The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
How Abandoned Domain Names Pose a Major Cyber Risk to Your Business
Iron Bastionโs cybersecurity expert Gabor Szathmari, recently published novelย research on abandoned internet domains, and how they are a significant cyber risk which threatens businesses and in particular the Australian legal profession.
What is an Abandoned Domain Name?
A domain name is a name you can register to identify your business on the ...
The Alphabet of Electronic Conveyancing
ARNECC, ELN, ELNO, ECNL, PEXA...
Aย recent cyber-attack incidentย against a property settlement transaction processed through the PEXA network has raised concerns over the transition from the traditional paper-based settlement process to electronic conveyancing. A number of cyberย security experts have expressed their concernsย about the cyber security ...
Why You Need Professional Email Hosting for Your Business
Your business deserves a reliable, safe and secure email service provider so that you can focus on your clients and not have to worry about cyber attacks. Email is an essential service for every business. However, not all email service providers are created equal. Some email services are more susceptible to hacking and data loss than others. In this ...
How To Prevent Payment Redirection Fraud At Your Conveyancing Practice
Enforcing Two-factor Authentication (2FA) on your email service is a robust security measure that can prevent payment redirection fraud. In the following article, we demonstrate how you can enable this powerful security feature on your corporate email accounts hosted on Office 365 or G Suite. By making this simple change, you can reduce the chances of ...
How to Protect Your Legal Practice from Payment Redirection Fraud
This article is aimed at helping legal professionals who commonly provide payment instructions for trust accounts and other transactions over email. Providing payment instructions over email puts you at risk of payment redirection fraud. In this article, you will learn why Australian legal professionals are high-value targets for cybercriminals and why ...
Is Your Conveyancing Practice Secure From Hacking?
The recent media reports of fraud against conveyancing practices suggest that professionals should be taking measures for protecting their businesses from cyber attacks. Cybercriminals primarily rely on an email-based attack known as phishing to help commit payment redirection fraud. A recent Telstra Security Report found thatย the most common ...
Cheap Shots are taking Creep Shots of Women
Do you ever get that feeling thatโs someone is watching you, or you are being followed? It freaks me out. Now, how do you feel when some random person has taken a photo of you?
Well, sometimes you can never be too sure about what the case is. But, what happens when the creep shots take cheap shots? Yep, a whole new level we are heading to.
What is ...
Australian Companies Urged to Consider Pros and Cons of Paying a Ransom
The conversation is becoming more commonplace about whether companies should pay in a ransomware attack. Unfortunately, these crippling cyber-assaults are taking place too frequently across the globe, with targets and outcomes getting more consequential and more threatening for our workforce and communities.
Cyber-criminals and other nefarious actors ...
In The News
Riverbed Unveils Most Advanced AI-Powered Platform to Optimize Digital Experiences, and New Solutions for Mobile, Cloud, AIOps
โข New open Platform optimizes digital experiences by leveraging full-fidelity data and AI to automate prevention, identification, and resolution of IT issues โข New observability solutions include Aternity Mobile to monitor the performance of enterprise mobile devices and NPM+, a SaaS-delivered service that overcomes network blind spots including cloud ...
Fortinet Unveils New Fortigate 200G Series To Deliver Cutting-Edge Performance And AI-Powered Security Services To The Modern Campus
John Maddison,ย chief marketing officer, Fortinet, said, โNetworks are growing in complexity and scope, and they require high performance and advanced security at the edge. We designed the FortiGate 200G series to serve as a new approach for perimeter security with the computing power and artificial intelligence (AI)-enhanced protections enterprises ...
Developers Spending More Time Firefighting Issues Than Delivering Innovation
Developers warn that the current pace of innovation is not sustainable unless organisations equip IT teams with the tools they need. โข Absence of the right tools to understand root cause of application performance issues and resolve them quickly results in developers spending hours in war room meetings and debugging applications, instead of creating ...
Dynatrace Announces Industryโs First Observability-Driven Kubernetes Security Posture Management Solution
Extends the Dynatrace platformโs existing security capabilities to enable customers to drive Cloud-Native Application Protection at scale
WALTHAM, Mass., May 7, 2024 โ Dynatrace (NYSE: DT), the leader in unified observability and security, today announced it is enhancing its platform with new Kubernetes Security Posture Management (KSPM) ...
The AI Reality: New Research from ISACA Identifies Gaps in AI Knowledge, Training and Policies
According to a new ISACA pulse poll of 3,270 digital trust professionals, only 15% of organisations have AI policies, and 40% of organisations offer no AI training at all. These gaps are concerning given that 70% of respondents say staff are using AI, and 60% say employees are using generative AI (e.g., Microsoft CoPilot, Google Gemini, and OpenAIโs ...
Dragos Announces New Integration with CrowdStrike Falconยฎ Next-Gen SIEM for Enhanced Threat Detection in OT Networks
Dragos has announced an expanded partnership with CrowdStrike to integrate OT threat intelligence from the Dragos Platform into the CrowdStrike Falcon Next-Gen SIEM. The integration enables SOC analysts to quickly pinpoint malicious behaviour on OT networks and have the context they need to reduce false positives, prioritise mitigations, and achieve ...
Cloudflare Announces Unified Risk Posture to Provide Comprehensive and Continuous Risk Management at Scale – for Free
Advanced suite of risk management capabilities enables seamless discovery and mitigation of threats across applications, data loss or exposure, and human error
ExtraHopยฎ Launches New AI Tools for SOC Analysts
Strengthens award-winning RevealXTM platform with new AI features to accelerate threat detection and response
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..