The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Women Needed in Cyber for Australia’s Economic Prosperity

Women Needed in Cyber for Australia’s Economic Prosperity

Many of you in the cybersecurity industry already know about my dedication and passion to encourage more women to enter into and remain in the cybersecurity and broader tech sector. Having spoken around the world at numerous conferences, founded ISACA’s SheLeadsTech program, and participated in the United Nations Commission on the Status of Women in ...
Five Ways to Identify Phishing Emails

Five Ways to Identify Phishing Emails

As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags you should be looking for before clicking on a new message. Here is our up-to-date guide to help you recognise the latest email-based scams. What is phishing? Phishing is a cyber-attack typically ...
Why multi-factor authentication on the PEXA platform leaves security concerns

Why multi-factor authentication on the PEXA platform leaves security concerns

We published an article yesterday explaining why we see problems with the newly-introduced multi-factor authentication security measure on the PEXA electronic conveyancing platform. As a response to the growing number of conveyancing scams, such as the highly-publicised case involving the former MasterChef contestant, PEXA decided to introduce 2FA to ...
How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

Iron Bastion’s cybersecurity expert Gabor Szathmari, recently published novel research on abandoned internet domains, and how they are a significant cyber risk which threatens businesses and in particular the Australian legal profession. What is an Abandoned Domain Name? A domain name is a name you can register to identify your business on the ...
The Alphabet of Electronic Conveyancing

The Alphabet of Electronic Conveyancing

ARNECC, ELN, ELNO, ECNL, PEXA... A recent cyber-attack incident against a property settlement transaction processed through the PEXA network has raised concerns over the transition from the traditional paper-based settlement process to electronic conveyancing. A number of cyber security experts have expressed their concerns about the cyber security ...

Why You Need Professional Email Hosting for Your Business

Your business deserves a reliable, safe and secure email service provider so that you can focus on your clients and not have to worry about cyber attacks. Email is an essential service for every business. However, not all email service providers are created equal. Some email services are more susceptible to hacking and data loss than others. In this ...

How To Prevent Payment Redirection Fraud At Your Conveyancing Practice

Enforcing Two-factor Authentication (2FA) on your email service is a robust security measure that can prevent payment redirection fraud. In the following article, we demonstrate how you can enable this powerful security feature on your corporate email accounts hosted on Office 365 or G Suite. By making this simple change, you can reduce the chances of ...

How to Protect Your Legal Practice from Payment Redirection Fraud

This article is aimed at helping legal professionals who commonly provide payment instructions for trust accounts and other transactions over email. Providing payment instructions over email puts you at risk of payment redirection fraud. In this article, you will learn why Australian legal professionals are high-value targets for cybercriminals and why ...

In The News

SolarWinds Appoints Rahul Tabeck as New Pacific Lead

SolarWinds Appoints Rahul Tabeck as New Pacific Lead

SYDNEY, AUSTRALIA – Feb. 6, 2024 – SolarWinds (NYSE:SWI), a leading provider of simple, powerful, secure observability and IT management software, today announced the recent appointment of Rahul Tabeck as the regional sales director of Australia and New Zealand (ANZ) business. “Rahul’s extensive IT industry experience and knowledge of the Pacific ...
SecurityBridge Celebrates Landmark Achievements in 2023: Doubling License Revenue, Perfect Customer Retention, and Continuing Global Reach

SecurityBridge Celebrates Landmark Achievements in 2023: Doubling License Revenue, Perfect Customer Retention, and Continuing Global Reach

Ingolstadt, Germany, January 29, 2024 – SecurityBridge, a leading global provider of SAP security solutions, today announces its remarkable 2023 achievements—marking another year of unprecedented growth and innovation in the SAP cybersecurity sector. The company has doubled its license revenue, maintained 100% year-over-year growth, and achieved a ...
SAP Security Response Names SecurityBridge’s Research Lab As Top-3 Worldwide; Joris Van De Vis Appointed Lab’s Director

SAP Security Response Names SecurityBridge’s Research Lab As Top-3 Worldwide; Joris Van De Vis Appointed Lab’s Director

New York, NY, January 23, 2024 – SecurityBridge, a leading global provider of SAP security solutions, today announced the SAP Security Response Team has rated the SecurityBridge Research Lab among the Top-3 sources for discovering and reporting vulnerabilities in SAP software. The research lab has found and reported over 100 zero-day vulnerabilities ...
58% Of Australian Businesses Increase It Security Spending, With A Third Facing Ransomware Attacks In 2023

58% Of Australian Businesses Increase It Security Spending, With A Third Facing Ransomware Attacks In 2023

A recent survey by leading software research site Capterra reveals that Australian businesses are more actively improving their cybersecurity infrastructure to defend against potential attacks. The study's findings show that a third (33%) of the respondents have experienced security breaches in 2023 amidst recent notable data breaches occurring at ...
Teamviewer Unveils Real-Time Assistance App For Apple Vision Pro

Teamviewer Unveils Real-Time Assistance App For Apple Vision Pro

TeamViewer Spatial Support helps remote users interact with lifelike 3D models and collaborate in real time
Qualys Cybersecurity Asset Management Expands to Detect Unauthorised Devices Across Hybrid Environments

Qualys Cybersecurity Asset Management Expands to Detect Unauthorised Devices Across Hybrid Environments

Groundbreaking functionality enables millions of cloud agents to discover risky unmanaged devices in real time with one click
Check Point Software Unveils Infinity AI Copilot: Transforming Cybersecurity with Intelligent GenAI Automation and Support

Check Point Software Unveils Infinity AI Copilot: Transforming Cybersecurity with Intelligent GenAI Automation and Support

Check Point's latest innovation, brings AI-powered efficiency and collaboration to cyber security management across platforms
SentinelOne® Launches Threat Hunting for WatchTower™ and WatchTower Pro™

SentinelOne® Launches Threat Hunting for WatchTower™ and WatchTower Pro™

New machine learning and advanced behavioural threat hunting capabilities in managed threat hunting services empower security teams to defend against threats in real time.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This