News

The Australian Public Service (APS) has been provided with a comprehensive roadmap for securely adopting Microsoft 365 Copilot, following the conclusion of a six-month government trial that ...
WatchGuard Technologies has released findings from its Q1 2025 Internet Security Report showing a 171% quarter-over-quarter increase in total unique malware detections, marking the highest level the ...
The strategy adopts a deliberately "light-touch" regulatory approach, emphasizing AI adoption over foundational development. It aims to remove barriers for businesses while relying primarily on ...
The Unstructured Data Challenge The trust deficit appears linked to AI's increasing reliance on unstructured data sources like PDFs, images, and documents - inputs that traditional data quality tools ...
Updated Bank Account Details - You receive an email from your supplier asking to update their bank account details due to a change in their internal systems and processes, and you update them ...
Records management is rarely smooth sailing – it can often feel like you’re a tiny vessel in the middle of a sea of legislation. Just when you think you’re paddling in the right direction, a wave of ...
Measuring return on investment for document automation solutions used to be pretty simple: reducing data entry reduces headcount. But simply reducing resources to measure ROI and business benefits isn ...
Australia’s largest private health insurer was aware of “serious deficiencies in its cybersecurity and information security framework” a full two years before the October 2022 data breach that saw a ...
Anthropic's latest AI model, Claude 3.5 Sonnet, is now generally available on Amazon Bedrock in the AWS Asia Pacific (Sydney) Region, offering organizations in the area access to advanced AI ...
What is process mining Process mining uses actual data from information systems to create a model that accurately reflects how a process executes. Applications such as CRM and ERP systems, as well as ...
CrowdStrike and Microsoft have developed a shared mapping system - described as a "Rosetta Stone" for cyber threat intelligence - that links adversary identifiers across vendor ecosystems without ...
In most organisations, the records management team and the information security teams are separated, primarily because information security is seen as a technology function, and records management is ...