Cyber Media

Contributors

Our team of Contributors are independent experts from the fields of academia, research & development, military, government, and other similar fields, designed to bring unbiased and insightful perspectives to the forefront of cybersecurity discussions.

We understand the importance of fostering a diverse range of opinions and insights in the rapidly evolving landscape of cybersecurity. As such, our program exclusively features experts who operate independently of commercial affiliations, ensuring an objective and impartial viewpoint.

By participating in our Independent Expert Guest Writer Program, cybersecurity professionals, academics, and thought leaders have the opportunity to contribute to a platform dedicated to fostering open dialogue and advancing the collective understanding of cybersecurity issues.

From The Archives

Mergers and Acquisitions in the Cybersecurity Industry – Strategies for Success

Mergers and Acquisitions in the Cybersecurity Industry – Strategies for Success

Introduction Mergers and Acquisitions (M&A) play a pivotal role in shaping the landscape of the cybersecurity industry. In this article, we will delve into the dynamics of M&A within the cybersecurity sector, exploring both successful and unsuccessful instances. Additionally, we will provide insights for start-up and mid-market businesses ...
The New Ransomware Threat Targeting Global Institutions

The New Ransomware Threat Targeting Global Institutions

The British Library falls victim to Rhysida, a ransomware group employing a "double extortion" tactic. With global ambitions and sophisticated techniques, Rhysida poses a significant threat to institutions worldwide. The rise of ransomware payments and cybercriminal sophistication is cause for concern. Stay tuned for more on Rhysida in our upcoming report. #Cybersecurity #RansomwareThreat
Unveiling the Future of Cybersecurity: A Conversation with Cisco’s Jeetu Patel

Unveiling the Future of Cybersecurity: A Conversation with Cisco’s Jeetu Patel

In a recent Cisco Live session in Melbourne, Cisco's Jeetu Patel, Executive Vice President and General Manager of Security and Collaboration, shed light on the company's significant announcements and the profound advancements in the field of cybersecurity. Patel's insights underscore the pivotal role of artificial intelligence (AI) in revolutionising ...
Legal Privilege – For Cyber Incidents

Legal Privilege – For Cyber Incidents

A class action lawsuit has been filed against the telecommunications company Optus by former and current customers whose personal information was exposed in a data breach. The lawsuit, representing millions of customers, alleges that Optus failed to protect customer information, breached privacy and telecommunication laws, and did not take proper steps ...
Australian Government Launches Comprehensive Cybersecurity Strategy to Protect National Economy

Australian Government Launches Comprehensive Cybersecurity Strategy to Protect National Economy

The Australian government has recently unveiled a new cybersecurity strategy designed to bolster the nation's cyber capabilities and protect the economy and its citizens from cyber threats. The policy, led by Minister Clare O'Neil, seeks to make Australian entities harder targets, and to enable faster recovery from cyber attacks. The government aims ...
AUKUS: Transforming Security Through Technology Sharing and Cybersecurity

AUKUS: Transforming Security Through Technology Sharing and Cybersecurity

The realm of international security is constantly evolving, and strategic alliances play a crucial role in shaping the defence landscape. A notable addition to this landscape is the AUKUS partnership, an innovative trilateral security alliance between Australia, the United Kingdom, and the United States.
It’s been 12 Months since the Optus Breach.  Now What?

It’s been 12 Months since the Optus Breach. Now What?

Optus, an Australian telecommunications company, experienced a cyberattack last year on September 22, 2022. One of the most prominent breaches in Australian history. As a result, customers had their personal information stolen and leaked on the dark web. Outrage from customers and businesses was rampant across social media, in the media and of course ...
Bridging the Gap: Uniting IT Teams for Effective Cybersecurity

Bridging the Gap: Uniting IT Teams for Effective Cybersecurity

It's critical that IT teams work together with cybersecurity teams to ensure their organisation's infrastructure is secure. Unfortunately, roles within the tech industry have become much more specialised over the past few decades, leading to isolated silos.

Meet Our Contributors & Editors

Suzanne Charlotte Vos is a Director at Innovation & Integration and Cyber & Emerging Tech Ventures advisor at Fairlight Ventures. She is on a mission to help people get unstuck and achieve their goals in a constantly transforming world. With over a decade of experience ranging from her family business to global corporate environments, she believes everyone benefits from having an innovative mindset in both a personal and professional capacity.
View Posts →
Karissa Breen, crowned a LinkedIn ‘Top Voice in Technology’, is more commonly known as KB. A serial Entrepreneur that Co-Founded the TMFE Group, a holding company and consortium of several businesses all relating to cybersecurity including, an industry-leading media platform, a marketing agency, a content production studio, and the executive headhunting firm, MercSec. KBI.Media is an independent and agnostic global cyber security media company led by KB at the helm of the journalism division. As a Cybersecurity Investigative Journalist, KB hosts her flagship podcast, KBKast, interviewing cybersecurity practitioners around the globe on security and the problems business executives face. It has been downloaded in 65 countries with more than 300K downloads globally, influencing billions in cyber budgets. KB asks hard questions and gets real answers from her guests, providing a unique, uncoloured position on the always evolving landscape of cybersecurity. As a Producer and Host of the streaming show, 2Fa.tv, she sits down with experts to demystify the world of cybersecurity and provide genuine insight to businesses executives on the downstream impacts cybersecurity advancement and events have on our wider world.
View Posts →
Ivano is a multifaceted professional at the intersection between cybersecurity, research, and innovation. As a Senior Lecturer in Information Security, Governance, and Leadership at the UQ Business School and a member of UQ Cyber, he works on shaping the future of cybersecurity management. Ivano bridges the technical aspects of cybersecurity with its business implications, making him an asset to leaders seeking to fortify their organizations against digital threats. He has advised ministers, policy-makers, and senior executives on cybersecurity strategies, governance, and policies. He is a Graduate of the AICD. Ivano’s background is in risk and security management. A former Police Officer (Italy), Ivano worked as a Deputy Venue Security Manager for the Organising Committee at the 2006 Winter Olympic Games in Turin (Italy). In this role, he drafted the Venue Security Plan for the Main Media Centre and the Olympic Stadium and ensured security coordination at the Olympic/Paralympic villages. He also worked for Bocconi University and the SDA Bocconi School of Management (Milan) as a Faculty Affiliate. In 2016 he completed a PhD at QUT, focusing on safety and security management in Australian airports. His latest appointments include a Postdoc with the PwC Chair in Digital Economy and a Research Fellowship at the University of Glasgow. An experienced facilitator in Design Thinking, Ivano has run since 2015 more than 70 design-led projects for public and private sector organisations. A father and an avid snowboarder, Ivano enjoys soccer, American football, and creative writing.
View Posts →
Cam retains oversight of the editorial content for KBI.Media and finds time to write every once in a while too. With a keen interest in geo-political goings-on, Cam oversees our new Global News section. And being an ex-techy, he puts his (very) atrophied knowledge to use, giving a helping hand to shape and manage our Technical section on occasion too.
View Posts →

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governements, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Become a Contributor

Unbiased Expertise: Our guest writers are carefully selected based on their expertise and independence from commercial interests. This ensures that the content they contribute is free from any potential bias, providing our audience with a well-rounded and objective understanding of cybersecurity topics.

Diverse Perspectives: We believe in showcasing a variety of perspectives to enrich the discourse surrounding cybersecurity. By featuring independent experts with diverse backgrounds, experiences, and viewpoints, we aim to present a comprehensive and inclusive narrative that reflects the complexity of the cybersecurity landscape.

Rigorous Selection Process: To maintain the integrity of our program, we employ a rigorous selection process for guest writers. Prospective contributors undergo thorough vetting to ensure their independence and commitment to delivering high-quality, unbiased content.

Cutting-Edge Insights: Our guest writers are at the forefront of cybersecurity developments, providing our audience with timely and relevant insights. Their independence allows them to delve into emerging trends, technological advancements, and policy changes without the constraints of commercial interests.

Commitment to Transparency: We prioritize transparency in our program, clearly outlining the independence criteria for our guest writers. This commitment ensures that our audience can trust the authenticity and objectivity of the content presented.

 

Get In Touch

Speak with KBI

Share This