Your employees uploaded over a gig of files to GenAI tools last quarter
In Q2 2025, Harmonic reviewed 1 million GenAI prompts and 20,000 uploaded files across more than 300 GenAI and AI-powered SaaS apps, and the findings…
In Q2 2025, Harmonic reviewed 1 million GenAI prompts and 20,000 uploaded files across more than 300 GenAI and AI-powered SaaS apps, and the findings…
Sektor has announced a new distribution agreement with SentinelOne across Australia and New Zealand. The partnership will see Sektor offer SentinelOne’s AI-powered Singularity® Platform, powered…
The conversation around the UK’s Online Safety Act has transformed over the past week. Since it came into force last Friday (25th July 2025), there…
The use of artificial intelligence for development is threatening to make a specific type of web application flaw, insecure direct object references (IDORs), far more common,…
ISACA has announced the appointment of Australian cybersecurity expert Jamie Norton (pictured) as Vice Chair of its 2025–2026 Board of Directors. Norton, currently Chief Information…
Google’s Gemini artificial intelligence-powered Big Sleep system has found further vulnerabilities in popular software, as part of the company’s push towards automated security research. Vice…
Bendigo and Adelaide Bank acting chief information officer Nathalie Moss has announced her exit from the company after a year in the role. Nathalie Moss…
We spoke with Prof. Ahmed Banafa from San Jose State University about his latest work, Artificial Intelligence in Action: Real-World Applications and Innovations. In this…
NBN Co will offer users in its Sky Muster footprint an upgrade path to low earth orbit satellite services powered by Amazon Kuiper sometime before…
The typical SOC team can be presented with thousands of security alerts every day. While most turn out to be false positives, each needs reviewing,…
Hackers are constantly evolving their strategies to outsmart traditional security measures, even through the use of AI. In response, AI-driven companies are continuing to develop…
The investigation began with the detection of two scanning IP addresses, 91.238.181[.]225 and 5.188.86[.]169 sharing a common Secure Shell (SSH) fingerprint (b5:4c:ce:68:9e:91:39:e8:24:b6:e5:1a:84:a7:a1:03). Cybersecurity researchers have…