo Alto Networks (NASDAQ: PANW), the global cybersecurity leader, has announced a strategic distribution agreement with Ingram Micro. With heightened demand for cybersecurity solutions across Australia and New Zealand, the agreement will add the full range of Palo Alto Networks solutions, including Prisma Access, Prisma Cloud and Cortex security ...
CyberArk Introduces First Identity Security-Based Enterprise Browser

CyberArk Introduces First Identity Security-Based Enterprise Browser

Organisations Gain an Easy-to-Adopt Browser for Employees and Third Parties That Powers Security, Privacy and Productivity
Tenable and Splunk Launch Strategic Partnership to Improve Data-Driven Incident Response

Tenable and Splunk Launch Strategic Partnership to Improve Data-Driven Incident Response

Splunk names Tenable its strategic vulnerability management provider
Mastercard Ramps Up Fraud Protection for eCommerce Merchants by Integrating Vesta Solutions into Mastercard Payment Gateway Services

Mastercard Ramps Up Fraud Protection for eCommerce Merchants by Integrating Vesta Solutions into Mastercard Payment Gateway Services

Mastercard today announced the expansion of its partnership with Vesta, the global leader in payment fraud protection. Building on the two firms’ existing fraud detection collaboration, Mastercard will be integrating Vesta’s iron-clad Payment Guarantee™ and Payment Protect risk scoring solution into its Mastercard Payment Gateway Services (MGPS) platform.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governements, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This