No results found.
No results found.
No results found.

Podcasts

Episode 346 Deep Dive: Amberley Brady | Everyone is Protecting My Password but Who is Protecting My Toilet Paper?
byKBI.Media

In this episode, we sit down with Amberley Brady, founder at Realfoodprice, as she explores the urgent issue of food security as a national security crisis in Australia. Amberley discusses the four pillars of food security—availability, access, utilization, and stability—emphasising how fragile supply chains, economic shocks, climate events, and cyber incidents threaten the nation’s access to safe and affordable food. She recounts the disruptions experienced during COVID-19 and highlights the risks of over-reliance on large supermarket conglomerates and lack of support for local farmers. The conversation covers the need for greater policy coordination, strategic food reserves, improved data transparency, and the integration of technology to strengthen domestic resilience. Amberley urges for accountability, innovation, and collaboration between government, industry, and the tech community to ensure that access to nutritious food remains a right, not a privilege, for all Australians.

Amberley, an astute industry professional with extensive experience in public policy, founded Realfoodprice in 2024 in response to identified structural inefficiencies within Australia’s food supply chain. Recognizing the critical need for market transparency, she established this data-driven platform to address the competitive imbalance affecting both producers and consumers.

Through rigorous market analysis and comparative price assessment, Amberley developed a methodology to clearly communicate authentic food value throughout the supply chain. Her strategic initiative to “un-supermarket” represents a paradigm shift in how agricultural commodities are valued and traded within the Australian market.

Realfoodprice exemplifies Amberley’s innovative approach to economic challenges, leveraging data analytics to foster equitable commercial relationships between farming communities and end consumers. The platform serves as both an advocacy tool and a practical market mechanism designed to ensure the long-term sustainability of Australia’s agricultural sector and strengthen national economic resilience.

Under Amberley’s leadership, Realfoodprice continues to advance data transparency as an essential component in creating a more competitive and balanced food system for all stakeholders.

No results found.
The Scattered Spider, Airline Attacks and How to Be Breach Ready!

The Scattered Spider, Airline Attacks and How to Be Breach Ready!

Introduction On July 2, 2025, Qantas, Australia's flagship airline, disclosed a cyberattack that compromised the personal information of up to six million customers, first detected on June 30, 2025. Touted as one of the most significant data breaches in Australia's recent history, the attack is suspected to be the work of the notorious Scattered Spider cybercriminal group. According to the information currently available, the hackers targeted a third-party customer service platform used by Qantas's contact centre - specifically, a Manila-based ...
No results found.

Business News ↓

Avoiding Security Operation Chokepoints

Introduction Security operations often become inadvertent chokepoints. When every vendor relationship triggers an extensive security review, and teams rely on spreadsheets and email chains to gather responses, progress grinds to a halt. For resource‑constrained organisations, particularly in the fintech, SaaS and technology spaces, these bottlenecks can delay product launches, strain customer relationships and...

2026 Predictions: The Year Identity Becomes the Ultimate Control Point for an Autonomous World

Introduction The collision between technological acceleration and human adaptability will define the cybersecurity landscape in 2026. Identity and trust will sit at the centre of this struggle — as the proliferation of machine and AI identities exposes the fragility of traditional controls and the limits of human oversight.  As organisations race to deploy autonomous agents and machine-led systems to drive...

Why 9 In 10 IT Teams Overestimate Their Operational Resilience

Introduction How confident are you that your operations are resilient enough to tackle today’s challenges while preparing for tomorrow’s? If your answer is ‘very confident’, you’re not alone. According to SolarWinds' 2025 IT Trends Report, over 90% of IT professionals believe their organisations are resilient in the face of today’s demands. Of those, 38% say their resilience is ‘very strong’, while 55% describe it...

Cybersecurity in Manufacturing: Why It’s More Important Now Than Ever

Manufacturing has always depended on stable operations. That used to mean keeping machines running, maintaining quality, and hitting delivery schedules. Today it also means defending the environment from attacks that can shut down production, corrupt data, or compromise customer trust. Plants are now connected in ways they weren’t ten years ago, and that connection has created real exposure. The stakes are higher...

AI to Supercharge Cyber Threats Across Australia

AI is fundamentally changing the economics of cyberattacks in Australia. Adversaries are no longer scaling through the workforce, but rather through automation. Leaders can’t rely on human-paced defences in a machine-paced threat environment.  Here are the top security trends to watch out for in 2026 and beyond: Compressed Attack Timelines Due to Autonomous AI In 2026, the rapid acceleration of autonomous AI-driven...

‘Tis the Season to Stay Secure: Safeguarding Your Business this Festive Period

This holiday shopping season can make or break many Australian businesses. While consumers are shopping for bargains, attackers are searching for vulnerabilities.  The surge in shopping traffic during Black Friday, Cyber Monday and Christmas sales provides cybercriminals with the perfect cover to launch scams and fraud campaigns, exploiting the rise in digital transactions to hide malicious activity.  The Perfect...

Safeguarding Australia’s Most Critical Systems: Why Cybersecurity Is a Sovereignty Issue

Australia’s critical infrastructure is now on the front line of a contest that is playing out both in cyberspace and our surrounding seas and skies. The choices industry makes in the next few years will determine whether we remain merely connected or truly resilient. The Stakes for Critical Infrastructure The latest ASD Cyber Threat Report shows that cyber incidents now target Australia’s critical infrastructure at...

Exploring Security In the Context of AI

Insights from the Cisco Live! "Redefining Security in the AI Era" Panel The rapid proliferation of Artificial Intelligence (AI) across industries has adroitly shifted the paradigm of cybersecurity. At the recent “Redefining Security in the AI Era” panel held at Cisco Live! 2025, senior leaders from Cisco, and partner organisation Logicalis, met to discuss the complexities and opportunities facing security teams...

The ABCs of GRC

Introduction In the face of increasing regulatory pressure, rising cyber threats, and growing business complexity, organisations need a structured, scalable approach to managing risk. Governance, Risk, and Compliance (GRC) frameworks have become vital for aligning information security with corporate objectives, ensuring operational resilience, and maintaining trust with stakeholders. For tech executives, building...

The Korean Leaks – Analysing the Hybrid Geopolitical Campaign Targeting South Korean Financial Services with Qilin RaaS

When preparing data for the Bitdefender Threat Debrief | October 2025, Bitdefender noticed a significant departure from established ransomware trends. Typically, the top five most impacted countries are consistently the US, Canada, and major Western European nations. However, for this period, South Korea (KR) suddenly became the second most-targeted country, with 25 victims claimed in a single month. This anomaly...

How the Financial Sector Is Battling New Cyber Threats

Australia’s financial institutions are confronting a new generation of cyber and fraud threats that are testing the limits of traditional defences. From quote manipulation in insurance to networks of co-ordinated money mules and ghost brokering, the old playbook built on static, siloed data models is fast losing its relevance. The financial sector’s challenge is not just the rising sophistication of fraudsters, but...

Turning Hesitation into Action

Artificial Intelligence (AI) continues to redefine technology’s place in organisations, promising unmatched opportunities, alongside uncertainty and risk. At Cisco Live! 2025, the launch of a new report, “Turning Hesitation into Action: How Risk Leaders Can Unlock AI’s Potential” set out to pierce the fog surrounding AI adoption and governance in Australia. The session, jointly presented by Cisco and the Governance...

Crisis Leadership in Uncertain Times: Why People, Practice, and Policy Matter Most

We live in times like we are always on the edge of a crisis. Whether it is due to public health issues, geopolitical instability, economic volatility, or an increase in sophisticated cyber threats, uncertainty has become our constant companion. Effective leadership in this kind of environment is a fundamental shift not just in our leadership paradigm but also to our agility. However, one idea never goes out of...

Awareness to Action – Building a Culture of Cybersecurity at SMBs

Cybersecurity remains a pressing concern for businesses across Australia, with the frequency and impact of attacks continuing to rise. While large enterprises often have the financial resources and personnel to build robust cyber defences, SMBs are still disproportionately exposed. With tighter budgets and fewer dedicated staff, smaller organisations can find it challenging to prioritise cybersecurity alongside...

Why Australia Must Shift from Reactive to Resilient Cybersecurity

As we look ahead to 2026, the cyber landscape confronting Australia is more volatile than ever, and the implications for government, critical infrastructure, and enterprise are profound. Every connected device, every credential, every unpatched system is now potential entry point zero. Data from the Australian Signals Directorate (ASD)’s Annual Cyber Threat Report for 2024-25 underscores the cybersecurity challenge...

Fortinet CISO’s 2026 cybersecurity predictions: Artificial intelligence, geopolitics, and the new era of resilience

Artificial Intelligence (AI): Driving Innovation, But At What Cost? AI is fundamentally transforming almost every business, not just by automating tasks, but by changing how decisions are made, how value is created, and how companies compete. It appears that there is virtually no limit to the transformative benefits AI will bring, including its ability to drive innovation. Previously, broad technology changes were...
No results found.
No results found.
No results found.
The ABCs of GRC

The ABCs of GRC

Introduction In the face of increasing regulatory pressure, rising cyber threats, and growing business complexity, ...
No results found.
No results found.

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

CrowdStrike Research: Security Flaws in DeepSeek-Generated Code Linked to Political Triggers

In January 2025, China-based AI startup DeepSeek (深度求索) released DeepSeek-R1, a high-quality large language model (LLM) that allegedly cost much less to develop and operate than Western competitors’ alternatives. CrowdStrike Counter Adversary Operations conducted independent tests on DeepSeek-R1 and confirmed that in many cases, it could provide coding output of quality comparable to other market-leading LLMs of...

Avoiding Security Operation Chokepoints

Introduction Security operations often become inadvertent chokepoints. When every vendor relationship triggers an extensive security review, and teams rely on spreadsheets and email chains to gather responses, progress grinds to a halt. For resource‑constrained organisations, particularly in the fintech, SaaS and technology spaces, these bottlenecks can delay product launches, strain customer relationships and...

2026 Predictions: The Year Identity Becomes the Ultimate Control Point for an Autonomous World

Introduction The collision between technological acceleration and human adaptability will define the cybersecurity landscape in 2026. Identity and trust will sit at the centre of this struggle — as the proliferation of machine and AI identities exposes the fragility of traditional controls and the limits of human oversight.  As organisations race to deploy autonomous agents and machine-led systems to drive...

Hybrid Mesh Security in the Age of AI and Ransomware

Introduction The digital landscape is undergoing a radical transformation, driven by the rapid adoption of cloud services, the proliferation of remote work, and the emergence of sophisticated, AI-powered threats. This hyperconnected world presents unprecedented cyber security challenges for organisations globally, as their digital footprints stretch across cloud, on-premises, and remote environments. In this...
No results found.
No results found.
No results found.
It’s Time to Hack the Hackers

It’s Time to Hack the Hackers

Introduction Cybercrime in Australia is rising rapidly. From the major breachers that held headlines hostage for months, ...
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.