No results found.
No results found.
No results found.

Podcasts

Episode 337 Deep Dive: Christine Gadsby | Why Mobile Espionage is a Critical National Security Threat to Australia and Globally
byKBI.Media

In this episode, we sit down with Christine Gadsby, Chief Security Advisor at BlackBerry, as she explores why mobile espionage has become a critical national security threat in Australia and globally. Christine unpacks the mounting risks posed by outdated telco infrastructure, the vulnerability of mobile communications, and the rapid evolution of attacker tactics—fueled by AI, automation, and the expansive attack surface created by free messaging apps. She highlights the real-world impact of scams, cultural differences in social engineering, and the challenges faced by both consumers and organizations in protecting sensitive information.

Christine Gadsby is the Vice President and Chief Information Security Officer for BlackBerry Secure Communications. With over 20 years of experience in mobile and information security, Christine is known for her strategic vision and leadership skills, with a proven track record of developing and implementing robust strategies that protect organizations from evolving risks and digital threats – particularly in the areas of communications security and critical event management.
Gadsby is a visionary who helped pioneer secure software supply chain efforts and SDLC capabilities influencing industry and government-driven security frameworks in use by the world’s most security-conscious industries.

She is a sought-after panelist, moderator, and keynote speaker with several awards for challenging security mindsets and leading Diversity efforts, including Cybersecurity Woman of the Year, Power 100 Women in Security, and Top 10 Women Leading Cybersecurity. She is a well-known contributor, including RSA, CES, Black Hat and has been quoted in notable media outlets Fox News, CBS, Yahoo, MSN, CSO Magazine, CyberScoop, and Dark Reading.

No results found.
The Guardians that Safeguard our Critical Infrastructure

The Guardians that Safeguard our Critical Infrastructure

Introduction Every day, critical industry sectors like healthcare, government and utilities services rely on digital systems that are mission-critical but vulnerable to cyber threats. Yet, the professionals safeguarding these systems often go unrecognised. Imagine a hospital's life-support systems faltering during critical surgery, a school building’s security lockdown failing during an active threat drill or a state government's emergency response network collapsing during a natural disaster. These scenarios are daily hypotheticals faced by the ...
No results found.

Business News ↓

Speed, Identity, and AI: Redefining Cybersecurity for Australian Organisations

Speed, Identity, and AI: Redefining Cybersecurity for Australian Organisations Cybersecurity teams have always grappled with emerging technologies, increasingly sophisticated attacks and new regulations. However, as organisations accelerate AI and cloud adoption, digitise services, and adapt to evolving compliance regulations, security challenges continue to grow in tandem with the expansion of attack surfaces....

How Drawing On The Power Of AI Technology Can Help Your Institution Stay A Step Ahead Of Scammers And Fraudsters In 2026

Embedding fraud intelligence into the digital banking experience will enable you to protect your customers more effectively. Introduction Are you confident your institution is doing all that it can to stop bad actors separating customers from their hard-earned funds? There’s no doubt the Australian banking industry has made heartening progress on this front in recent times. Published in March 2025, the National...

Resilience, Not Just Compliance: A Zero Trust Perspective for Federal Cybersecurity

Introduction For decades, cybersecurity in government has been defined by a familiar cycle: secure the perimeter, block the intruders, respond to the audits. That model no longer works. As adversaries grow more sophisticated and resources remain tight, the federal community needs a new mindset. Prevention still matters, but resilience must come first. That shift from preventing every attack to assuming breach and...
Breaking the Mold: How the CISO Role Has Outgrown Its Technical Roots cover

Breaking the Mold: How the CISO Role Has Outgrown Its Technical Roots

​Recently on the DevSecOops podcast, hosts Tom Walker and Scott Fletcher sat down with George Abraham, CISO at Influx, to discuss the changing nature of cybersecurity leadership, the human challenges of leading teams, and the complex security risks emerging from new technologies. George began with a note that cybersecurity careers rarely follow a straight line. For instance, his journey began with a spark of...

GenAI for Cybersecurity – Embrace the Power, Own the Risk

Introduction Generative AI (GenAI) is actively reshaping the way attackers and defenders operate in Australia. Threat actors have weaponised GenAI to synthesise text, code, voice, and video at scale, increasing impersonation scams and malware campaigns.  In response to these evolving threats, security teams have also adopted GenAI tools to automate and streamline their cyberdefences. This dichotomous use of AI is...

Improving Australia’s Resilience Against Growing Cyber Threats

Introduction Australia’s cybersecurity landscape is evolving at a pace that few businesses and public-sector organisations can comfortably manage. It’s a situation marked by three interconnected challenges: a rapidly expanding attack surface, the weaponisation of artificial intelligence (AI), and systemic vulnerabilities in supply chains. These challenges are made more acute by the explosion of internet-connected...

Navigating Hybrid Cloud Security In the AI Era As Regulations Tighten

Introduction As hybrid cloud infrastructures continue to evolve, they are increasingly subject to AI-driven risks, complex data environments, and growing cyberthreats. Our recent 2025 Hybrid Cloud Security Survey underscores the rising pressure faced by organisations worldwide as AI technologies disrupt traditional security frameworks. With a 17 percent year-on-year rise in breach rates across Australia, these...

From Chaos to Command: Secure Communications at Scale for Public Safety

Introduction When it comes to public safety, every second counts. If communication breaks down, so does the response - leading to losses in time, coordination, effectiveness, and public trust. During large-scale incidents, a persistent “communications gap” emerges: the critical distance between information being available and that same information becoming actionable across teams, agencies and jurisdictions....

Securing Australian Organisations in the Quantum Era

Introduction Quantum computing offers unquestionable opportunities for Australian businesses, but it also tests the resilience of current cybersecurity frameworks and underscores the need to prepare and adapt cyber defences. Whilst still in its early stages, future breakthroughs in the technology may challenge the security of traditional encryption methods used to protect sensitive data, rendering them obsolete....

The Hidden Costs To Consider When Selecting A Cyber Security Vendor

Introduction In an environment where the shortage of skilled cyber security professionals continues to be an issue, it’s logical to think organisations would be carefully vetting security vendors not just on functionality, but also on their ability to reduce operational risk. Unfortunately, this is not always the case. Despite the critical role cyber security plays in protecting organisations and their customers,...

A CISO’s Love Letter to The Board – Cyber Risk Quantified

Introduction Cybersecurity has a communication problem and it’s costing us.   If CISOs want to earn trust, investment and influence, they need to speak the business’ love language. Within organisations, everyone has their own "love language." Engineers speak in code. Product teams talk in features. Legal speaks in compliance. But in risk? There’s only one language that matters: money.  Yet too often, CISOs are...

Why Measuring The Right Threat Intelligence Metrics Is Key To SOC Success

Why Measuring The Right Threat Intelligence Metrics Is Key To SOC Success With the number and sophistication of artificial intelligence (AI)-powered cyberattacks continuing to increase, many security operations centres (SOCs) are being pushed to their limits. Organisations must detect, investigate, and respond to threats faster than ever. Success depends on measuring the right threat intelligence metrics which are...

Organisations Must Adapt Defences To 2025’s Dynamic Ransomware Threat

Introduction The rapid evolution of ransomware and its ability to disrupt operations through penetrating critical systems demands serious attention. BlueVoyant found that the first half of 2025 in ransomware has been marked by new attack strategies, focus on high-pressure targets, and a high level of incidents. The total volume of ransomware attacks remained at a critically high level in the first six months of the...
IT-OT Convergence: What Happens When Two Worlds Collide? cover

IT-OT Convergence: What Happens When Two Worlds Collide?

​Most people thought that cybersecurity is all about data breaches, suspicious links, or adversaries trying to get access to your accounts. But in recent years, the space has gone beyond computers and firewalls. Today, cybersecurity also means keeping the power on, the water safe, and hospitals operational. Recently on the DevSecOops podcast, hosts Tom Walker and James Vincent sat down with Sam Mackenzie,...

The PIN That Wasn’t Yours

Introduction When it comes to consumer fintech, attackers do not need to steal credentials or plant malware. They need a poorly protected endpoint with something valuable behind it. That is what unfolded with TCN - The Card Network, a popular multi-retailer gift card brand sold across Woolworths, Coles, Big W, Target and other national chains. A vulnerability identified by Simon Dean, an ordinary consumer with a...

Resilience Comes from Knowing What to Prioritise

Introduction In today’s hyper-connected business environment, where AI-driven systems, multi-cloud strategies, and edge computing dominate conversations, it’s tempting to chase every emerging risk with equal urgency. But when it comes to resilience, success doesn’t lie in doing everything, it comes from doing the right things. Modern organisations face a complex threat landscape that is unforgiving and...
No results found.
No results found.
No results found.
No results found.
No results found.

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

Ransomware Protection Advisory: From Cisco Flaws to SonicWall Breaches

“Please wait, your document is loading.” That’s the message victims saw right before their systems got hijacked. Behind that digital curtain, crypto miners and information stealers worked stealthily to infiltrate networks, exfiltrate sensitive data, and plant persistent malware. In the latest ColorTokens Threat Advisory, we tracked how threat actors are not just breaching networks, but embedding themselves deeply,...

Overcoming the Security Risks of Using AI In Software Development

Introduction Constantly on the hunt to find new ways to disrupt IT infrastructures, cybercriminals are increasingly shifting their attention from penetrating networks to exploiting software vulnerabilities. While this trend has been evident for some time, it is becoming significantly more popular as the usage of artificial intelligence (AI) tools by software developers increases. This is because AI is creating a...

Speed, Identity, and AI: Redefining Cybersecurity for Australian Organisations

Speed, Identity, and AI: Redefining Cybersecurity for Australian Organisations Cybersecurity teams have always grappled with emerging technologies, increasingly sophisticated attacks and new regulations. However, as organisations accelerate AI and cloud adoption, digitise services, and adapt to evolving compliance regulations, security challenges continue to grow in tandem with the expansion of attack surfaces....

How to Invest in AI to Overcome the Challenges of Identity-based Security

Introduction Identity is now one of the most critical risk exposure points for organisations - frequently targeted and exploited by attackers to gain footholds, escalate privileged access, and move laterally within environments. A recent study found that 90% of organisations experienced at least one identity-related incident in the past year, with 84% of incidents having “a direct business impact”. A key...
No results found.
It’s Time to Hack the Hackers

It’s Time to Hack the Hackers

Introduction Cybercrime in Australia is rising rapidly. From the major breachers that held headlines hostage for months, ...
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.