The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

What’s up Doc?

What’s up Doc?

So I am pretty bad at going to the doctor on time, yes I am one of those people who get the overdue notifications on the weekly. I finally had enough courage to turn up to get my regular medication. Generally, when doctors release scripts it’s one of those situations where you put your script in your bag and run out. When I needed to return back to ...
Women Needed in Cyber for Australia’s Economic Prosperity

Women Needed in Cyber for Australia’s Economic Prosperity

Many of you in the cybersecurity industry already know about my dedication and passion to encourage more women to enter into and remain in the cybersecurity and broader tech sector. Having spoken around the world at numerous conferences, founded ISACA’s SheLeadsTech program, and participated in the United Nations Commission on the Status of Women in ...
Five Ways to Identify Phishing Emails

Five Ways to Identify Phishing Emails

As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags you should be looking for before clicking on a new message. Here is our up-to-date guide to help you recognise the latest email-based scams. What is phishing? Phishing is a cyber-attack typically ...
Why multi-factor authentication on the PEXA platform leaves security concerns

Why multi-factor authentication on the PEXA platform leaves security concerns

We published an article yesterday explaining why we see problems with the newly-introduced multi-factor authentication security measure on the PEXA electronic conveyancing platform. As a response to the growing number of conveyancing scams, such as the highly-publicised case involving the former MasterChef contestant, PEXA decided to introduce 2FA to ...
How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

Iron Bastion’s cybersecurity expert Gabor Szathmari, recently published novel research on abandoned internet domains, and how they are a significant cyber risk which threatens businesses and in particular the Australian legal profession. What is an Abandoned Domain Name? A domain name is a name you can register to identify your business on the ...
The Alphabet of Electronic Conveyancing

The Alphabet of Electronic Conveyancing

ARNECC, ELN, ELNO, ECNL, PEXA... A recent cyber-attack incident against a property settlement transaction processed through the PEXA network has raised concerns over the transition from the traditional paper-based settlement process to electronic conveyancing. A number of cyber security experts have expressed their concerns about the cyber security ...

Why You Need Professional Email Hosting for Your Business

Your business deserves a reliable, safe and secure email service provider so that you can focus on your clients and not have to worry about cyber attacks. Email is an essential service for every business. However, not all email service providers are created equal. Some email services are more susceptible to hacking and data loss than others. In this ...

How To Prevent Payment Redirection Fraud At Your Conveyancing Practice

Enforcing Two-factor Authentication (2FA) on your email service is a robust security measure that can prevent payment redirection fraud. In the following article, we demonstrate how you can enable this powerful security feature on your corporate email accounts hosted on Office 365 or G Suite. By making this simple change, you can reduce the chances of ...

In The News

Coalition Launches Active Cyber Insurance in Australia

Coalition Launches Active Cyber Insurance in Australia

With Capacity Provided by Allianz Australia, the Company Brings a New, Comprehensive Digital Risk Management Solution to the Market to Help Businesses Improve Cyber Defences
ExtremeCloud Universal ZTNA Sets New Industry Standard for Simple, Secure Network Access

ExtremeCloud Universal ZTNA Sets New Industry Standard for Simple, Secure Network Access

Cloud-based Universal ZTNA to offer network access control, access point and switch security within a single solution, creating a frictionless user experience and consistent security policy
Appdome Partners with JetBrains TeamCity to Automate Delivery of Secure Mobile Apps

Appdome Partners with JetBrains TeamCity to Automate Delivery of Secure Mobile Apps

Partnership Brings Android and iOS Cyber Defense Automation Inside the JetBrains TeamCity CI/CD Pipeline
Elastic Global Threat Report 2023 Reveals Dominance of Ransomware

Elastic Global Threat Report 2023 Reveals Dominance of Ransomware

Increases in ransomware, commercial off-the-shelf malware, and attacks against cloud service providers create new challenges for cybersecurity teams
Absolute Software New Application Health Monitoring Extends Cyber Resilience to Leading Endpoint Security and Productivity Applications

Absolute Software New Application Health Monitoring Extends Cyber Resilience to Leading Endpoint Security and Productivity Applications

Customers Can Monitor More than 2,000 Top Endpoint Applications, Ensuring Always-On Security and Optimised Productivity
Kyndryl and Dynatrace Announce Global Alliance to Enhance Customers’ Insights

Kyndryl and Dynatrace Announce Global Alliance to Enhance Customers’ Insights

Combining Kyndryl’s end-to-end services with the Dynatrace observability platform to provide business value
Tenable Study Finds Australian Organisations Cannot Prevent 42%  of Cyberattacks

Tenable Study Finds Australian Organisations Cannot Prevent 42% of Cyberattacks

Tenable Study Finds Australian Organisations Cannot Prevent 42% of Cyberattacks. 56% of cybersecurity teams are too busy fighting critical incidents to take a proactive stance.
ExtraHop® Launches Zero Trust Extension for Netskope

ExtraHop® Launches Zero Trust Extension for Netskope

Introduces security service edge (SSE) integration to expand visibility across remote and distributed environments amid zero trust transformations

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This