When analysts at RH-ISAC found themselves spending 10 hours a week just collecting threat intelligence, they knew their process wasn’t…
I think we should make a distinction between Functional AGI and Technical AGI. Functional AGI is what I use in…
Cyberbullying is a fact of life in our digital-centric society, but there are ways to push back 27 Aug 2025…
AI has moved to the top of the CISO agenda. Three in five CISOs see generative AI as a security…
CISOs and security leaders work in a world where the threat landscape is continuously evolving. At the same time, organisations…
I wrote recently about the difference between Functional and Technical AGI. I argued that Technical AGI is the real deal…
CSIRO, Australia’s national science agency, has analysed data from a 10-month trial conducted by global cybersecurity firm eSentire exploring how large language…
Swinburne University will be using e-signatures in 21 functional areas by the end of the year, after first going live…
A revision to NIST’s catalogue of security and privacy controls, Special Publication (SP) 800-53, Security and Privacy Controls for Information Systems…
A widespread service issue is impacting Microsoft Teams users globally this Thursday, preventing many from opening embedded Microsoft Office documents…
Western Sydney University issued three takedown notices on file-sharing sites used to host data stolen in a breach of its…
We can’t stop learning fundamentals just because tech can do them March 16, 2025 Not learning to code just because…











