Aaron Finnis, chief strategy officer at Identity and Access Management (IAM) specialist Identifly, has echoed others in the cybersecurity industry…
Australian Gas Infrastructure Group is entering the second phase of a CRM transformation, with an end goal of establishing a…
There’s an AI Security and Safety concept that I’m calling an “AI Comprehension Gap.” It’s a bit of a mouthful,…
More than 190 internet shutdowns have been recorded in 41 African countries since 2016, the African Digital Rights Network (ADRN)…
GIO is using a digital assistant to help its Australia-based claims teams correctly route work to an offshore centre for…
OpenAI is internally testing a new version of its AI agent, which uses a special version of GPT-5 dubbed “GPT-Alpha.”…
Ahead of the official opening of identity specialist Okta’s annual Oktane customer conference in Las Vegas, Nevada, the cyber security…
Home Affairs has hired former Microsoft executive Rishi Nicolai to accelerate the development of artificial intelligence across its operations. Nicolai spent…
Two vulnerabilities affecting the firmware of Supermicro hardware, including Baseboard Management Controller (BMC) allow attackers to update systems with maliciously crafted images….
British police said a man had been arrested as part of an investigation into a ransomware attack against Collins Aerospace,…
Endpoint detection and response (EDR) bypass and evasion tools and techniques are commonly used by threat and ransomware groups to…
Cisco has disclosed a zero-day vulnerability, CVE-2025-20352, in its widely used IOS and IOS XE software, confirming it is being…











