The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Women Needed in Cyber for Australiaโ€™s Economic Prosperity

Women Needed in Cyber for Australiaโ€™s Economic Prosperity

Many of you in the cybersecurity industry already know about my dedication and passion to encourage more women to enter into and remain in the cybersecurity and broader tech sector. Having spoken around the world at numerous conferences, founded ISACAโ€™s SheLeadsTech program, and participated in the United Nations Commission on the Status of Women in ...
Five Ways to Identify Phishing Emails

Five Ways to Identify Phishing Emails

As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags you should be looking for before clicking on a new message. Here is our up-to-date guide to help you recognise the latest email-based scams. What is phishing? Phishing is a cyber-attack typically ...
Why multi-factor authentication on the PEXA platform leaves security concerns

Why multi-factor authentication on the PEXA platform leaves security concerns

We published an article yesterday explaining why we seeย problems with the newly-introduced multi-factor authentication security measure on the PEXA electronic conveyancing platform. As a response to the growing number of conveyancing scams, such as theย highly-publicised case involving the former MasterChef contestant, PEXA decided to introduce 2FA to ...
How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

Iron Bastionโ€™s cybersecurity expert Gabor Szathmari, recently published novelย research on abandoned internet domains, and how they are a significant cyber risk which threatens businesses and in particular the Australian legal profession. What is an Abandoned Domain Name? A domain name is a name you can register to identify your business on the ...
The Alphabet of Electronic Conveyancing

The Alphabet of Electronic Conveyancing

ARNECC, ELN, ELNO, ECNL, PEXA... Aย recent cyber-attack incidentย against a property settlement transaction processed through the PEXA network has raised concerns over the transition from the traditional paper-based settlement process to electronic conveyancing. A number of cyberย security experts have expressed their concernsย about the cyber security ...

Why You Need Professional Email Hosting for Your Business

Your business deserves a reliable, safe and secure email service provider so that you can focus on your clients and not have to worry about cyber attacks. Email is an essential service for every business. However, not all email service providers are created equal. Some email services are more susceptible to hacking and data loss than others. In this ...
How To Prevent Payment Redirection Fraud At Your Conveyancing Practice

How To Prevent Payment Redirection Fraud At Your Conveyancing Practice

Enforcing Two-factor Authentication (2FA) on your email service is a robust security measure that can prevent payment redirection fraud. In the following article, we demonstrate how you can enable this powerful security feature on your corporate email accounts hosted on Office 365 or G Suite. By making this simple change, you can reduce the chances of ...

How to Protect Your Legal Practice from Payment Redirection Fraud

This article is aimed at helping legal professionals who commonly provide payment instructions for trust accounts and other transactions over email. Providing payment instructions over email puts you at risk of payment redirection fraud. In this article, you will learn why Australian legal professionals are high-value targets for cybercriminals and why ...

In The News

Check Point Software Advances API Security Supporting Enterprise Digital Transformation

Check Point Software Advances API Security Supporting Enterprise Digital Transformation

New API discovery feature on Check Point CloudGuard recognised in latest GigaOm Radar for Application and API Security
OVHcloud Adds Qiskit To Market Leading Quantum Notebooks Portfolio

OVHcloud Adds Qiskit To Market Leading Quantum Notebooks Portfolio

OVHcloud, the European Cloud leader, today announces at France Quantum 2024 updates to its Quantum Notebooks portfolio. To further support the rapid growth and development of quantum computing, OVHcloud adds a new Quantum Notebook supporting the IBM-developed open-source QiskitTM SDK. This new addition completes OVHcloudโ€™s already impressive set of ...
Fastly Partners with RSM To Support Australian and New Zealand Businesses With Cybersecurity Readiness

Fastly Partners with RSM To Support Australian and New Zealand Businesses With Cybersecurity Readiness

SYDNEY โ€“ May 23, 2024 โ€“ Fastly, Inc. (NYSE: FSLY), a leader in global edge cloud platforms, today announced it has partnered in Australia and New Zealand with RSM, the leading provider of assurance, tax and consulting services to middle-market businesses, to provide enterprises with solutions and advisory support for their customersโ€™ cybersecurity ...
LexisNexis Risk Solutions Cybercrime Report Reveals 19% Annual Increase in Global Human-Initiated Digital Attack Rate

LexisNexis Risk Solutions Cybercrime Report Reveals 19% Annual Increase in Global Human-Initiated Digital Attack Rate

Volume of human-initiated attacks surged by 40%, while automated bot attacks increased by 2%. Cybercriminals are utilizing remote scam centers based in Southeast Asia to launch attacks on consumers globally. Third-party account takeover is the most common fraud classification reported by clients (29% of all classifications).
Fortinet Australia Appoints Gavin Lipman As Its New Enterprise Director

Fortinet Australia Appoints Gavin Lipman As Its New Enterprise Director

May 23, 2024 โ€“ Fortinet, the global cybersecurity leader driving the convergence of networking and security, has appointed Gavin Lipman to the role of enterprise director in Australia, underscoring the companyโ€™s commitment to enhancing cybersecurity solutions and support for Australian organisations. Gavin is a seasoned executive with more than 25 ...
Pax8 and Perception Point Announce New Partnership

Pax8 and Perception Point Announce New Partnership

Pax8 has partnered with Perception Point to provide advanced threat prevention solutions covering email, Microsoft 365 apps, and web browsers. The collaboration includes a 24/7 managed incident response service, enhancing security and efficiency for partners.
SolarWinds AI Launches to Transform IT Service Management

SolarWinds AI Launches to Transform IT Service Management

Generative AI engine developed under new AI by Design framework debuts in companyโ€™s premier ITSM solution
Wavelink and Swimlane announce partnership and distribution agreement to enhance cybersecurity operations

Wavelink and Swimlane announce partnership and distribution agreement to enhance cybersecurity operations

May 21, 2024 โ€” Wavelink, a leader in providing enterprise solutions to theโ€ฏchannel, has announced a strategic partnership and distribution agreement for the Australia and New Zealand (ANZ) region with Swimlane, the leader in automation for entire security organisations. Through this partnership, Wavelink will distribute Swimlaneโ€™s artificial ...

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This