No results found.
No results found.
No results found.

Podcasts

Episode 364 Deep Dive: Malcolm Turnbull | Balancing Innovation, Security, and Risk
byKBI.Media

In this episode, we sit down with Malcolm Turnbull, former Prime Minister of Australia, current Chairman of Fortescue Future Industries, Senior Advisor to KKR, and Strategic Advisor at Semperis. Malcolm reflects on his leadership in launching Australia’s first national cybersecurity strategy and examines the evolution of cyber as a vital component of national security and statecraft. He shares insights into the challenges faced by governments and businesses in raising digital awareness, the necessity of mandatory breach reporting, and the importance of sharing intelligence to combat cybercrime. The conversation covers Australia’s approach to critical infrastructure protection, foreign interference reforms, and the nuances of risk management in telecom and utility sectors. Malcolm also discusses the legal landscape around cybersecurity liabilities and the growing impact of class actions on corporate accountability, emphasizing adaptability, setting realistic expectations, and continual vigilance as key lessons for future leaders.

The Honourable Malcolm Turnbull AC

Australia’s 29th Prime Minister (2015-2018) had international careers in law, business and the media before entering politics at the age of 50.

As Prime Minister, he reformed Australia’s personal income tax, education and childcare systems, oversaw the legalisation of same sex marriage and announced the construction of Snowy Hydro 2.0 the biggest pumped hydro scheme in the southern hemisphere. Mr Turnbull embarked on the largest peacetime investment in Australian defence capabilities and set out Australia’s first national cybersecurity strategy.

Globally, Mr Turnbull played a leading role in reviving the Trans Pacific Partnership (TPP-11 or CPTPP) after the United States withdrew. He also struck deals with US Presidents Obama and Trump to accept refugees who tried to arrive in Australia illegally by boat.

As a young lawyer, Mr Turnbull successfully defended former MI5 agent Peter Wright against the British Government in the 1986 “Spycatcher” trial before entering business where he ran his own investment banking firm for a decade before joining Goldman Sachs as a partner in 1997. Both before and after his political career, Mr Turnbull has been a successful venture capitalist. He co founded OzEmail Limited, the first Australian tech company to be listed on the NASDAQ.

Since leaving politics, Mr Turnbull has resumed his business career. He is a senior adviser to KKR and an investor in, and adviser to, many Australian technology businesses. He is a director of the International Hydropower Association and Chairman of Australian Fortescue Future Industries. Mr Turnbull speaks and writes on a range of issues including cyber security, geopolitics and renewable energy.

 

No results found.
AI in Defence – a Partner, Not a Quick Fix

AI in Defence – a Partner, Not a Quick Fix

​AI has been making waves for years now. It has moved from the pages of science fiction into the control rooms of our defence and security agencies and critical infrastructures, watching over networks and inspecting traffic. Why wouldn’t it be when it promises to work faster than humans and spot the tiniest anomaly possible? For defence and cybersecurity, where every second counts, this is a tempting offer. The Transition to AI The push toward AI stems from the needs and demands of the cybersecurity space. Threats are now multiplying at a rate ...
No results found.

Business News ↓

Is This the End of the Road for AppSec?

Introduction A quarter of a century after the Agile Manifesto reshaped the software industry, its legacy is no longer in question. The methodology’s emphasis on speed, adaptability and user-centric design helped redefine how organisations build and deliver technology, enabling faster releases and a closer alignment with customer needs. For many enterprises, Agile has long since moved from disruptive idea to...

The Mission-Critical Standard: Why Mission-Certified Communications Are the Future of High-Stakes Operations

When a single compromised communication can disrupt governments, expose intelligence operations, or derail emergency responses, the question isn't whether your organization has secure communications. Rather, it’s whether your communications tools are certified for high-stakes operations. For years, organizations relied on standard end-to-end encryption as their primary defense. However, as threats evolve — from...

Break Glass Accounts: Essential Security or a Cyber Risk?

In office buildings around the world, the instruction is clear and universally understood: in case of fire, break glass. The act is deliberate, visible and reserved for emergencies only. In cybersecurity, however, the equivalent mechanism, the so-called “break glass account”, is far more controversial. Designed to provide emergency access when normal systems fail, break glass accounts sit at the intersection of...

Building Secure Automation: Three Core Pillars That Make an iPaaS Enterprise-ready

Introduction Security and governance are no longer back-office concerns, and in Australia, the stakes have never been higher. After a record 1,113 notifiable data breaches in 2024, the OAIC logged more than 530 additional breaches in the first half of 2025, with malicious attacks continuing to dominate. At the same time, major privacy reforms (e.g. updates to the Privacy Act 1988) that took effect this year have...

Encryption Alone Is Not a Security Strategy

Dutch intelligence has confirmed what enterprise security architects have long understood: consumer-grade messaging apps, regardless of their encryption implementation, are structurally unfit for sensitive government and military communications. The reason is not cryptography. It is the complete absence of verified identity and controlled device enrollment. A Global Campaign. Consumer Apps. Predictable Results. On...

Responsible ESG AI Enablement Could Become Australia’s Next Great Export If We Start Now

Introduction Logicalis Australia is calling for a shift in how Australia approaches artificial intelligence (AI), warning that the country risks missing a major global opportunity if it continues to focus primarily on policy and access to compute rather than infrastructure. Peter Cardassis, technical services director, Logicalis Asia Pacific, said, "Australia is having the wrong conversation about AI, and it risks...

World Cloud Security Day

The Rise of Stealth Impact Attacks In the past year, cyberattacks have been increasingly focused on “stealth impact”, quietly degrading performance, inflating cloud and AI costs, and eroding revenue over time. This includes tactics such as mass creation of fake accounts, bot-driven abuse of transactions, and the exploitation of AI chatbots to exhaust costly tokens. At the same time, illegal data scraping is on the...

The Hidden Risk Inside Australia’s Expanding IT Inventory

Introduction Australian organisations' technological maturity has grown exponentially in recent years. Hybrid work is the standard, cloud adoption is accelerating, and new innovations keep emerging to provide a productivity and competitive edge. What were once foreign concepts now underpin every business' workflow, communication, and customer interaction.  Yet as the number of technologies and platforms balloons in...

Australia’s AI Shift From Capability to Control 

Introduction Conversations with CIOs across Australian industries tell a consistent story. AI has decisively moved beyond pilots and proofs of concept. The question is no longer whether AI works, but whether it delivers measurable returns while operating within clear boundaries of trust, governance, and accountability. As Australian enterprises look ahead, success will depend on treating AI not as a technology...

Resilience at Scale: How Modern Organisations Stay Fast Without Increasing Risk

Introduction Australian organisations are not taking resilience seriously enough. According to BDO’s Tectonic States report, only 62 per cent of Australian business leaders ranked resilience as their top organisational priority, this is compared to 78 per cent of leaders in other countries, including the UK and Spain. This signals an opportunity for Australian organisations to build resilience, starting with...

Taming the Gallop on Rising Cybersecurity Risk

Introduction As the Lunar New Year ushers in a new cycle of The Horse, we can look to the traits of the traditional Chinese zodiac, which provide an admirable framework for cybersecurity objectives. Horses are commonly known for unbridled speed, agility, and making forward strides. These aren't just symbolic of cyber resilience: they are the new requirements for digital survival. With AI and automation in play the...

Communication as Infrastructure – Why Dialogue Is a Business Advantage

In the Asia, Pacific and Japan (APJ) region, one of the biggest challenges for businesses isn’t technology, it’s communication. The region spans more than 23 major languages, multiple dialects and profoundly different business cultures. Translating messages correctly matters, but real success comes from designing systems that can listen, respond and adapt at scale. The Australian market offers a clear example of...

From 398 to 200 Days: Understanding the TLS Certificate Lifespan Reduction

Digital trust is entering a new phase, and on March 15, 2026, a policy change will take effect that reshapes how organisations approach security. In 2025, the CA/Browser Forum, a consortium of browser vendors and certificate authorities, approved revisions to public TLS standards, introducing a phased reduction in certificate lifespans to better address modern threats. After extensive industry-wide debate, the...

Eliminating the Technical Debt Caused by AI-Assisted Software Development

If recent industry forecasts are correct, 2026 will be the year of artificial intelligence (AI)-driven technical debt. According to research company Forrester[1], the tech debt for 75% of organisations will increase to a moderate or high level during this year, due to the rapid expansion of AI usage across a range of areas including software development. Indeed, the software development community is experiencing a...

Navigating AI With Cyber-Resilient Storage: Use Cases Lead, Infrastructure Enables

I’ve recently discussed the evolving landscape of intelligent data infrastructure on platforms like Techstrong TV. In these conversations, a recurring theme emerges: major trends like cloud and AI are reshaping enterprises, but their adoption is propelled primarily by compelling use cases. Infrastructure may not take center stage, but it’s the essential enabler that makes those use cases viable, efficient, and...

Security Metrics That Matter

Introduction Organisations must move beyond reactive security postures and embrace data-driven decision-making as the sophistication and prevalence of threat actors continues to increase. For start-ups, especially those scaling rapidly or navigating compliance requirements, understanding and tracking the right cybersecurity metrics is crucial. Security metrics provide clarity: they help prioritise risks, optimise...
No results found.
No results found.
No results found.
Security Metrics That Matter

Security Metrics That Matter

Introduction Organisations must move beyond reactive security postures and embrace data-driven decision-making as the ...
The ISO27001 Gold Standard

The ISO27001 Gold Standard

Introduction Building a strong information security posture is no longer optional. For tech executives tasked with ...
Streamlining Cyber Operations

Streamlining Cyber Operations

Introduction As businesses scale and digital ecosystems grow more and more complex, security teams face increasing ...
No results found.
No results found.

Markets & Trading

YOUR SECURITY NEWSFEED

The KBI Dossier

The Cybersecurity news feed delivered straight to your Inbox.

Technology News ↓

Is This the End of the Road for AppSec?

Introduction A quarter of a century after the Agile Manifesto reshaped the software industry, its legacy is no longer in question. The methodology’s emphasis on speed, adaptability and user-centric design helped redefine how organisations build and deliver technology, enabling faster releases and a closer alignment with customer needs. For many enterprises, Agile has long since moved from disruptive idea to...

The Mission-Critical Standard: Why Mission-Certified Communications Are the Future of High-Stakes Operations

When a single compromised communication can disrupt governments, expose intelligence operations, or derail emergency responses, the question isn't whether your organization has secure communications. Rather, it’s whether your communications tools are certified for high-stakes operations. For years, organizations relied on standard end-to-end encryption as their primary defense. However, as threats evolve — from...

Break Glass Accounts: Essential Security or a Cyber Risk?

In office buildings around the world, the instruction is clear and universally understood: in case of fire, break glass. The act is deliberate, visible and reserved for emergencies only. In cybersecurity, however, the equivalent mechanism, the so-called “break glass account”, is far more controversial. Designed to provide emergency access when normal systems fail, break glass accounts sit at the intersection of...

The Latest Security Vulnerability Exploit Doesn’t Break Your Encryption. IT Bypasses IT.

The most dangerous attacks against secure communications don't decrypt your messages. They compromise the device before encryption occurs — then watch every keystroke, every screen, and every conversation in plaintext. CVE-2026-21385 is the latest documented instance of a pattern that security teams in government and critical infrastructure need to understand: it’s a hardware-layer exploitation that bypasses the...
No results found.
No results found.
No results found.
World Cloud Security Day

World Cloud Security Day

This World Cloud Security Day, the message is clear for Australian organisations: security and resilience must be embedded ...
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
No results found.