The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

What’s up Doc?

What’s up Doc?

So I am pretty bad at going to the doctor on time, yes I am one of those people who get the overdue notifications on the weekly. I finally had enough courage to turn up to get my regular medication. Generally, when doctors release scripts it’s one of those situations where you put your script in your bag and run out. When I needed to return back to ...
Women Needed in Cyber for Australia’s Economic Prosperity

Women Needed in Cyber for Australia’s Economic Prosperity

Many of you in the cybersecurity industry already know about my dedication and passion to encourage more women to enter into and remain in the cybersecurity and broader tech sector. Having spoken around the world at numerous conferences, founded ISACA’s SheLeadsTech program, and participated in the United Nations Commission on the Status of Women in ...
Five Ways to Identify Phishing Emails

Five Ways to Identify Phishing Emails

As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags you should be looking for before clicking on a new message. Here is our up-to-date guide to help you recognise the latest email-based scams. What is phishing? Phishing is a cyber-attack typically ...
Why multi-factor authentication on the PEXA platform leaves security concerns

Why multi-factor authentication on the PEXA platform leaves security concerns

We published an article yesterday explaining why we see problems with the newly-introduced multi-factor authentication security measure on the PEXA electronic conveyancing platform. As a response to the growing number of conveyancing scams, such as the highly-publicised case involving the former MasterChef contestant, PEXA decided to introduce 2FA to ...
How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

How Abandoned Domain Names Pose a Major Cyber Risk to Your Business

Iron Bastion’s cybersecurity expert Gabor Szathmari, recently published novel research on abandoned internet domains, and how they are a significant cyber risk which threatens businesses and in particular the Australian legal profession. What is an Abandoned Domain Name? A domain name is a name you can register to identify your business on the ...
The Alphabet of Electronic Conveyancing

The Alphabet of Electronic Conveyancing

ARNECC, ELN, ELNO, ECNL, PEXA... A recent cyber-attack incident against a property settlement transaction processed through the PEXA network has raised concerns over the transition from the traditional paper-based settlement process to electronic conveyancing. A number of cyber security experts have expressed their concerns about the cyber security ...

Why You Need Professional Email Hosting for Your Business

Your business deserves a reliable, safe and secure email service provider so that you can focus on your clients and not have to worry about cyber attacks. Email is an essential service for every business. However, not all email service providers are created equal. Some email services are more susceptible to hacking and data loss than others. In this ...
How To Prevent Payment Redirection Fraud At Your Conveyancing Practice

How To Prevent Payment Redirection Fraud At Your Conveyancing Practice

Enforcing Two-factor Authentication (2FA) on your email service is a robust security measure that can prevent payment redirection fraud. In the following article, we demonstrate how you can enable this powerful security feature on your corporate email accounts hosted on Office 365 or G Suite. By making this simple change, you can reduce the chances of ...
No results found.

In The News

Digital Infrastructure Partnership Boosts Australian Business Confidence, Backs Economic Growth Across the Region

Digital Infrastructure Partnership Boosts Australian Business Confidence, Backs Economic Growth Across the Region

QUEENSLAND, Australia – 9 December 2024 – NetApp, the intelligent data infrastructure company, has announced that its strategic partnership with Australian data centre and cloud services group, iseek has grown exponentially, with NetApp now managing 5X the volume of data compared to when they first partnered together eight years ago, as enterprises, ...
Fortinet achieves the highest possible “AAA” rating on the industry’s only independent, third-party security service edge test

Fortinet achieves the highest possible “AAA” rating on the industry’s only independent, third-party security service edge test

FortiSASE earned high scores in all four test categories, highlighting its ability to deliver robust, cloud-delivered security while ensuring efficient network performance 
FedRAMP® Authorization Cements Trend Micro as Zero Trust Compliance Leader

FedRAMP® Authorization Cements Trend Micro as Zero Trust Compliance Leader

SYDNEY, December 6, 2024 – Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced its latest platform compliance achievement: Trend Vision One™ for Government has obtained a FedRAMP® Authorization to Operate (ATO). This milestone enables Federal government customers to leverage Trend’s platform to rapidly stop ...
Nozomi Networks and Advens Team to Deliver Advanced Cybersecurity Services to Industrial and Critical Infrastructure Environments

Nozomi Networks and Advens Team to Deliver Advanced Cybersecurity Services to Industrial and Critical Infrastructure Environments

• Nozomi Networks OT and IoT visibility, threat detection and risk management capabilities now part of Advens Managed Security Services offered to customers countries across Europe • Paris Olympics joins a growing list of customers benefiting from this MSSP partnership
SecurityBridge Partners with Altum Strategy Group to Bridge SAP Security Gaps For Small and Medium-Sized Businesses

SecurityBridge Partners with Altum Strategy Group to Bridge SAP Security Gaps For Small and Medium-Sized Businesses

By adding SecurityBridge’s solution, Altum will now offer its customers the ability to address SAP security with Altum’s deep expertise and strategic thinking and SecurityBridge’s cybersecurity solution. 
OpenText Partners with Secure Code Warrior to Deliver Comprehensive Application Security and Customised Developer Risk Management

OpenText Partners with Secure Code Warrior to Deliver Comprehensive Application Security and Customised Developer Risk Management

The new agreement empowers development teams with continuous upskilling to turn security into a strategic advantage, reduce risks, and elevate customer trust
Elastic Awarded A 2024 AWS Partner Award

Elastic Awarded A 2024 AWS Partner Award

Elastic recognised as the AWS Global Generative AI Infrastructure and Data Partner of the Year
New Research From NetApp Finds One In Five Companies Unable To Recover Data After Cyberattack

New Research From NetApp Finds One In Five Companies Unable To Recover Data After Cyberattack

NetApp® (NASDAQ: NTAP), the intelligent data infrastructure company, today announced the release of its latest report analysing the state of cybersecurity and offering actionable insights to help organisations strengthen their cyber resiliency. The Futurum Group study, "Cloud, Complexity, AI: The Triple Threat Demanding New Cyber Resilience Strategies" ...
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This