Recent Articles
Register
Editors Pick
KBI Podcasts



Encryption Isn’t Enough: The Hidden Threat of Messaging Metadata
Today’s Digital Landscape Metadata is one of the most overlooked security risks in modern digital communications. Adversaries no longer need to break into encrypted chats to understand your ... Read More
The ISO27001 Gold Standard
Introduction Building a strong information security posture is no longer optional. For tech executives tasked with protecting sensitive data, enabling growth, and maintaining stakeholder trust, ... Read More
Battling Burnout in Cybersecurity
No organization is resilient without a healthy team. Cybersecurity maturity and resiliency must encompass workforce health. Leaders must treat burnout with the same seriousness as any other operational risk. Read More
Three Cybersecurity Predictions That Will Define the CISO Agenda in 2026
In this byline, Sam Salehi, Managing Director ANZ at Qualys, shares his 2026 predictions for the cybersecurity industry, outlining the shifts that will define the CISO agenda as security teams grapple with an excess of signals, expanding AI-driven risk and rising board expectations. Sam argues that success in the year ahead will hinge on CISOs moving beyond fragmented visibility and reactive defence, toward unified, business-aligned action that replaces noise with clarity and turns security insight into measurable risk reduction. Read More
NIAP-Certified Security – A Foundation for Trusted Communications
In government and critical infrastructure, security is not an optional feature, it is the foundation of operational integrity. For organizations responsible for protecting sensitive data and ensuring mission continuity, trust in communication systems must be earned through independent, rigorous validation. Relying on unvetted software introduces unacceptable risks to national security and public safety. As a long-standing holder of NIAP certification from the National Security Agency (NSA), BlackBerry demonstrates its steadfast commitment to the highest standards of security. This distinguished recognition goes beyond a ... Read More
Streamlining Cyber Operations
Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing pressure to protect, adapt, and enable innovation. For many organisations, cyber operations are buckling under the weight of manual tasks, legacy tools, and cross-functional bottlenecks. The result is a reactive security posture that struggles to keep up with business demands. To address this, tech executives must take a strategic approach to streamlining cyber operations. This means rethinking workflows, improving visibility, automating repetitive tasks, and enabling collaboration across departments. Done well, ... Read More














