No results found.
No results found.
No results found.

Podcasts

Episode 357 Deep Dive: James Tennant | Why does AUKUS Need Sovereign Capital?
byKBI.Media

In this episode, we sit down with James Tennant, Partner and Head of JAPAC at Boka Capital, as he discusses why AUKUS needs sovereign capital to successfully deliver on its strategic ambitions. James explores the disparity between the headline-grabbing investments of AUKUS Pillar 1 and the overlooked capital shortfalls of Pillar 2, emphasizing the urgent need to build a unified capital architecture across Australia, the UK, and the US. He highlights the challenges faced by defense technology startups, such as the “valley of death” funding gap and ESG constraints that lock out institutional investment, and draws valuable lessons from international examples like In-Q-Tel and Israel’s Yozma. Throughout the conversation, James argues for a coordinated sovereign capital framework, increased public education about dual-use technologies, and transparent government action to move from strategic announcements to real capital deployment, ensuring AUKUS can compete effectively on a global stage.

James Tennant, Partner – Head of JAPAC, BOKA Capital

James Tennant is a Fellow with ASPI’s Cyber, Technology and Security Program and a Partner at BOKA Capital, a leading AUKUS Investment House in London, Sydney and New York.

His key role at BOKA is complemented by his service as an Officer in the Australian Army, where he specialises in Capability Development. He is also a Senior Partner at Gilmour Space Technologies, an Australian-based rocket company innovating in the field of low-cost small satellite launch vehicles.

James is a seasoned investor and corporate leader with deep interests and investments in diverse fields such as Quantum, Artificial Intelligence, Space, CyberSec, Machine Learning, Internet of Things, Drones, Enterprise Infrastructure, and Autonomous Vehicles. His professional journey, spanning across different continents and industries, uniquely positions him at the intersection of finance, defence, and technology including artificial intelligence.

James holds a Bachelor of Commerce degree with a specialisation in International Business from the University of Sydney, is a Graduate of Applied Finance at Macquarie University, and holds management courses in Private Equity and Venture Capital from Harvard Business School. He has also completed the Company Directors Course at the Australian Institute of Company Directors.

No results found.
AI in Defence – A Partner, Not a Quick Fix

AI in Defence – A Partner, Not a Quick Fix

​AI has been making waves for years now. It has moved from the pages of science fiction into the control rooms of our defence and security agencies and critical infrastructures, watching over networks and inspecting traffic. Why wouldn’t it be when it promises to work faster than humans and spot the tiniest anomaly possible? For defence and cybersecurity, where every second counts, this is a tempting offer. The Transition to AI The push toward AI stems from the needs and demands of the cybersecurity space. Threats are now multiplying at a rate ...
No results found.

Business News ↓

Eliminating the Technical Debt Caused by AI-Assisted Software Development

If recent industry forecasts are correct, 2026 will be the year of artificial intelligence (AI)-driven technical debt. According to research company Forrester[1], the tech debt for 75% of organisations will increase to a moderate or high level during this year, due to the rapid expansion of AI usage across a range of areas including software development. Indeed, the software development community is experiencing a...

Navigating AI with Cyber-Resilient Storage: Use Cases Lead, Infrastructure Enables

I’ve recently discussed the evolving landscape of intelligent data infrastructure on platforms like Techstrong TV. In these conversations, a recurring theme emerges: major trends like cloud and AI are reshaping enterprises, but their adoption is propelled primarily by compelling use cases. Infrastructure may not take center stage, but it’s the essential enabler that makes those use cases viable, efficient, and...

Security Metrics That Matter

Introduction Organisations must move beyond reactive security postures and embrace data-driven decision-making as the sophistication and prevalence of threat actors continues to increase. For start-ups, especially those scaling rapidly or navigating compliance requirements, understanding and tracking the right cybersecurity metrics is crucial. Security metrics provide clarity: they help prioritise risks, optimise...

Rethinking Cyber Resilience in the Age of AI

AI has fundamentally changed how we think about both innovation and risk. It’s driving new breakthroughs in medicine, design, and productivity, but it’s also giving attackers a sharper edge. Ransomware isn’t just about encrypting data anymore. It’s about double extortion, data theft, and the erosion of trust that organizations depend on to operate. As threat actors become more adaptive and use AI for more...

Cisco’s Bid to Anchor the Agentic Enterprise

The Shift to Agentic Enterprise AI Artificial Intelligence (AI) now alters the commercial world with a speed that feels less evolutionary and more tectonic. Infrastructure strains, security models stretch, collaboration tools morph. In that context, Cisco has positioned itself not merely as a participant, but as a structural layer in what it sees as the next phase of enterprise computing. During a recent company...

Future-Proofing Your Data Infrastructure with Post-Quantum Cryptography

The arrival of quantum computing isn’t a question of if—but when. And when it does arrive at scale, it will break the very encryption systems that protect the digital backbone of modern business. From banking records and intellectual property to classified communications, data that’s secure today could be exposed tomorrow. That’s why forward-thinking organizations are already investing in post-quantum...

Rising Cybersecurity Vulnerabilities In Increasingly Interconnected IT/OT Environments

From Outage to Infiltration: Cybersecurity Risk and the Evolving Threat to Electrical Infrastructure As electrical infrastructure modernizes, its vulnerabilities evolve in parallel. From substation automation to AI-powered grid management, today’s systems have developed from the isolated hardware of the past to converged digital ecosystems with data pathways, network connections, and embedded intelligence. Every...

Cyber Dashboards are Making Boards Feel Safer…and That’s the Real Risk

Introduction Boards today have never seen more cyber risk data. Dashboards glow with heat maps, scores, alerts and reassuring trend lines. Cyber is now a standing agenda item, backed by metrics designed to prove the organisation is in control. And yet, beneath this apparent clarity sits an uncomfortable truth. Many boards are less safe precisely because they believe they can see everything. This is not a failure of...

KnowBe4 Experts Calls for ‘Digital Mindfulness’ and Skepticism as AI Dominates Safer Internet Day 2026

As the world prepares for Safer Internet Day on 10 February 2026, KnowBe4 is encouraging individuals of all ages to adopt a mindset of ‘digital mindfulness’ to stay safe online. This year’s theme, ‘Smart tech, safe choices – Exploring the safe and responsible use of AI’, highlights the urgent need for a new set of digital skills in the world of AI. With Artificial Intelligence (AI) now a permanent fixture in the...

Safer Internet Day 2026

Introduction On Safer Internet Day, it’s worth recognising a simple reality: AI is reshaping the Internet in two directions at once. The same tools accelerating productivity and innovation are also industrialising cybercrime, making attacks faster to launch, cheaper to run, and harder to spot. We’ve seen the impact in Australia. In 2024–25, the Australian Signals Directorate’s Australian Cyber Security Centre...

Data Resilience in a Post-Quantum World

Introduction As cyberthreats grow more sophisticated and the quantum era draws closer, resilience is no longer just a best practice—it’s a business imperative. Many organizations have focused on breach prevention. Forward-looking enterprises are shifting to a resilience-first model. This model prioritizes continuity, recovery, and adaptability in the face of emerging risks. Why Resilience Is the New Gold Standard...

Securing the New Gaming Frontier: Data Infrastructure at Play

Introduction The gaming industry is in the midst of an extraordinary transformation. Immersive digital worlds, AI-driven gameplay, and massive global online communities are reshaping how we play, connect, and innovate. But as this digital ecosystem grows, so does the complexity of managing it safely and effectively. This frontier, rich with opportunity, also brings evolving challenges for studios that must secure...

Deepfake Diplomacy – AI Impersonation’s Attack on Sovereign Security

The rise of AI-powered impersonation—ranging from synthetic voice deepfakes to algorithmically generated messages—poses a critical threat to government, defense, and national infrastructure. A recent incident involving an AI-generated impersonation of a U.S. Secretary of State underscores the urgency of this threat. State-sponsored actors are increasingly exploiting consumer-grade messaging apps including Signal to...

Building Resilience Through AI-Driven Security

The pace and complexity of adversarial attacks is rapidly evolving. According to the 2024 Cybersecurity Visibility Study conducted by NetApp and Futurum Group, more than half (54%) of enterprises have experienced a cyberattack in the past 12-18 months. Even more troubling, one in five of these organizations were unable to recover their data. The situation underscores an urgent need for businesses to reimagine their...

The Transformative Role of AI in Cybersecurity

2025 marks a pivotal moment in the integration of artificial intelligence (AI) and cybersecurity. Rapid advancements in AI are not only redefining industries; they are reshaping the cybersecurity landscape in profound ways. Through this evolution, I have noted three primary trends emerging that demand immediate attention from organizations: The amplification of security threats powered by AI, A renewed focus on...

When Digital Names Collide, Business Risk Follows

In corporate networks, a “collision” is usually associated with infrastructure failure: two devices sharing the same IP address, traffic misdirected, and ultimately a communications breaking down. However, a quieter and potentially more damaging form of collision is becoming increasingly common inside organisations: identity collisions. Unlike their network equivalents, identity collisions do not announce...
No results found.
No results found.
No results found.
Security Metrics That Matter

Security Metrics That Matter

Introduction Organisations must move beyond reactive security postures and embrace data-driven decision-making as the ...
The ISO27001 Gold Standard

The ISO27001 Gold Standard

Introduction Building a strong information security posture is no longer optional. For tech executives tasked with ...
Streamlining Cyber Operations

Streamlining Cyber Operations

Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing ...
No results found.
No results found.

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

AI Versus AI: Why The Next Cyber Security Battle Will Be Fought By Machines

Introduction Artificial intelligence has evolved from being a technical novelty into a powerful business tool with remarkable speed. Companies are embedding generative AI into customer service, software development, and finance operations to unlock efficiency gains and accelerate innovation. However, as adoption deepens, cyber security leaders are confronting a new reality: AI is not just enhancing productivity but...

Why Identity Security Is Breaking Under the Weight of Silos

For more than a decade, cybersecurity professionals have repeated a now-familiar mantra: identity is the new perimeter. However, in many organisations, identity security remains fragmented, inconsistently governed and poorly understood across increasingly complex environments. As enterprises scale hybrid cloud infrastructure, adopt dozens of SaaS platforms and experiment with AI-driven automation, identity has...

Inside the DIY Scam Economy

Introduction The headquarters of the scam economy have always been elusive, shifting between countries, towns and cities like a shadow. Western Africa, once heralded as a hotbed for digital fraud operations, has now been superseded by Southeast Asia, where hundreds of major scam centres are scattered. The operations of these criminal groups transcend the digital world, securing land to build cities and special...

Closing the Human Gap in SAP Security: The Case for Cybersecurity Training

Hackers are becoming increasingly sophisticated by the day. Ever-evolving cyber threats are happening at an overwhelming pace. Organizations using SAP systems have become favorite targets for cybercriminals. For SAP users, the necessity for comprehensive cybersecurity training has never been greater. Though security tools exist, these technologies do not replace the importance of training employees to recognize and...
Security Metrics That Matter

Security Metrics That Matter

Introduction Organisations must move beyond reactive security postures and embrace data-driven decision-making as the ...
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
Security Metrics That Matter

Security Metrics That Matter

Introduction Organisations must move beyond reactive security postures and embrace data-driven decision-making as the ...
No results found.
No results found.
No results found.