Recent Podcasts
Recent Articles
Register
Editors Pick
KBI Podcasts



Containing the Inevitable: What Cyber Leaders Must Prepare for in 2026
As we head into 2026, I am thinking of a Japanese idiom, Koun Ryusui (行雲流水), to describe how enterprises should behave when facing a cyberattack. Koun Ryusui means “to drift like clouds and flow ... Read More
Continuous Compliance Isn’t An Option
Discover why CISOs must lead the shift to continuous compliance—boosting security, reducing risk, and aligning with evolving regulatory demands. Read More
Trust, Power, People: Hybrid AI’s 2026 Imperative
Over the past year across Asia Pacific, conversations with customers, from fast-growing digital natives to highly regulated banks and healthcare providers, all have shared a common thread: AI ... Read More
Can AI Ever Really Outpace AI-Powered Cyberattacks?
Introduction There's this question that keeps coming up in cybersecurity circles, and honestly, it feels a bit like asking whether we can outrun our own shadow. Can defensive AI actually stay ... Read More
Disruption Demands Coordination: Why Secure Communications Solutions are Key to Disrupting the Illegal Fentanyl Trade
Introduction The Government of Canada is taking concrete and bold action to strengthen border security and disrupt the illegal fentanyl trade. It has announced an investment of $1.3 billion to enhance operations. The funding will support hiring additional personnel and purchasing advanced technology and equipment. This includes state-of-the-art imaging systems, drones, and AI tools. The plan also involves creating joint strike forces and emergency management councils with U.S. border authorities. However, a recent Globe and Mail article (subscription required) singled out the need for better communication and information ... Read More
Shifting the Burden of ID Crime from Victims to Institutions
As Australia’s digital economy deepens its reliance on data, the stakes are rising for both consumers and organisations. Identity crime can no longer be treated as an unfortunate by-product of cyber incidents; it is a systemic risk demanding systemic solutions. Read More















