The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
How you can protect your Microsoft Exchange email service from cyber attacks
Microsoft Exchange is a popular choice for providing email services for businesses. Its email features and seamless integration with Microsoft Outlook are undoubtedly convenient and easy to use, but what about security?
Microsoft Exchange runs exclusively on Windows Server, which in 2017 was affected by various critical vulnerabilities,ย putting ...
Report: Australiaโs Top Law Firms Lead the Way in the Use of Anti-Phishing Technologies
Most of Australiaโs top-tier and mid-tier law firms are well prepared in defending against phishing attacks, Iron Bastion's new study can now reveal.
Iron Bastion ย have assessed Australiaโs top one hundred law firms for their use of anti-phishing technology. The details were gathered from various public data sources to determine whether email services ...
Zooming Around
How is Zoom changing us, and how are we changing Zoom?๐ง With the current state of the world, how reliable and secure is the platform upon which so many now rely?
WHAT IS CPS234 AND WHAT DOES IT MEAN FOR ME?
An increase in the risk of cyber security brings an increase in the publicity surrounding the issue and the regulations governing it. This year we have already seen a number of new regulations coming into effect that will impact the majority of both Australian and international organisations.
In March 2018, the Australian Prudential Regulation ...
To Infinity & Beyond… With Artificial Intelligence
We are always hearing about technologies that are trending. But what happens next for technology disruptors? For me, it's about understanding these developments and actually looking intrinsically about why these particular trends are going to accelerate the cloud computing space. The way I see it is that machine learning algorithms and advanced ...
Critical Communications
Topic: Communication for internal teams on the importance of understanding risk
If all communication was abolished, society would crumble. Fast. Yet one area that I have noticed in the security industry which I believe needs a lot of attention - and often goes unmentioned - is how we communicate internally to our teams on the importance of ...
Start Your Engines
You had a neat idea. Youโve built on it, and now started to turn it into a commercial reality. It doesnโt matter if youโve the best product or service in the universe, if itโs not developed, marketed, sold, and delivered in the best possible way youโre falling short of your potential, and will flounder. You canโt do it all on your own of course, so now ...
How to Run Effective Security Awareness Training for your Organisation
Ever wondered how you can deliver security awareness training to staff in your organisation that they will love? In this article, we are revealing the techniques we find useful in our training sessions which should help you get started with your first phishing awareness training session for your organisation.
(more…)
In The News
Critical Memory Corruption Vulnerability in Fluent Bit’s Built-in HTTP Server
Tenable Research has discovered a critical memory corruption vulnerability in Fluent Bitโs built-in HTTP server that could potentially result in denial of service (DoS), information leakage, or remote code execution (RCE). The issue was reported to the projectโs maintainers on April 30, 2024. Fixes were committed to the projectโs main branch on May 15 ...
SecurityBridge Introduces Its Next-Generation Security Dashboard for SAP
New Dashboard Provides a Customized, At-A-Glance View of the Entire SAP Security Landscape
Superloop Achieves Accreditation for Prisma SASE From Palo Alto Networks
SYDNEY, Australia, 16 May 2024ย โ Palo Alto Networks, the global cybersecurity leader, announced today that Australian telecommunications provider, Superloop, has achieved Palo Alto Networksโ MSSP accreditation for Prisma SASE. This accreditation underscores Superloopโs proven expertise in delivering SD-WAN and Cloud Security Services.
To obtain this ...
Tesserent Advice on Managing and Enhancing Third-party Supplier Risks Following MediSecure Incident
"It's important for organisations to protect sensitive information, safeguard intellectual property, maintain supply chain integrity, ensure compliance with regulations, and mitigate operational risks.ย
Tenable Warns That Kinsing Malware Is Exploiting Apache Tomcat Servers With New Advanced Stealth Techniques
Kinsing malware has previously been seen targeting Linux-based cloud infrastructures, now hitting Apache Tomcat servers
Qualys Names New Managing Director for Australia And New Zealand
Qualys, the cybersecurity vulnerability management company, has recently appointed Sam Salehi to be the new Managing Director for Australia & New Zealand.
Previously, Salehi was a Sales Director in the Asia Pacific region at Trustwave, which fostered the commercial experience, relationships, and nuanced understanding of the region to take into ...
Github Offers Details On Internal Accessibility Programs; Amplifies Voices Of Disabled Devs
GitHub celebrates Global Accessibility Awareness Day by launching another instalment of the Coding Accessibility series and sharing how it scales accessibility within GitHub and beyond
Zscaler Unveils AI Innovations to Power the Industryโs Most Comprehensive Data Protection Platform
New Data Security Posture Management (DSPM), Inline email protection and Gen-AI security advancements safeguard data-in-motion and data-at-rest across all
exfiltration channels
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..