No results found.
What in the DeepSeek?

What in the DeepSeek?

DeepSeek, the tool designed to exploit vulnerabilities in AI systems, raises significant concerns amongst the security ...
No results found.
No results found.

Podcasts

Episode 304 Deep Dive: David Wiseman | The Eroding Trust in Consumer Messaging Apps
byKBI.Media

In this episode, we sit down with David Wiseman, Vice President of Secure Communications at BlackBerry, as he discusses the growing challenges around digital sovereignty and trust in consumer messaging apps. David explores the limitations and risks of using platforms like Signal, WhatsApp, and Telegram for sensitive or official communications, highlighting issues such as identity spoofing, loss of data control, and the collection of valuable metadata by adversaries. He explains BlackBerry’s shift to software-based secure communications that provide governments and enterprises with the necessary controls for confidentiality, compliance, and usability—delivering “consumer app” simplicity with enterprise-level security.

BlackBerry Role

In his role as the Vice President of Secure Communications, David is a seasoned international public speaker, whose responsibilities include leading the Secure Government Communications business in the Americas and APAC. He specializes in applying technology to real life mission critical business systems with a focus in communications, security, and safety.

David and his team support our customers in understanding how to secure their mobile communications from the most advanced adversaries, especially in complex and highly secure sectors such as defense and military, including NATO. David has been with BlackBerry for ten years, joining the organization in November 2014.

Experience

David has 25+ years of experience in software, security, information management, mobility and communications at BlackBerry, IBM, SAP, Sybase, and the US Navy. His expertise in Secure Communications leads BlackBerry in the vision of securing a connected future you can trust, helping governments to augment and fortify digital defences to strengthen national security

Notable Achievements

David helped design the world’s first large-scale environmental geo-spatial database for NASA. He also helped design the software for one of the first shipboard radar data fusion systems for the US Navy.   At BlackBerry, David and his team have helped NATO and multiple global governments operating in challenging geo-political environments to establish trusted, secure communications channels from the battlefield to the boardroom – using military-grade software to ensure classified conversations and messages remain private.

No results found.
No results found.

Business News ↓

How Adopting Maturity Models Can Improve Enterprise IT Security

Introduction With high-profile cyberattacks occurring around the world at an alarming rate, software developers are focusing on using software security models that can guide their organisations toward embedding secure development best practices. Essentially, organisations can align their processes with one of two global industry standards for self-assessment and security maturity. The first is the Building Security...

Why Web Application Firewalls are a Critical Shield for Fintech Security

As digital banking, fintech innovations, and mobile transactions continue to reshape the global financial landscape, cybersecurity threats have become increasingly sophisticated. The financial sector, being the backbone of the global economy, is a prime target for cyberattacks. As organisations adopt cloud-based services, digital transactions, and third-party integrations, they introduce new security...

The Real Corporate Penetration Testing Process: How Companies Get Hacked Before The Hackers Do! 🚀

Hey guys, I’m sn0x — a cybersecurity researcher, bug hunter, and security enthusiast. I hold multiple certifications, including CNSP, EWPTXv2, CEH v11–12, GRC, RHCSA, and Cisco Cyber Threat Management. I’ve been ranked #1 in India and #2 globally on TryHackMe, secured #134 on Hack The Box in 2021, and even won HTB Battlegrounds twice. But hey, this isn’t a job interview, so let’s not make it sound like a LinkedIn...

Data Management – It’s A High-stakes Game

In today’s digital-first economy, data can be both a powerful asset and a significant liability. Companies that proactively manage their data can achieve multiple positive business outcomes such as making optimal use of their storage infrastructure while simultaneously servicing next-generation workloads such as GenAI. Those that fail to act run the risk of spiralling costs in addition to large exposure in the case...

Account Takeover Attacks on Social Media: A Rising Threat for Content Creators and Influencers

In 2024 and continuing into 2025, social media platforms were prime targets for cybercriminals, with content creators facing the brunt of the malicious attacks, including a surge in account takeovers, malicious live streams, and sophisticated phishing campaigns. Bitdefender Labs has been at the forefront in analysing these threats, and the numbers paint a stark picture of a rapidly evolving threat landscape that...

The Growing Nexus of Cyber Security and Financial Warfare – An Australian’s Perspective

Opening Remarks Sadly, it has become an undeniable reality that the traditional boundaries between conventional warfare and economic statecraft are rapidly dissolving. Cyber security and financial warfare have evolved into critical instruments of geopolitical influence and power projection, with significant implications for nations like Australia. The interconnectedness of global financial markets and digital...

Security Is An Arms Race, and The Bad Guys Are Two Steps Ahead

Cloud environments are a notorious ransomware attack hot spot. It’s a calculated strategy on the part of the cybercriminals. As the old adage goes, ‘follow the money’, and that’s exactly what they’re doing. Predictions suggest cloud infrastructure spend will reach over US$135 billion in 2026, accounting for over 67 per cent of total compute and storage infrastructure spend. Cloud environments have grown in...

How Organisations Can Achieve Secure-By-Design By 2030

Governments worldwide, from the UK to Australia, have set ambitious goals to enhance software security by 2030, particularly within critical infrastructure. However, achieving a secure-by-design (SBD) approach is not merely a matter of deploying advanced security tools or implementing stringent policies. Rather, it necessitates a fundamental shift in organisational culture, prioritising security at every level of...

The New Secure Communications Realities for Governments

The Eroding Trust in Consumer Messaging Apps Consumer-grade messaging apps like Signal, WhatsApp and Telegram offer basic end-to-end encryption, effectively securing the content of messages. However, encryption alone is just one piece of a much larger secure communication puzzle. These platforms fall critically short in providing four essential guarantees for government and critical infrastructure entities:...

RedCurl’s Ransomware Debut

Introduction This research, conducted by Bitdefender Labs, presents the first documented analysis of a ransomware campaign attributed to the RedCurl group (also known as Earth Kapre or Red Wolf). RedCurl has historically maintained a low profile, relying heavily on Living-off-the-Land (LOTL) techniques for corporate cyberespionage and data exfiltration. This shift to ransomware marks a significant evolution in its...

Securing AI Innovation: Why the Fundamentals of Cybersecurity Still Matter

The increasing use of AI in both defensive and offensive cyber strategies is prompting enterprises to explore new security solutions. However, as the French writer Alphonse Karr once said, “The more things change, the more they stay the same.” The core question for businesses is not whether AI requires a radical rethinking of cybersecurity—but rather, what value is at risk from AI misuse, and how much of that risk...

Overcoming the Social Media Fraud Challenge with Graph Databases

Introduction Australia’s parliamentary elections are coming under increasing pressure due to the increasing amount of misinformation and disinformation being shared on social media platforms. People share content that is intentionally misleading or not based in fact. Others share this content without checking sources or its validity. The challenge is becoming more acute with the rise of AI-generated audio and video...
Microsoft’s Platforms and Services Prioritise Security from Inception, Rather than as an Afterthought cover

Microsoft’s Platforms and Services Prioritise Security from Inception, Rather than as an Afterthought

Overview Microsoft’s long-standing Executive, Bret Arsenault, Corporate Vice President and Chief Cybersecurity advisor at Microsoft, detailed Microsoft’s Secure Future Initiative (SFI) - their strategic approach to addressing emerging cyber threats and managing secure software development. With decades of experience at Microsoft, what Arsenault described as “...five different careers at the same company.”,...

Securing Society: Cyber-Physical Safety in Australia’s Critical Infrastructure

Why Cyber-Physical Security Must Be a Leadership Priority   Australia’s critical infrastructure faces escalating cyber-physical threats, with adversaries targeting industrial control systems, operational technology (OT) and critical medical services. Security failures in these environments don’t just disrupt operations; they pose real risks to public safety, national security and our economic stability. This...
Are Defenders Prepped for the Next Cyber Chapter? cover

Are Defenders Prepped for the Next Cyber Chapter?

Securing AI isn’t just about defending against cyber threats - it’s about establishing governance frameworks that ensure AI is used responsibly. With AI adoption accelerating, organisations are needing to align leadership, compliance teams, and IT security to manage risks without stifling innovation. Janice Le, General Manager of Microsoft Security, explored the on-going challenges of governing AI and the strategic...

Zero Trust – The Secret Sauce Behind Breach Readiness

Introduction For years, organizations have invested heavily in firewalls, perimeter sensors, and intrusion detection to keep attackers at bay. But as we continue to see each day, adversaries always manage to slip past these defenses. And the problem doesn’t lie in the technology, but the way in which we operate them. Enter Zero Trust – The Only Way to Operate Cyber Defense Traditionally, once a user crossed the...
No results found.
No results found.
No results found.
No results found.
No results found.

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

How Adopting Maturity Models Can Improve Enterprise IT Security

Introduction With high-profile cyberattacks occurring around the world at an alarming rate, software developers are focusing on using software security models that can guide their organisations toward embedding secure development best practices. Essentially, organisations can align their processes with one of two global industry standards for self-assessment and security maturity. The first is the Building Security...

Why Web Application Firewalls are a Critical Shield for Fintech Security

As digital banking, fintech innovations, and mobile transactions continue to reshape the global financial landscape, cybersecurity threats have become increasingly sophisticated. The financial sector, being the backbone of the global economy, is a prime target for cyberattacks. As organisations adopt cloud-based services, digital transactions, and third-party integrations, they introduce new security...

The Real Corporate Penetration Testing Process: How Companies Get Hacked Before The Hackers Do! 🚀

Hey guys, I’m sn0x — a cybersecurity researcher, bug hunter, and security enthusiast. I hold multiple certifications, including CNSP, EWPTXv2, CEH v11–12, GRC, RHCSA, and Cisco Cyber Threat Management. I’ve been ranked #1 in India and #2 globally on TryHackMe, secured #134 on Hack The Box in 2021, and even won HTB Battlegrounds twice. But hey, this isn’t a job interview, so let’s not make it sound like a LinkedIn...

Data Management – It’s A High-stakes Game

In today’s digital-first economy, data can be both a powerful asset and a significant liability. Companies that proactively manage their data can achieve multiple positive business outcomes such as making optimal use of their storage infrastructure while simultaneously servicing next-generation workloads such as GenAI. Those that fail to act run the risk of spiralling costs in addition to large exposure in the case...
What in the DeepSeek?

What in the DeepSeek?

DeepSeek, the tool designed to exploit vulnerabilities in AI systems, raises significant concerns amongst the security ...
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.