No results found.
No results found.
No results found.

Podcasts

Episode 338 Deep Dive: Eric Stride | Securing the Aviation Industry in the Modern Age
byKBI.Media

In this episode, we sit down with Eric Stride, Chief Security Officer at Huntress, to discuss the escalating cybersecurity challenges facing the aviation industry. Eric highlights the alarming 600% year-over-year surge in cyberattacks targeting the sector, emphasising how attackers are exploiting the interconnected and fragile aviation supply chain—most notably seen in recent incidents like the ransomware strike on Collins Aerospace. He explores the growing risk posed by both IT and OT system convergence, the shift in regulation tying cybersecurity readiness directly to airworthiness, and the increasing adoption of robust frameworks to mitigate operational disruptions and data breaches. Eric also highlights the critical need for holistic supply chain security, the importance of regulatory enforcement, and a cultural shift in the industry toward prioritising safety and cyber resilience to restore public trust in air travel.

Eric Stride is the Chief Security Officer at Huntress, where he oversees the company’s 24/7 Global Security Operations Center, Detection Engineering, Adversary Tactics, IT Operations, and Internal Security. A 20+ year cybersecurity leader, Eric has held senior roles spanning the U.S. Air Force, NSA, and private sector. 

During his 12 years on active duty, Eric helped architect the Air Force’s first cyber combat mission team, co-authored its first offensive cyber operations manual, and rose to Deputy Chief for Cyber Operations at NSA Georgia. He continues to serve as a Colonel in the Air Force Reserve, where he established its first cyber range squadron. 

In the private sector, Eric co-founded Atlas Cybersecurity, advised defense and enterprise clients as an independent consultant, and led Deloitte’s Advanced Cyber Training portfolio, generating $135M+ in new business. He holds an M.S. in Information Technology Management, a B.S. in Computer Science, and multiple cybersecurity certifications (CISSP, GCIH, CEH). 

No results found.
Microsoft Announces A$5 Billion Investment In Computing Capacity And Capability To Help Australia Seize The AI Era

Microsoft Announces A$5 Billion Investment In Computing Capacity And Capability To Help Australia Seize The AI Era

WASHINGTON, D.C. – 23 October 2023 – Today Microsoft announced major digital infrastructure, skilling and cybersecurity investments in Australia to help the nation seize the artificial intelligence (AI) era to strengthen its economic competitiveness, create high-value jobs and protect the nation from the increasing threat of cyberattacks. Microsoft will invest A$5 billion in expanding its hyperscale cloud computing and AI infrastructure in Australia over the next two years – the single largest investment in its forty- year history in the ...
No results found.

Business News ↓

AI Governance in the Age of Relentless Adoption

AI is no longer a future concept. It is already reshaping how we work, how decisions are made, and how organisations operate. The pace of adoption is relentless. In many organisations, AI is embedded into workflows even when no formal policy or governance exists. This gap between adoption and oversight is one of the most pressing issues in technology leadership. Without governance, AI may deliver short-term...

Why Australia’s AI Ambitions Depend on Smarter Networks

Australia’s ambition to be a global leader in artificial intelligence (AI) is clear—from sovereign AI strategies to booming enterprise deployment. But underneath the promise lies a pressing energy challenge. Data centres already account for approximately 5% of Australia’s electricity supply today, and according to reports could consume as much as 8% by 2030, or even escalate towards 15% under high-growth scenarios....

Decrypting the Future: Why Post-Quantum Security Must Start Today

Introduction Australia is standing at the edge of a technological shift that could redefine cyber resilience. With quantum computing on the horizon, the very foundations of data security are under threat. While this technology promises enormous advances in areas like medical research, logistics and AI, it also has the potential to break the cryptographic systems that currently protect government, business and...

Speed, Identity, and AI: Redefining Cybersecurity for Australian Organisations

Speed, Identity, and AI: Redefining Cybersecurity for Australian Organisations Cybersecurity teams have always grappled with emerging technologies, increasingly sophisticated attacks and new regulations. However, as organisations accelerate AI and cloud adoption, digitise services, and adapt to evolving compliance regulations, security challenges continue to grow in tandem with the expansion of attack surfaces....

How Drawing On The Power Of AI Technology Can Help Your Institution Stay A Step Ahead Of Scammers And Fraudsters In 2026

Embedding fraud intelligence into the digital banking experience will enable you to protect your customers more effectively. Introduction Are you confident your institution is doing all that it can to stop bad actors separating customers from their hard-earned funds? There’s no doubt the Australian banking industry has made heartening progress on this front in recent times. Published in March 2025, the National...

Resilience, Not Just Compliance: A Zero Trust Perspective for Federal Cybersecurity

Introduction For decades, cybersecurity in government has been defined by a familiar cycle: secure the perimeter, block the intruders, respond to the audits. That model no longer works. As adversaries grow more sophisticated and resources remain tight, the federal community needs a new mindset. Prevention still matters, but resilience must come first. That shift from preventing every attack to assuming breach and...
Breaking the Mold: How the CISO Role Has Outgrown Its Technical Roots cover

Breaking the Mold: How the CISO Role Has Outgrown Its Technical Roots

​Recently on the DevSecOops podcast, hosts Tom Walker and Scott Fletcher sat down with George Abraham, CISO at Influx, to discuss the changing nature of cybersecurity leadership, the human challenges of leading teams, and the complex security risks emerging from new technologies. George began with a note that cybersecurity careers rarely follow a straight line. For instance, his journey began with a spark of...

GenAI for Cybersecurity – Embrace the Power, Own the Risk

Introduction Generative AI (GenAI) is actively reshaping the way attackers and defenders operate in Australia. Threat actors have weaponised GenAI to synthesise text, code, voice, and video at scale, increasing impersonation scams and malware campaigns.  In response to these evolving threats, security teams have also adopted GenAI tools to automate and streamline their cyberdefences. This dichotomous use of AI is...

Improving Australia’s Resilience Against Growing Cyber Threats

Introduction Australia’s cybersecurity landscape is evolving at a pace that few businesses and public-sector organisations can comfortably manage. It’s a situation marked by three interconnected challenges: a rapidly expanding attack surface, the weaponisation of artificial intelligence (AI), and systemic vulnerabilities in supply chains. These challenges are made more acute by the explosion of internet-connected...

Navigating Hybrid Cloud Security In the AI Era As Regulations Tighten

Introduction As hybrid cloud infrastructures continue to evolve, they are increasingly subject to AI-driven risks, complex data environments, and growing cyberthreats. Our recent 2025 Hybrid Cloud Security Survey underscores the rising pressure faced by organisations worldwide as AI technologies disrupt traditional security frameworks. With a 17 percent year-on-year rise in breach rates across Australia, these...

From Chaos to Command: Secure Communications at Scale for Public Safety

Introduction When it comes to public safety, every second counts. If communication breaks down, so does the response - leading to losses in time, coordination, effectiveness, and public trust. During large-scale incidents, a persistent “communications gap” emerges: the critical distance between information being available and that same information becoming actionable across teams, agencies and jurisdictions....

Securing Australian Organisations in the Quantum Era

Introduction Quantum computing offers unquestionable opportunities for Australian businesses, but it also tests the resilience of current cybersecurity frameworks and underscores the need to prepare and adapt cyber defences. Whilst still in its early stages, future breakthroughs in the technology may challenge the security of traditional encryption methods used to protect sensitive data, rendering them obsolete....

The Hidden Costs To Consider When Selecting A Cyber Security Vendor

Introduction In an environment where the shortage of skilled cyber security professionals continues to be an issue, it’s logical to think organisations would be carefully vetting security vendors not just on functionality, but also on their ability to reduce operational risk. Unfortunately, this is not always the case. Despite the critical role cyber security plays in protecting organisations and their customers,...

A CISO’s Love Letter to The Board – Cyber Risk Quantified

Introduction Cybersecurity has a communication problem and it’s costing us.   If CISOs want to earn trust, investment and influence, they need to speak the business’ love language. Within organisations, everyone has their own "love language." Engineers speak in code. Product teams talk in features. Legal speaks in compliance. But in risk? There’s only one language that matters: money.  Yet too often, CISOs are...

Why Measuring The Right Threat Intelligence Metrics Is Key To SOC Success

Why Measuring The Right Threat Intelligence Metrics Is Key To SOC Success With the number and sophistication of artificial intelligence (AI)-powered cyberattacks continuing to increase, many security operations centres (SOCs) are being pushed to their limits. Organisations must detect, investigate, and respond to threats faster than ever. Success depends on measuring the right threat intelligence metrics which are...

Organisations Must Adapt Defences To 2025’s Dynamic Ransomware Threat

Introduction The rapid evolution of ransomware and its ability to disrupt operations through penetrating critical systems demands serious attention. BlueVoyant found that the first half of 2025 in ransomware has been marked by new attack strategies, focus on high-pressure targets, and a high level of incidents. The total volume of ransomware attacks remained at a critically high level in the first six months of the...
No results found.
No results found.
No results found.
No results found.
No results found.

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

AI Governance in the Age of Relentless Adoption

AI is no longer a future concept. It is already reshaping how we work, how decisions are made, and how organisations operate. The pace of adoption is relentless. In many organisations, AI is embedded into workflows even when no formal policy or governance exists. This gap between adoption and oversight is one of the most pressing issues in technology leadership. Without governance, AI may deliver short-term...

Why Australia’s AI Ambitions Depend on Smarter Networks

Australia’s ambition to be a global leader in artificial intelligence (AI) is clear—from sovereign AI strategies to booming enterprise deployment. But underneath the promise lies a pressing energy challenge. Data centres already account for approximately 5% of Australia’s electricity supply today, and according to reports could consume as much as 8% by 2030, or even escalate towards 15% under high-growth scenarios....

Decrypting the Future: Why Post-Quantum Security Must Start Today

Introduction Australia is standing at the edge of a technological shift that could redefine cyber resilience. With quantum computing on the horizon, the very foundations of data security are under threat. While this technology promises enormous advances in areas like medical research, logistics and AI, it also has the potential to break the cryptographic systems that currently protect government, business and...

Ransomware Protection Advisory: From Cisco Flaws to SonicWall Breaches

“Please wait, your document is loading.” That’s the message victims saw right before their systems got hijacked. Behind that digital curtain, crypto miners and information stealers worked stealthily to infiltrate networks, exfiltrate sensitive data, and plant persistent malware. In the latest ColorTokens Threat Advisory, we tracked how threat actors are not just breaching networks, but embedding themselves deeply,...
No results found.
It’s Time to Hack the Hackers

It’s Time to Hack the Hackers

Introduction Cybercrime in Australia is rising rapidly. From the major breachers that held headlines hostage for months, ...
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.