No results found.
No results found.

Podcasts

Episode 333 Deep Dive: Prashant Vadlamudi | Building Secure Foundations for Agentic AI
byKBI.Media

In this episode, we sit down with Prashant Vadlamudi, Senior Vice President of Product Security at Salesforce, as he explores how organisations can build secure foundations for agentic AI. Prashant offers a holistic view of agentic AI, highlighting its shift from simple generative models to autonomous agents capable of reasoning, sequencing complex tasks, and performing actions—while emphasising the productivity benefits and the imperative for strong trust and security principles. The conversation covers the balance between fostering innovation and maintaining robust governance and security, the evolving nature of guardrails as AI models mature, and the importance of ongoing policy updates to keep pace with rapid technological changes. Prashant also discusses Salesforce’s approach to deploying AI responsibly, the role of trust metrics such as bias and hallucination scores, the necessity for data governance as the backbone of AI strategies, and the shared responsibility between providers and customers to ensure that agentic AI operates securely and transparently.

Prashant Vadlamudi is a strategic leader with two decades of experience driving transformative information security and compliance initiatives. As Senior Vice President of Product Security at Salesforce, he is responsible for safeguarding the company’s products and ensuring adherence to global standards. His career is marked by pivotal leadership roles, including Vice President of Information Security and Cloud Compliance at Cisco, where he established robust security baselines for SaaS offerings, and Director of Technology GRC at Adobe, where he architected the Adobe Common Controls Framework (CCF), a cornerstone of their global trust strategy. Prashant’s expertise spans cloud security, global certifications, and data-driven risk management, allowing him to navigate and mitigate complex security challenges in today’s dynamic landscape. He utilises a risk-based approach to decision-making and focuses on operational efficiency. He has experience in team development and mentoring, with individuals he has mentored holding security leadership positions across the industry. His professional experience includes strategic planning, technical implementation, and team management within the field of information security.

No results found.
The Guardians that Safeguard our Critical Infrastructure

The Guardians that Safeguard our Critical Infrastructure

Introduction Every day, critical industry sectors like healthcare, government and utilities services rely on digital systems that are mission-critical but vulnerable to cyber threats. Yet, the professionals safeguarding these systems often go unrecognised. Imagine a hospital's life-support systems faltering during critical surgery, a school building’s security lockdown failing during an active threat drill or a state government's emergency response network collapsing during a natural disaster. These scenarios are daily hypotheticals faced by the ...
No results found.

Business News ↓

Why Measuring The Right Threat Intelligence Metrics Is Key To SOC Success

Why Measuring The Right Threat Intelligence Metrics Is Key To SOC Success With the number and sophistication of artificial intelligence (AI)-powered cyberattacks continuing to increase, many security operations centres (SOCs) are being pushed to their limits. Organisations must detect, investigate, and respond to threats faster than ever. Success depends on measuring the right threat intelligence metrics which are...

Organisations Must Adapt Defences To 2025’s Dynamic Ransomware Threat

Introduction The rapid evolution of ransomware and its ability to disrupt operations through penetrating critical systems demands serious attention. BlueVoyant found that the first half of 2025 in ransomware has been marked by new attack strategies, focus on high-pressure targets, and a high level of incidents. The total volume of ransomware attacks remained at a critically high level in the first six months of the...
IT-OT Convergence: What Happens When Two Worlds Collide? cover

IT-OT Convergence: What Happens When Two Worlds Collide?

​Most people thought that cybersecurity is all about data breaches, suspicious links, or adversaries trying to get access to your accounts. But in recent years, the space has gone beyond computers and firewalls. Today, cybersecurity also means keeping the power on, the water safe, and hospitals operational. Recently on the DevSecOops podcast, hosts Tom Walker and James Vincent sat down with Sam Mackenzie,...

The PIN That Wasn’t Yours

Introduction When it comes to consumer fintech, attackers do not need to steal credentials or plant malware. They need a poorly protected endpoint with something valuable behind it. That is what unfolded with TCN - The Card Network, a popular multi-retailer gift card brand sold across Woolworths, Coles, Big W, Target and other national chains. A vulnerability identified by Simon Dean, an ordinary consumer with a...

Resilience Comes from Knowing What to Prioritise

Introduction In today’s hyper-connected business environment, where AI-driven systems, multi-cloud strategies, and edge computing dominate conversations, it’s tempting to chase every emerging risk with equal urgency. But when it comes to resilience, success doesn’t lie in doing everything, it comes from doing the right things. Modern organisations face a complex threat landscape that is unforgiving and...

Shadow AI Is The Blind Spot No Australian Board Can Ignore

Introduction Australia’s corporate leaders are sleepwalking into a technology blind spot that will cost them dearly. Shadow AI is already entrenched in workplaces, and boards that treat it as a side issue are making the same mistake they made a decade ago with shadow IT and cloud adoption. Back then, companies allowed employees to use unapproved cloud apps because they seemed harmless. The result? Exposed data,...

Scam Awareness Week Shines a Light On the Collective Effort Needed to Fight Scams

Introduction Scam tactics are growing in scale and sophistication, and so must our collective vigilance. Australians reported over $119 million in scam-related losses in the first four months of 2025. If we are to take anything from this Scam Awareness Week, it’s that we all have a responsibility in protecting each other from increasingly sophisticated scams – while the everyday Australian must be smart about their...

Why You Need Speed and Trust for Modern Software Delivery

Introduction Businesses are creating and launching software faster than ever to keep pace with competitors and drive innovation. The focus on increased speed has created a few trends: Developer productivity is no longer only measured by speed, but quality and security as well Many development teams rely on platform engineering to build tools that enable developer autonomy Cloud adoption has become an enabling...

Is GenAI Outsmarting Us or Just Making Us Lazy?

 Is AI turning our brains to mush? Hosts Phoebe Goh and Mekka Williams are joined by Karissa “KB” Breen, the sharp-tongued cybersecurity journalist behind the popular podcast, KBKast, for a no-holds-barred look at how AI is rewriting the rules of the game. From the sneaky rise of unsanctioned “shadow AI” tools to the unnervingly convincing world of deepfakes, KB doesn’t shy away from calling out the dangers this...

The Growing Tug-of-War Between Scammers and Defenders: What Australian Businesses Need to Do to Stay Safe

Scams are no longer on the fringes of criminal activity. They have become a mainstream threat for Australians, targeting both consumers and businesses with increasing sophistication. According to Scamwatch, Australians lost $2.03 billion to scams in 2024. This year’s Scams Awareness Week (25-29 August 2025) highlights this escalating issue and shows that as scams evolve in type and scale, our strategies to combat...

Cyber-securing Enterprises, the AI Way

“...Therefore, send not to know For whom the bell tolls, It tolls for thee.” John Donne, “No man is an island” Introduction No enterprise is an island of security when it comes to cyber-attacks. Australia suffered a staggering 47 million data breaches in 2024 — equivalent to one attack every second — representing a twelvefold increase from the previous year. With breach costs reaching a record high of A$ 4.26...

AI Coding Assistants Boost Productivity … But At What Cost to Security?

Since OpenAI’s ChatGPT burst onto the tech scene in late 2022, artificial intelligence (AI) tools have rapidly become embedded in the workflows of software developers. Praised for their speed, efficiency, and ability to assist with complex tasks, AI coding assistants are now a mainstay in development environments globally. By mid-2023, a GitHub survey revealed that more 90% of developers were already using AI tools...

How Emerging Technologies In Critical Infrastructure Are Expanding Cyber Risks

Introduction Emerging technologies like industrial Internet of Things, unified platform architectures, and cloud-integrated operational technology are transforming the critical infrastructure landscape. This transformation, driven by the need for greater agility and pursuit of competitive advantage, is unlocking unprecedented levels of automation, operational efficiency, and data-driven decision-making. However,...

Rethinking Security: Why Ethical Curiosity Belongs at the Core of Cyber Defence

Introduction  In 2023, the Latitude Financial cyberattack exposed over 14 million customer records, including driver  licences, passport numbers, and financial details. While remediation focused on containment and  response, one quiet question lingered for many defenders:  "Why didn’t we ask, 'what if?' sooner?"  That single moment underscores the critical role of ethical curiosity-a mindset that's often missing...

How Wargaming is Shaping Business Resilience and Cyber Security Strategies

Most organisations plan for the future through a best attempt at guessing what’s coming and hoping they’re right. Wargaming flips that—letting you test the future, pressure-test your plans, and uncover what breaks before it breaks you. Once the preserve of military strategy rooms and war colleges, wargaming is now being used across government, critical infrastructure, and enterprise to build clarity in the face of...

Five Essential Factors to Future-Proof Physical Access Control Systems

As digital and physical workplaces continue to converge, Australian organisations face challenges with maintaining the safety of both work environments. For example, while an abundance of cloud-based services and AI agents makes updating security systems faster and easier than ever, many physical access control solutions (PACS) may struggle to facilitate those updates, leaving security gaps that have the potential...
No results found.
No results found.
No results found.
No results found.
No results found.

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

Why Measuring The Right Threat Intelligence Metrics Is Key To SOC Success

Why Measuring The Right Threat Intelligence Metrics Is Key To SOC Success With the number and sophistication of artificial intelligence (AI)-powered cyberattacks continuing to increase, many security operations centres (SOCs) are being pushed to their limits. Organisations must detect, investigate, and respond to threats faster than ever. Success depends on measuring the right threat intelligence metrics which are...

Organisations Must Adapt Defences To 2025’s Dynamic Ransomware Threat

Introduction The rapid evolution of ransomware and its ability to disrupt operations through penetrating critical systems demands serious attention. BlueVoyant found that the first half of 2025 in ransomware has been marked by new attack strategies, focus on high-pressure targets, and a high level of incidents. The total volume of ransomware attacks remained at a critically high level in the first six months of the...
IT-OT Convergence: What Happens When Two Worlds Collide? cover

IT-OT Convergence: What Happens When Two Worlds Collide?

​Most people thought that cybersecurity is all about data breaches, suspicious links, or adversaries trying to get access to your accounts. But in recent years, the space has gone beyond computers and firewalls. Today, cybersecurity also means keeping the power on, the water safe, and hospitals operational. Recently on the DevSecOops podcast, hosts Tom Walker and James Vincent sat down with Sam Mackenzie,...

Hygiene is Hard: Why Even Security-Conscious Organisations Still Fall at the First Hurdle

A critical infrastructure operator sought evidence of an intrusion; investigators instead found many ‘open doors’ into the environment. Introduction When authorities were engaged recently on a proactive hunt exercise with a critical infrastructure operator, the intent was “to determine if a [threat] actor had been present in the organisation’s environment.” Such exercises are commonplace given the current backdrop....
The Next Scammer’s Paradise

The Next Scammer’s Paradise

The email looks real. It sounds like your boss. Thinking it might be urgent, you click the link included therein. And just ...
The PIN That Wasn’t Yours

The PIN That Wasn’t Yours

Fintech gift card system flaw may have allowed quiet cashouts. Signs point to possible exploitation months before it was ...
It’s Time to Hack the Hackers

It’s Time to Hack the Hackers

Introduction Cybercrime in Australia is rising rapidly. From the major breachers that held headlines hostage for months, ...
No results found.
It’s Time to Hack the Hackers

It’s Time to Hack the Hackers

Introduction Cybercrime in Australia is rising rapidly. From the major breachers that held headlines hostage for months, ...
No results found.
The Next Scammer’s Paradise

The Next Scammer’s Paradise

The email looks real. It sounds like your boss. Thinking it might be urgent, you click the link included therein. And just ...
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.