No results found.
No results found.
No results found.

Podcasts

Episode 365 Deep Dive: Ashley Rose | Human Risk – The Next Frontier
byKBI.Media

Ashley Rose is the CEO and Co-Founder of Living Security, where she is building the future of workforce security through AI-native Human Risk Management (HRM). Her work sits at the intersection of AI, cybersecurity, and business transformation—helping enterprises turn human and workforce risk into a measurable, manageable business outcome.

Since founding Living Security in 2017, Ashley has led the company through rapid growth, raising more than $25M for product development and scale, and driving consecutive years of revenue acceleration. Today, her focus is on helping CISOs and security and risk leaders move beyond traditional awareness to a data-driven, predictive model that reduces real risk and supports organizational growth.

Ashley speaks regularly at industry forums including EWF, Security ISACs, and other security and leadership conferences, sharing practical insight on topics such as human risk, AI in the enterprise, and building security programs that executives and boards actually care about. She also contributes thought leadership to outlets such as Forbes and other publications.

At her core, Ashley is a builder—of companies, products, teams, and categories. She is committed to creating a diverse and inclusive organization that reflects the communities Living Security serves, and to leading with transparency, curiosity, and accountability.

Ashley holds a BBA from the University of Michigan and is a serial entrepreneur with a background in tech and product management. She founded Living Security on a simple belief: when you empower people, they become your strongest security asset—not your weakest link.

No results found.
Microsoft Announces A$5 Billion Investment in Computing Capacity and Capability to Help Australia Seize the AI Era

Microsoft Announces A$5 Billion Investment in Computing Capacity and Capability to Help Australia Seize the AI Era

WASHINGTON, D.C. – 23 October 2023 – Today Microsoft announced major digital infrastructure, skilling and cybersecurity investments in Australia to help the nation seize the artificial intelligence (AI) era to strengthen its economic competitiveness, create high-value jobs and protect the nation from the increasing threat of cyberattacks. Microsoft will invest A$5 billion in expanding its hyperscale cloud computing and AI infrastructure in Australia over the next two years – the single largest investment in its forty- year history in the ...
No results found.

Business News ↓

Voices Under Siege: The New Frontline of Secure Communication

The digital battle lines are being redrawn. Cyber threats are no longer confined to hacked servers or ransomware incidents affecting corporate networks. They have migrated to the devices in our hands and pockets. Mobile espionage is accelerating in speed, scope, and sophistication, forcing organizations to confront a difficult reality: significant vulnerabilities now lie in everyday communication tools. At the...

Why Trust Is Reshaping Digital Assets

Introduction For years, digital assets have been spoken about in extremes. Either as the future of finance, or as a space filled with risk and uncertainty. In my view, the truth sits somewhere in the middle. Over the past decade, digital assets have delivered extraordinary returns. Entire fortunes were built in a relatively short period. Yet many investors entered without the knowledge or protection required to...

How BlackBerry UEM Enables Trusted Mobile Operations Across the German Federal Government

Government in Constant Motion Federal government work now extends beyond offices to secure facilities, international forums, temporary work sites and even on the daily commute. Mobility has shifted from a supporting function into a core pillar of daily operations while expectations around security, sovereignty, and regulatory compliance have intensified. This creates tension as officials need to act quickly and...

Is This the End of the Road for AppSec?

Introduction A quarter of a century after the Agile Manifesto reshaped the software industry, its legacy is no longer in question. The methodology’s emphasis on speed, adaptability and user-centric design helped redefine how organisations build and deliver technology, enabling faster releases and a closer alignment with customer needs. For many enterprises, Agile has long since moved from disruptive idea to...

The Mission-Critical Standard: Why Mission-Certified Communications Are the Future of High-Stakes Operations

When a single compromised communication can disrupt governments, expose intelligence operations, or derail emergency responses, the question isn't whether your organization has secure communications. Rather, it’s whether your communications tools are certified for high-stakes operations. For years, organizations relied on standard end-to-end encryption as their primary defense. However, as threats evolve — from...

Break Glass Accounts: Essential Security or a Cyber Risk?

In office buildings around the world, the instruction is clear and universally understood: in case of fire, break glass. The act is deliberate, visible and reserved for emergencies only. In cybersecurity, however, the equivalent mechanism, the so-called “break glass account”, is far more controversial. Designed to provide emergency access when normal systems fail, break glass accounts sit at the intersection of...

Building Secure Automation: Three Core Pillars That Make an iPaaS Enterprise-ready

Introduction Security and governance are no longer back-office concerns, and in Australia, the stakes have never been higher. After a record 1,113 notifiable data breaches in 2024, the OAIC logged more than 530 additional breaches in the first half of 2025, with malicious attacks continuing to dominate. At the same time, major privacy reforms (e.g. updates to the Privacy Act 1988) that took effect this year have...

Encryption Alone Is Not a Security Strategy

Dutch intelligence has confirmed what enterprise security architects have long understood: consumer-grade messaging apps, regardless of their encryption implementation, are structurally unfit for sensitive government and military communications. The reason is not cryptography. It is the complete absence of verified identity and controlled device enrollment. A Global Campaign. Consumer Apps. Predictable Results. On...

Responsible ESG AI Enablement Could Become Australia’s Next Great Export If We Start Now

Introduction Logicalis Australia is calling for a shift in how Australia approaches artificial intelligence (AI), warning that the country risks missing a major global opportunity if it continues to focus primarily on policy and access to compute rather than infrastructure. Peter Cardassis, technical services director, Logicalis Asia Pacific, said, "Australia is having the wrong conversation about AI, and it risks...

World Cloud Security Day

The Rise of Stealth Impact Attacks In the past year, cyberattacks have been increasingly focused on “stealth impact”, quietly degrading performance, inflating cloud and AI costs, and eroding revenue over time. This includes tactics such as mass creation of fake accounts, bot-driven abuse of transactions, and the exploitation of AI chatbots to exhaust costly tokens. At the same time, illegal data scraping is on the...

The Hidden Risk Inside Australia’s Expanding IT Inventory

Introduction Australian organisations' technological maturity has grown exponentially in recent years. Hybrid work is the standard, cloud adoption is accelerating, and new innovations keep emerging to provide a productivity and competitive edge. What were once foreign concepts now underpin every business' workflow, communication, and customer interaction.  Yet as the number of technologies and platforms balloons in...

Australia’s AI Shift From Capability to Control 

Introduction Conversations with CIOs across Australian industries tell a consistent story. AI has decisively moved beyond pilots and proofs of concept. The question is no longer whether AI works, but whether it delivers measurable returns while operating within clear boundaries of trust, governance, and accountability. As Australian enterprises look ahead, success will depend on treating AI not as a technology...

Resilience at Scale: How Modern Organisations Stay Fast Without Increasing Risk

Introduction Australian organisations are not taking resilience seriously enough. According to BDO’s Tectonic States report, only 62 per cent of Australian business leaders ranked resilience as their top organisational priority, this is compared to 78 per cent of leaders in other countries, including the UK and Spain. This signals an opportunity for Australian organisations to build resilience, starting with...

Taming the Gallop on Rising Cybersecurity Risk

Introduction As the Lunar New Year ushers in a new cycle of The Horse, we can look to the traits of the traditional Chinese zodiac, which provide an admirable framework for cybersecurity objectives. Horses are commonly known for unbridled speed, agility, and making forward strides. These aren't just symbolic of cyber resilience: they are the new requirements for digital survival. With AI and automation in play the...

Communication as Infrastructure – Why Dialogue Is a Business Advantage

In the Asia, Pacific and Japan (APJ) region, one of the biggest challenges for businesses isn’t technology, it’s communication. The region spans more than 23 major languages, multiple dialects and profoundly different business cultures. Translating messages correctly matters, but real success comes from designing systems that can listen, respond and adapt at scale. The Australian market offers a clear example of...

From 398 to 200 Days: Understanding the TLS Certificate Lifespan Reduction

Digital trust is entering a new phase, and on March 15, 2026, a policy change will take effect that reshapes how organisations approach security. In 2025, the CA/Browser Forum, a consortium of browser vendors and certificate authorities, approved revisions to public TLS standards, introducing a phased reduction in certificate lifespans to better address modern threats. After extensive industry-wide debate, the...
No results found.
No results found.
No results found.
Security Metrics That Matter

Security Metrics That Matter

Introduction Organisations must move beyond reactive security postures and embrace data-driven decision-making as the ...
The ISO27001 Gold Standard

The ISO27001 Gold Standard

Introduction Building a strong information security posture is no longer optional. For tech executives tasked with ...
Streamlining Cyber Operations

Streamlining Cyber Operations

Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing ...
No results found.
No results found.

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

Voices Under Siege: The New Frontline of Secure Communication

The digital battle lines are being redrawn. Cyber threats are no longer confined to hacked servers or ransomware incidents affecting corporate networks. They have migrated to the devices in our hands and pockets. Mobile espionage is accelerating in speed, scope, and sophistication, forcing organizations to confront a difficult reality: significant vulnerabilities now lie in everyday communication tools. At the...

How BlackBerry UEM Enables Trusted Mobile Operations Across the German Federal Government

Government in Constant Motion Federal government work now extends beyond offices to secure facilities, international forums, temporary work sites and even on the daily commute. Mobility has shifted from a supporting function into a core pillar of daily operations while expectations around security, sovereignty, and regulatory compliance have intensified. This creates tension as officials need to act quickly and...

Is This the End of the Road for AppSec?

Introduction A quarter of a century after the Agile Manifesto reshaped the software industry, its legacy is no longer in question. The methodology’s emphasis on speed, adaptability and user-centric design helped redefine how organisations build and deliver technology, enabling faster releases and a closer alignment with customer needs. For many enterprises, Agile has long since moved from disruptive idea to...

The Mission-Critical Standard: Why Mission-Certified Communications Are the Future of High-Stakes Operations

When a single compromised communication can disrupt governments, expose intelligence operations, or derail emergency responses, the question isn't whether your organization has secure communications. Rather, it’s whether your communications tools are certified for high-stakes operations. For years, organizations relied on standard end-to-end encryption as their primary defense. However, as threats evolve — from...
No results found.
No results found.
No results found.
World Cloud Security Day

World Cloud Security Day

This World Cloud Security Day, the message is clear for Australian organisations: security and resilience must be embedded ...
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
The ISO27001 Gold Standard

The ISO27001 Gold Standard

Introduction Building a strong information security posture is no longer optional. For tech executives tasked with ...
No results found.