The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Businesses Require New Techniques to Combat Phishing

The Verizon 2018 Data Breach Investigations Report provides valuable insights into emerging phishing threats. CISOs, IT managers and cybersecurity consultants should be aware of new phishing techniques this report raises in order to better manage the associated risk they bring. The most exciting finding in this year's report is the increased ...
Is the Cybersecurity of Your Business PEXA Ready?

Is the Cybersecurity of Your Business PEXA Ready?

You may have read about the highly publicised PEXA fraud which was reported whereby a Melbourne family was left homeless. As it transpired, the family’s conveyancer had their email hijacked by a cybercriminal. This lead to the conveyancer’s PEXA account being compromised and ultimately the theft of $250,000 by the criminal misdirecting settlement ...
Cybersecurity Tips for Conveyancers and Solicitors using PEXA

Cybersecurity Tips for Conveyancers and Solicitors using PEXA

You may have heard of the recent cybercrime perpetrated against the Australian e-conveyancing platform PEXA. A former MasterChef finalist and her family had $250,000 stolen from a property purchase transaction on the platform at settlement. In the following article, we explain the likely ways the fraud occurred and what practical things you can do ...

How you can protect your Microsoft Exchange email service from cyber attacks

Microsoft Exchange is a popular choice for providing email services for businesses. Its email features and seamless integration with Microsoft Outlook are undoubtedly convenient and easy to use, but what about security? Microsoft Exchange runs exclusively on Windows Server, which in 2017 was affected by various critical vulnerabilities, putting ...

Report: Australia’s Top Law Firms Lead the Way in the Use of Anti-Phishing Technologies

Most of Australia’s top-tier and mid-tier law firms are well prepared in defending against phishing attacks, Iron Bastion's new study can now reveal. Iron Bastion  have assessed Australia’s top one hundred law firms for their use of anti-phishing technology. The details were gathered from various public data sources to determine whether email services ...
Zooming Around

Zooming Around

How is Zoom changing us, and how are we changing Zoom?🧐 With the current state of the world, how reliable and secure is the platform upon which so many now rely?
WHAT IS CPS234 AND WHAT DOES IT MEAN FOR ME?

WHAT IS CPS234 AND WHAT DOES IT MEAN FOR ME?

An increase in the risk of cyber security brings an increase in the publicity surrounding the issue and the regulations governing it. This year we have already seen a number of new regulations coming into effect that will impact the majority of both Australian and international organisations. In March 2018, the Australian Prudential Regulation ...
To Infinity & Beyond… With Artificial Intelligence

To Infinity & Beyond… With Artificial Intelligence

We are always hearing about technologies that are trending. But what happens next for technology disruptors? For me, it's about understanding these developments and actually looking intrinsically about why these particular trends are going to accelerate the cloud computing space. The way I see it is that machine learning algorithms and advanced ...
No results found.

In The News

CyberArk and Device Authority, in Collaboration with Microsoft, Deliver Secure Device Authentication for Manufacturers

CyberArk and Device Authority, in Collaboration with Microsoft, Deliver Secure Device Authentication for Manufacturers

CyberArk (NASDAQ: CYBR) and Device Authority, in collaboration with Microsoft, have launched a solution that strengthens and scales connected device authentication to enterprise applications with Zero Trust principles. It helps manufacturers reduce cyber risk from connected devices in factory floors and edge environments with robust identity security, ...
Check Point Software Technologies Partners with Cardano to Deliver Real-Time Threat Prevention Security Solution for Web3 and Blockchain

Check Point Software Technologies Partners with Cardano to Deliver Real-Time Threat Prevention Security Solution for Web3 and Blockchain

Unlocking Web3: How Real-Time Security Can Drive Blockchain Adoption
Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

Security Industry Embraces Mobile Credentials, Biometrics and AI, New Trends Report From HID Finds

Latest State of Security and Identity Report reveals a shift toward software-driven solutions and artificial intelligence in 2025
Quorum Cyber Receives Microsoft Security Excellence Awards Trifecta

Quorum Cyber Receives Microsoft Security Excellence Awards Trifecta

All finalists are members of the Microsoft Intelligent Security Association (MISA), an ecosystem of independent software vendors (ISVs) and managed security service providers (MSSPs) that have integrated their security products and services with Microsoft’s security technology.
SecurityBridge Enhances SAP Security With Advanced SIEM And ITSM Integrations

SecurityBridge Enhances SAP Security With Advanced SIEM And ITSM Integrations

SecurityBridge integrates seamlessly with enterprise SIEM and ITSM solutions, offering built-in SAP security monitoring rules customized to fit organizational needs.
Proofpoint: Nearly One in Four Australian Top Hospitals Still Vulnerable to Email Fraud

Proofpoint: Nearly One in Four Australian Top Hospitals Still Vulnerable to Email Fraud

Proofpoint, Inc., a leading cybersecurity and compliance company, has today released new research showing almost one in four (23%) of Australia’s top-ranked hospitals is still lagging behind on basic cybersecurity measures, subjecting patients, healthcare professionals, and stakeholders to a higher risk of email fraud. While the data shows some ...
ExeQuantum and CyberWaze Announce Strategic Partnership to Bring Post-Quantum Cryptography to Global Cybersecurity

ExeQuantum and CyberWaze Announce Strategic Partnership to Bring Post-Quantum Cryptography to Global Cybersecurity

Melbourne, Australia & Dubai, UAE – March 2025 – ExeQuantum, a leader in Post-Quantum Cryptography (PQC) solutions, has officially partnered with CyberWaze, a global cybersecurity consulting and managed security services provider. This collaboration marks a significant milestone in the adoption of quantum-resistant security, ensuring businesses ...
Cybersecurity Needs Diversity: ESET’s 2025 Scholarship to Empower Women Leaders

Cybersecurity Needs Diversity: ESET’s 2025 Scholarship to Empower Women Leaders

Since its launch in 2016, the ESET Women in Cybersecurity Scholarship has supported over 28 women worldwide in pursuing careers in technology. Now expanding to Singapore and India in 2025, alongside the U.S., Canada, Australia, and the U.K., the initiative continues to build a more inclusive and diverse cybersecurity workforce globally.
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This