Cyber Media

Contributors

Our team of Contributors are independent experts from the fields of academia, research & development, military, government, and other similar fields, designed to bring unbiased and insightful perspectives to the forefront of cybersecurity discussions.

We understand the importance of fostering a diverse range of opinions and insights in the rapidly evolving landscape of cybersecurity. As such, our program exclusively features experts who operate independently of commercial affiliations, ensuring an objective and impartial viewpoint.

By participating in our Independent Expert Guest Writer Program, cybersecurity professionals, academics, and thought leaders have the opportunity to contribute to a platform dedicated to fostering open dialogue and advancing the collective understanding of cybersecurity issues.

From The Archives

From fluff to facts: how you can measure innovation

From fluff to facts: how you can measure innovation

Innovation is a term that gets thrown around a lot, but what does it really mean? For me, innovation is implementing new ideas that bring value to people. You don't have to be a creative genius to be innovative - It's all about the context. What might be ordinary for startups could be groundbreaking for established corporations. Implementing these ideas and measuring their impact is key because what gets measured gets improved.
3 Subtle Indicators of Major Innovation Blockers

3 Subtle Indicators of Major Innovation Blockers

Throughout my career, I've had the incredible opportunity to dive headfirst into many innovation projects. They ranged from strategic innovation projects to customer experience improvements, and from exploring new ways of working to executing human-centred automation solutions.
3 Ways to Get Everyone Onboard the Innovation Train

3 Ways to Get Everyone Onboard the Innovation Train

When it comes to innovation and introducing change in an organisation, some people instantly embrace the journey while others resist it.
How to remove the roadblocks to going passwordless

How to remove the roadblocks to going passwordless

The road to passwordless authentication is one most organisations will tread, but they may require guidance in some key areas along the way, writes Ash Diffey, Vice President Asia Pacific and Japan, Ping Identity
How to protect against double-extortion ransomware attacks

How to protect against double-extortion ransomware attacks

Of all the cybersecurity challenges facing organisations today, one of the most pervasive is ransomware attacks.
Rethinking how to engage Australian directors in security budget discussions

Rethinking how to engage Australian directors in security budget discussions

Boards are still fractured when it comes to cybersecurity capability, skills and buy-in, but there are ways for CISOs to navigate this to keep their programs funded.
The Collateral Damage of Carpet Bombing – Why All Is Often Nothing

The Collateral Damage of Carpet Bombing – Why All Is Often Nothing

History The attention of consumers has always been an arms race. Historically you needed the biggest papyrus on the wall in the forum, or TV spots, or billboards, or postal campaigns to reach consumers – a prohibitively costly exercise for most. This saw a concentration of high-value and (hopefully) well produced advertising. It was designed to not be ...

Meet Our Contributors & Editors

Suzanne Charlotte Vos is a Director at Innovation & Integration and Cyber & Emerging Tech Ventures advisor at Fairlight Ventures. She is on a mission to help people get unstuck and achieve their goals in a constantly transforming world. With over a decade of experience ranging from her family business to global corporate environments, she believes everyone benefits from having an innovative mindset in both a personal and professional capacity.
View Posts →
Karissa Breen, crowned a LinkedIn ‘Top Voice in Technology’, is more commonly known as KB. A serial Entrepreneur that Co-Founded the TMFE Group, a holding company and consortium of several businesses all relating to cybersecurity including, an industry-leading media platform, a marketing agency, a content production studio, and the executive headhunting firm, MercSec. KBI.Media is an independent and agnostic global cyber security media company led by KB at the helm of the journalism division. As a Cybersecurity Investigative Journalist, KB hosts her flagship podcast, KBKast, interviewing cybersecurity practitioners around the globe on security and the problems business executives face. It has been downloaded in 65 countries with more than 300K downloads globally, influencing billions in cyber budgets. KB asks hard questions and gets real answers from her guests, providing a unique, uncoloured position on the always evolving landscape of cybersecurity. As a Producer and Host of the streaming show, 2Fa.tv, she sits down with experts to demystify the world of cybersecurity and provide genuine insight to businesses executives on the downstream impacts cybersecurity advancement and events have on our wider world.
View Posts →
Dr. Ivano Bongiovanni is the General Manager of AUSCERT, Australia's first computer emergency response team (CERT) and one of the oldest CERTs in the world. With more than 20 years in cyber security and risk management. Dr. Bongiovanni also holds a position as Senior Lecturer in Information Security, Governance, and Leadership. Prior to this, Dr. Bongiovanni was a Research Fellow at the University of Glasgow and PwC Chair in Digital Economy. Dr. Bongiovanni commenced his career as a Police Officer with the Italian Ministry and was the Deputy Venue Security Manager at the Turin 2006 Winter Olympic and Paralympic Games, where he delivered the Venue Security Plan, coordinated security services for the Main Media Centre, the Olympic Stadium (opening ceremony) and the Paralympic Village. He holds a PhD in Risk Management in international airports.
View Posts →
Dali Kaafar is a Professor at the Faculty of Science and Engineering, Executive Director of The Macquarie University Cyber Security Hub, Founder of APATE.AI., Director of the Data Security and Privacy R&D Program, Director of the Cyber Range Training Centre (CRTC) and the Cyber Security Curriculum at the Institute of Applied Technology-Digital. Professor Kaafar interested in the broad R&D activities in Cyber Security in Emerging Technologies with a vision to enable Explicit Trust in the Digital Economy. His research interests include Data Security and Privacy, with a focus on Privacy-Preserving (or Enhancing) technologies and Information Security for Web and Mobile applications, (Provably) private date sharing and Trustworthy Secure and Private Machine learning techniques.
View Posts →
Cam retains oversight of the editorial content for KBI.Media and finds time to write every once in a while too. With a keen interest in geo-political goings-on, Cam oversees our new Global News section. And being an ex-techy, he puts his (very) atrophied knowledge to use, giving a helping hand to shape and manage our Technical section on occasion too.
View Posts →

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Become a Contributor

Unbiased Expertise: Our guest writers are carefully selected based on their expertise and independence from commercial interests. This ensures that the content they contribute is free from any potential bias, providing our audience with a well-rounded and objective understanding of cybersecurity topics.

Diverse Perspectives: We believe in showcasing a variety of perspectives to enrich the discourse surrounding cybersecurity. By featuring independent experts with diverse backgrounds, experiences, and viewpoints, we aim to present a comprehensive and inclusive narrative that reflects the complexity of the cybersecurity landscape.

Rigorous Selection Process: To maintain the integrity of our program, we employ a rigorous selection process for guest writers. Prospective contributors undergo thorough vetting to ensure their independence and commitment to delivering high-quality, unbiased content.

Cutting-Edge Insights: Our guest writers are at the forefront of cybersecurity developments, providing our audience with timely and relevant insights. Their independence allows them to delve into emerging trends, technological advancements, and policy changes without the constraints of commercial interests.

Commitment to Transparency: We prioritize transparency in our program, clearly outlining the independence criteria for our guest writers. This commitment ensures that our audience can trust the authenticity and objectivity of the content presented.

 

Get In Touch

Speak with KBI

Share This