The Voice of Cyberยฎ

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

How you can protect your Microsoft Exchange email service from cyber attacks

Microsoft Exchange is a popular choice for providing email services for businesses. Its email features and seamless integration with Microsoft Outlook are undoubtedly convenient and easy to use, but what about security? Microsoft Exchange runs exclusively on Windows Server, which in 2017 was affected by various critical vulnerabilities,ย putting ...

Report: Australiaโ€™s Top Law Firms Lead the Way in the Use of Anti-Phishing Technologies

Most of Australiaโ€™s top-tier and mid-tier law firms are well prepared in defending against phishing attacks, Iron Bastion's new study can now reveal. Iron Bastion ย have assessed Australiaโ€™s top one hundred law firms for their use of anti-phishing technology. The details were gathered from various public data sources to determine whether email services ...
Zooming Around

Zooming Around

How is Zoom changing us, and how are we changing Zoom?๐Ÿง With the current state of the world, how reliable and secure is the platform upon which so many now rely?
WHAT IS CPS234 AND WHAT DOES IT MEAN FOR ME?

WHAT IS CPS234 AND WHAT DOES IT MEAN FOR ME?

An increase in the risk of cyber security brings an increase in the publicity surrounding the issue and the regulations governing it. This year we have already seen a number of new regulations coming into effect that will impact the majority of both Australian and international organisations. In March 2018, the Australian Prudential Regulation ...

To Infinity & Beyond… With Artificial Intelligence

We are always hearing about technologies that are trending. But what happens next for technology disruptors? For me, it's about understanding these developments and actually looking intrinsically about why these particular trends are going to accelerate the cloud computing space. The way I see it is that machine learning algorithms and advanced ...
Critical Communications

Critical Communications

Topic: Communication for internal teams on the importance of understanding risk If all communication was abolished, society would crumble. Fast. Yet one area that I have noticed in the security industry which I believe needs a lot of attention - and often goes unmentioned - is how we communicate internally to our teams on the importance of ...
Start Your Engines

Start Your Engines

You had a neat idea. Youโ€™ve built on it, and now started to turn it into a commercial reality. It doesnโ€™t matter if youโ€™ve the best product or service in the universe, if itโ€™s not developed, marketed, sold, and delivered in the best possible way youโ€™re falling short of your potential, and will flounder. You canโ€™t do it all on your own of course, so now ...
How to Run Effective Security Awareness Training for your Organisation

How to Run Effective Security Awareness Training for your Organisation

Ever wondered how you can deliver security awareness training to staff in your organisation that they will love? In this article, we are revealing the techniques we find useful in our training sessions which should help you get started with your first phishing awareness training session for your organisation. (more…)

In The News

Critical Memory Corruption Vulnerability in Fluent Bit’s Built-in HTTP Server

Critical Memory Corruption Vulnerability in Fluent Bit’s Built-in HTTP Server

Tenable Research has discovered a critical memory corruption vulnerability in Fluent Bitโ€™s built-in HTTP server that could potentially result in denial of service (DoS), information leakage, or remote code execution (RCE). The issue was reported to the projectโ€™s maintainers on April 30, 2024. Fixes were committed to the projectโ€™s main branch on May 15 ...
SecurityBridge Introduces Its Next-Generation Security Dashboard for SAP

SecurityBridge Introduces Its Next-Generation Security Dashboard for SAP

New Dashboard Provides a Customized, At-A-Glance View of the Entire SAP Security Landscape
Superloop Achieves Accreditation for Prisma SASE From Palo Alto Networks

Superloop Achieves Accreditation for Prisma SASE From Palo Alto Networks

SYDNEY, Australia, 16 May 2024ย โ€“ Palo Alto Networks, the global cybersecurity leader, announced today that Australian telecommunications provider, Superloop, has achieved Palo Alto Networksโ€™ MSSP accreditation for Prisma SASE. This accreditation underscores Superloopโ€™s proven expertise in delivering SD-WAN and Cloud Security Services. To obtain this ...
Tesserent Advice on Managing and Enhancing Third-party Supplier Risks Following MediSecure Incident

Tesserent Advice on Managing and Enhancing Third-party Supplier Risks Following MediSecure Incident

"It's important for organisations to protect sensitive information, safeguard intellectual property, maintain supply chain integrity, ensure compliance with regulations, and mitigate operational risks.ย 
Tenable Warns That Kinsing Malware Is Exploiting Apache Tomcat Servers With New Advanced Stealth Techniques

Tenable Warns That Kinsing Malware Is Exploiting Apache Tomcat Servers With New Advanced Stealth Techniques

Kinsing malware has previously been seen targeting Linux-based cloud infrastructures, now hitting Apache Tomcat servers
Qualys Names New Managing Director for Australia And New Zealand

Qualys Names New Managing Director for Australia And New Zealand

Qualys, the cybersecurity vulnerability management company, has recently appointed Sam Salehi to be the new Managing Director for Australia & New Zealand. Previously, Salehi was a Sales Director in the Asia Pacific region at Trustwave, which fostered the commercial experience, relationships, and nuanced understanding of the region to take into ...
Github Offers Details On Internal Accessibility Programs; Amplifies Voices Of Disabled Devs

Github Offers Details On Internal Accessibility Programs; Amplifies Voices Of Disabled Devs

GitHub celebrates Global Accessibility Awareness Day by launching another instalment of the Coding Accessibility series and sharing how it scales accessibility within GitHub and beyond
Zscaler Unveils AI Innovations to Power the Industryโ€™s Most Comprehensive Data Protection Platform

Zscaler Unveils AI Innovations to Power the Industryโ€™s Most Comprehensive Data Protection Platform

New Data Security Posture Management (DSPM), Inline email protection and Gen-AI security advancements safeguard data-in-motion and data-at-rest across all exfiltration channels

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This