The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Phishing Is the Top Reason Behind Australian Data Breaches

Phishing Is the Top Reason Behind Australian Data Breaches

The latest Notifiable Data Breaches Quarterly Statistics Report by the Office of the Australian Information Commissioner (OAIC) confirms that half of the reported data breaches in July to September 2018 quarter are attributable to phishing. According to the report, the top five sectors by data breach notifications in the last quarter were: Health ...
How Economists Can Help Protect Personal Data

How Economists Can Help Protect Personal Data

If you are about to hand over your private details in exchange for a store loyalty card, are you confident that your data remains in safe hands? It can be difficult to predict if the supermarket manages your sensitive details securely and responsibly. The company may store them on vulnerable servers waiting for hackers to attack. Also, your data might ...
TikTok – Not a Shock?

TikTok – Not a Shock?

The new app on the block; TikTok has been on our radar for a while; in a way that was questionable in terms of the value it provided, but even bigger concerns about the security and privacy side of it.
What’s up Doc?

What’s up Doc?

So I am pretty bad at going to the doctor on time, yes I am one of those people who get the overdue notifications on the weekly. I finally had enough courage to turn up to get my regular medication. Generally, when doctors release scripts it’s one of those situations where you put your script in your bag and run out. When I needed to return back to ...
Women Needed in Cyber for Australia’s Economic Prosperity

Women Needed in Cyber for Australia’s Economic Prosperity

Many of you in the cybersecurity industry already know about my dedication and passion to encourage more women to enter into and remain in the cybersecurity and broader tech sector. Having spoken around the world at numerous conferences, founded ISACA’s SheLeadsTech program, and participated in the United Nations Commission on the Status of Women in ...
Five Ways to Identify Phishing Emails

Five Ways to Identify Phishing Emails

As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags you should be looking for before clicking on a new message. Here is our up-to-date guide to help you recognise the latest email-based scams. What is phishing? Phishing is a cyber-attack typically ...
Why multi-factor authentication on the PEXA platform leaves security concerns

Why multi-factor authentication on the PEXA platform leaves security concerns

We published an article yesterday explaining why we see problems with the newly-introduced multi-factor authentication security measure on the PEXA electronic conveyancing platform. As a response to the growing number of conveyancing scams, such as the highly-publicised case involving the former MasterChef contestant, PEXA decided to introduce 2FA to ...
How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

Iron Bastion’s cybersecurity expert Gabor Szathmari, recently published novel research on abandoned internet domains, and how they are a significant cyber risk which threatens businesses and in particular the Australian legal profession. What is an Abandoned Domain Name? A domain name is a name you can register to identify your business on the ...

In The News

Sophos is a Leader in the IDC MarketScape Report for Worldwide Modern Endpoint Security for Small Businesses 2024 Vendor Assessment

Sophos is a Leader in the IDC MarketScape Report for Worldwide Modern Endpoint Security for Small Businesses 2024 Vendor Assessment

Sophos has been announced it is a Leader in the IDC MarketScape: Worldwide Modern Endpoint Security for Small Businesses 2024 Vendor Assessment,* which evaluates the product offerings and business strategies of 18 modern endpoint security (MES) vendors. This news closely follows Sophos being named a Leader in the IDC MarketScape: Worldwide Modern ...
Nozomi Networks Secures $100 Million Investment to Accelerate Mission to Defend the World’s Critical Infrastructure from Cyber Threats

Nozomi Networks Secures $100 Million Investment to Accelerate Mission to Defend the World’s Critical Infrastructure from Cyber Threats

Nozomi Networks Inc. today announced a US$100 million Series E funding round to help accelerate innovative cyber defences and expand cost-efficient go-to-market expansion globally. This latest round includes investments from Mitsubishi Electric, a global leader in digital manufacturing, electronics and electrical equipment and Schneider Electric, a ...
Tenable Expands Generative AI Capabilities for Faster Attack Path Analysis and Mitigation Guidance

Tenable Expands Generative AI Capabilities for Faster Attack Path Analysis and Mitigation Guidance

14 March 2024 — Tenable®, the Exposure Management company, today announced innovative enhancements to ExposureAI, the generative AI capabilities and services within its Tenable One Exposure Management Platform. The new features enable customers to quickly summarise relevant attack paths, ask questions of an AI assistant and receive specific mitigation ...
State Of SecOps: Australia Braces Against Phishing, Ransomware Surge And Alert Fatigue, Urging Swift Adoption Of AI, And Automation For Security Operations

State Of SecOps: Australia Braces Against Phishing, Ransomware Surge And Alert Fatigue, Urging Swift Adoption Of AI, And Automation For Security Operations

Fortinet®, the global cybersecurity leader driving the convergence of networking and security, has revealed the outcomes of a new survey conducted by IDC on the state of security operations (SecOps) in the Asia-Pacific region. The survey, commissioned by Fortinet, provides valuable insights into the current SecOps landscape, emphasising the role of ...
VAST Data Unveils New Data Centre Architecture for the AI Factory

VAST Data Unveils New Data Centre Architecture for the AI Factory

VAST Data today unveiled a new AI cloud architecture designed to deliver unprecedented levels of performance, quality of service, zero-trust security, and space/cost/power efficiency for the AI factory. Building on NVIDIA BlueField-3 data processing unit (DPU) technology, VAST Data’s parallel system architecture makes it possible to disaggregate the ...
VAST Data and Supermicro Partner to Simplify and Accelerate AI Pipelines

VAST Data and Supermicro Partner to Simplify and Accelerate AI Pipelines

VAST Data and Supermicro today announced a new collaboration to deliver a full-stack, end-to-end AI solution aimed at simplifying the creation and expansion of large-scale AI deployments. Through this collaboration, VAST Data and Supermicro are offering service providers, hyperscale technology companies and large, data-centric enterprises with a highly ...
2024 Sophos Threat Report: Cybercrime on Main Street Details Cyberthreats Facing SMBs

2024 Sophos Threat Report: Cybercrime on Main Street Details Cyberthreats Facing SMBs

Sophos today released its annual 2024 Sophos Threat Report, with this year’s report detailing “Cybercrime on Main Street” and the biggest threats facing small- and medium-sized businesses (SMBs*). According to the report, in 2023, nearly 50% of malware detections for SMBs were keyloggers, spyware and stealers, malware that attackers use to steal data ...
Tesserent and Toorak College to Conduct a Series of Free Cybersecurity Sessions For All 100 Female Students In Year 10

Tesserent and Toorak College to Conduct a Series of Free Cybersecurity Sessions For All 100 Female Students In Year 10

MELBOURNE, AUSTRALIA, 12 March 2024:  Tesserent Academy has announced the launch of a pilot with Toorak College to conduct a series of cybersecurity sessions with all 100 of the College’s female students in Year 10. Tesserent Academy is fully subsidising the cost of this unique initiative, commencing in term 1 ahead of International Women’s Day and ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This