No results found.
No results found.
No results found.

Podcasts

Episode 363 Deep Dive: Nathan Thomas – Inside Oracle’s Multi-Cloud Strategy
byKBI.Media

In this episode, we sit down with Nathan Thomas, Senior Vice President of Product Management at Oracle Cloud Infrastructure (OCI), to explore Oracle’s evolving multi cloud strategy and the major trends shaping the cloud landscape. Nathan discusses the company’s shift from an Oracle-first approach to a multi cloud reality, driven by customer expectations for flexibility, governance, and sovereignty of data. He highlights the persistent demand for sovereign solutions, the impact of AI on accelerating multi cloud adoption, and the need for seamless integration and portability as customer loyalty becomes more fluid. Nathan also delves into the complexities of cloud migration, Oracle’s focus on delivering efficient and cost-effective infrastructure, and how maintaining a narrow focus on core services differentiates OCI in a crowded marketplace. Finally, he emphasizes the importance of holding cloud vendors accountable for innovation, value, and enabling truly multi cloud operations.

Nathan Thomas is senior vice president of Product Management at Oracle Cloud Infrastructure (OCI), overseeing product strategy and development of Oracle’s cloud and multicloud services. His organization is responsible for providing secure, reliable, and high-performance solutions that enable customers to run Oracle’s industry-leading services across their preferred cloud environments, addressing complex technical challenges and promoting long-term innovation and growth.

Prior to Oracle, Nathan held senior product and engineering leadership roles at Amazon Web Services, Epic Games, Google Cloud, and Red Hat. His work has been instrumental in promoting enterprise adoption of open-source technologies, driving the commercialization of cloud computing, and broadening the application of real-time 3D technology across multiple industries.

Nathan is based in Nashville, Tennessee.

No results found.
Taming the Gallop on Rising Cybersecurity Risk

Taming the Gallop on Rising Cybersecurity Risk

Introduction As the Lunar New Year ushers in a new cycle of The Horse, we can look to the traits of the traditional Chinese zodiac, which provide an admirable framework for cybersecurity objectives. Horses are commonly known for unbridled speed, agility, and making forward strides. These aren't just symbolic of cyber resilience: they are the new requirements for digital survival. With AI and automation in play the digital world is moving at a gallop. Attacks are no longer slow, manual, or opportunistic. They are continuous, adaptive, and ...
No results found.

Business News ↓

Building Secure Automation: Three Core Pillars That Make An iPaaS Enterprise-ready

Introduction Security and governance are no longer back-office concerns, and in Australia, the stakes have never been higher. After a record 1,113 notifiable data breaches in 2024, the OAIC logged more than 530 additional breaches in the first half of 2025, with malicious attacks continuing to dominate. At the same time, major privacy reforms (e.g. updates to the Privacy Act 1988) that took effect this year have...

Encryption Alone Is Not a Security Strategy

Dutch intelligence has confirmed what enterprise security architects have long understood: consumer-grade messaging apps, regardless of their encryption implementation, are structurally unfit for sensitive government and military communications. The reason is not cryptography. It is the complete absence of verified identity and controlled device enrollment. A Global Campaign. Consumer Apps. Predictable Results. On...

Responsible ESG AI Enablement Could Become Australia’s Next Great Export If We Start Now

Introduction Logicalis Australia is calling for a shift in how Australia approaches artificial intelligence (AI), warning that the country risks missing a major global opportunity if it continues to focus primarily on policy and access to compute rather than infrastructure. Peter Cardassis, technical services director, Logicalis Asia Pacific, said, "Australia is having the wrong conversation about AI, and it risks...

World Cloud Security Day

The Rise of Stealth Impact Attacks In the past year, cyberattacks have been increasingly focused on “stealth impact”, quietly degrading performance, inflating cloud and AI costs, and eroding revenue over time. This includes tactics such as mass creation of fake accounts, bot-driven abuse of transactions, and the exploitation of AI chatbots to exhaust costly tokens. At the same time, illegal data scraping is on the...

The Hidden Risk Inside Australia’s Expanding IT Inventory

Introduction Australian organisations' technological maturity has grown exponentially in recent years. Hybrid work is the standard, cloud adoption is accelerating, and new innovations keep emerging to provide a productivity and competitive edge. What were once foreign concepts now underpin every business' workflow, communication, and customer interaction.  Yet as the number of technologies and platforms balloons in...

Australia’s AI Shift From Capability to Control 

Introduction Conversations with CIOs across Australian industries tell a consistent story. AI has decisively moved beyond pilots and proofs of concept. The question is no longer whether AI works, but whether it delivers measurable returns while operating within clear boundaries of trust, governance, and accountability. As Australian enterprises look ahead, success will depend on treating AI not as a technology...

Resilience at Scale: How Modern Organisations Stay Fast Without Increasing Risk

Introduction Australian organisations are not taking resilience seriously enough. According to BDO’s Tectonic States report, only 62 per cent of Australian business leaders ranked resilience as their top organisational priority, this is compared to 78 per cent of leaders in other countries, including the UK and Spain. This signals an opportunity for Australian organisations to build resilience, starting with...

Taming the Gallop on Rising Cybersecurity Risk

Introduction As the Lunar New Year ushers in a new cycle of The Horse, we can look to the traits of the traditional Chinese zodiac, which provide an admirable framework for cybersecurity objectives. Horses are commonly known for unbridled speed, agility, and making forward strides. These aren't just symbolic of cyber resilience: they are the new requirements for digital survival. With AI and automation in play the...

Communication as Infrastructure – Why Dialogue Is a Business Advantage

In the Asia, Pacific and Japan (APJ) region, one of the biggest challenges for businesses isn’t technology, it’s communication. The region spans more than 23 major languages, multiple dialects and profoundly different business cultures. Translating messages correctly matters, but real success comes from designing systems that can listen, respond and adapt at scale. The Australian market offers a clear example of...

From 398 to 200 Days: Understanding the TLS Certificate Lifespan Reduction

Digital trust is entering a new phase, and on March 15, 2026, a policy change will take effect that reshapes how organisations approach security. In 2025, the CA/Browser Forum, a consortium of browser vendors and certificate authorities, approved revisions to public TLS standards, introducing a phased reduction in certificate lifespans to better address modern threats. After extensive industry-wide debate, the...

Eliminating the Technical Debt Caused by AI-Assisted Software Development

If recent industry forecasts are correct, 2026 will be the year of artificial intelligence (AI)-driven technical debt. According to research company Forrester[1], the tech debt for 75% of organisations will increase to a moderate or high level during this year, due to the rapid expansion of AI usage across a range of areas including software development. Indeed, the software development community is experiencing a...

Navigating AI With Cyber-Resilient Storage: Use Cases Lead, Infrastructure Enables

I’ve recently discussed the evolving landscape of intelligent data infrastructure on platforms like Techstrong TV. In these conversations, a recurring theme emerges: major trends like cloud and AI are reshaping enterprises, but their adoption is propelled primarily by compelling use cases. Infrastructure may not take center stage, but it’s the essential enabler that makes those use cases viable, efficient, and...

Security Metrics That Matter

Introduction Organisations must move beyond reactive security postures and embrace data-driven decision-making as the sophistication and prevalence of threat actors continues to increase. For start-ups, especially those scaling rapidly or navigating compliance requirements, understanding and tracking the right cybersecurity metrics is crucial. Security metrics provide clarity: they help prioritise risks, optimise...

Rethinking Cyber Resilience in the Age of AI

AI has fundamentally changed how we think about both innovation and risk. It’s driving new breakthroughs in medicine, design, and productivity, but it’s also giving attackers a sharper edge. Ransomware isn’t just about encrypting data anymore. It’s about double extortion, data theft, and the erosion of trust that organizations depend on to operate. As threat actors become more adaptive and use AI for more...

Cisco’s Bid to Anchor the Agentic Enterprise

The Shift to Agentic Enterprise AI Artificial Intelligence (AI) now alters the commercial world with a speed that feels less evolutionary and more tectonic. Infrastructure strains, security models stretch, collaboration tools morph. In that context, Cisco has positioned itself not merely as a participant, but as a structural layer in what it sees as the next phase of enterprise computing. During a recent company...

Future-Proofing Your Data Infrastructure With Post-Quantum Cryptography

The arrival of quantum computing isn’t a question of if—but when. And when it does arrive at scale, it will break the very encryption systems that protect the digital backbone of modern business. From banking records and intellectual property to classified communications, data that’s secure today could be exposed tomorrow. That’s why forward-thinking organizations are already investing in post-quantum...
No results found.
No results found.
No results found.
Security Metrics That Matter

Security Metrics That Matter

Introduction Organisations must move beyond reactive security postures and embrace data-driven decision-making as the ...
The ISO27001 Gold Standard

The ISO27001 Gold Standard

Introduction Building a strong information security posture is no longer optional. For tech executives tasked with ...
Streamlining Cyber Operations

Streamlining Cyber Operations

Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing ...
No results found.
No results found.

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

The Latest Security Vulnerability Exploit Doesn’t Break Your Encryption. It Bypasses It.

The most dangerous attacks against secure communications don't decrypt your messages. They compromise the device before encryption occurs — then watch every keystroke, every screen, and every conversation in plaintext. CVE-2026-21385 is the latest documented instance of a pattern that security teams in government and critical infrastructure need to understand: it’s a hardware-layer exploitation that bypasses the...

Building Secure Automation: Three Core Pillars That Make An iPaaS Enterprise-ready

Introduction Security and governance are no longer back-office concerns, and in Australia, the stakes have never been higher. After a record 1,113 notifiable data breaches in 2024, the OAIC logged more than 530 additional breaches in the first half of 2025, with malicious attacks continuing to dominate. At the same time, major privacy reforms (e.g. updates to the Privacy Act 1988) that took effect this year have...

Identity Management Day

The sixth Identity Management Day highlights the evolving nature of identity. The meteoric rise of AI in general and its impact on nonhuman identities (NHIs) has focused attention on identity security as never before. But in the long view, it simply highlights the same issues we have seen in identity management since it was called “identity management.” And discovery has always been a part of it. Enabling the...

Encryption Alone Is Not a Security Strategy

Dutch intelligence has confirmed what enterprise security architects have long understood: consumer-grade messaging apps, regardless of their encryption implementation, are structurally unfit for sensitive government and military communications. The reason is not cryptography. It is the complete absence of verified identity and controlled device enrollment. A Global Campaign. Consumer Apps. Predictable Results. On...
No results found.
World Cloud Security Day

World Cloud Security Day

This World Cloud Security Day, the message is clear for Australian organisations: security and resilience must be embedded ...
No results found.
No results found.
World Cloud Security Day

World Cloud Security Day

This World Cloud Security Day, the message is clear for Australian organisations: security and resilience must be embedded ...
No results found.
No results found.
No results found.
No results found.
Identity Management Day

Identity Management Day

The sixth Identity Management Day highlights the evolving nature of identity. The meteoric rise of AI in general and ...
No results found.
No results found.
No results found.