Given the speed of AI improvement and adoption, it’s hard for most people to know what to be concerned about,…
Over the past year, the Underground ransomware gang has emerged as a formidable threat to organizations across diverse industries and…
When analysts at RH-ISAC found themselves spending 10 hours a week just collecting threat intelligence, they knew their process wasn’t…
I think we should make a distinction between Functional AGI and Technical AGI. Functional AGI is what I use in…
Cyberbullying is a fact of life in our digital-centric society, but there are ways to push back 27 Aug 2025…
AI has moved to the top of the CISO agenda. Three in five CISOs see generative AI as a security…
CISOs and security leaders work in a world where the threat landscape is continuously evolving. At the same time, organisations…
I wrote recently about the difference between Functional and Technical AGI. I argued that Technical AGI is the real deal…
CSIRO, Australia’s national science agency, has analysed data from a 10-month trial conducted by global cybersecurity firm eSentire exploring how large language…
Swinburne University will be using e-signatures in 21 functional areas by the end of the year, after first going live…
A revision to NIST’s catalogue of security and privacy controls, Special Publication (SP) 800-53, Security and Privacy Controls for Information Systems…
A widespread service issue is impacting Microsoft Teams users globally this Thursday, preventing many from opening embedded Microsoft Office documents…











