Dumping Ground
Start:
Start:
End:

Register

Editors Pick

What Einstein would say about AI

Einstein was talking about the concept of “technological unemployment,” the idea that technology will destroy jobs and lead to disaster. Will AI cause mass unemployment? Probably not, because when it comes to economics, Einstein was no Einstein. The vast majority of economists, including me, do not think that automation was an important cause of the Great Depression. Historically, revolutionary technologies do not generally cause mass unemployment. Of course, it’s always possible that AI will be different due to its rapid introduction. But the big picture is that innovation eventually makes society richer and not poorer.

The AI Edge in Edge Security

As Australian organisations expand into hybrid cloud and edge environments, their attack surface is rapidly growing beyond the traditional perimeter. This byline explores how AI-first, platform-led security enables real-time threat detection at the edge, strengthens Zero Trust enforcement and unifies protection across cloud, OT and endpoints. It argues that intelligent, integrated security architectures are critical to building resilience and meeting evolving regulatory expectations in a borderless digital landscape.

AI Versus AI: Why The Next Cyber Security Battle Will Be Fought By Machines

Artificial intelligence has evolved from being a technical novelty into a powerful business tool with remarkable speed. Companies are embedding generative AI into customer service, software development, and finance operations to unlock efficiency gains and accelerate innovation. However, as adoption deepens, cyber security leaders are confronting a new reality: AI is not just enhancing productivity but also fundamentally reshaping cyber risk. Indeed, as AI becomes both a growth engine and a threat vector, the fundamentals of cyber security will become increasingly important. Cyber resilience will depend on embedding secure-by-design and Zero Trust principles across the enterprise.

Eliminating the Technical Debt Caused by AI-Assisted Software Development

The software development community is experiencing a near ubiquitous usage of AI coding tools as teams face pressure to generate more output in less time. While the huge efficiency gains from the tools help significantly, teams too often fail to incorporate adequate safety controls and practices into AI deployments. Industry leaders are pushing for comprehensive assessments that produce so‑called “trust scores”. These are composite metrics that integrate tool usage, vulnerability data and secure‑coding proficiency to quantify how products and teams influence software‑development lifecycle (SDLC) risk.

No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
Navigating AI with Cyber-Resilient Storage: Use Cases Lead, Infrastructure Enables

Navigating AI with Cyber-Resilient Storage: Use Cases Lead, Infrastructure Enables

This article discusses how intelligent data infrastructure enables AI adoption and innovation while providing robust cybersecurity protection through features like AI-powered ransomware detection and multi-layered security approaches. The piece emphasizes that while use cases drive technology adoption, secure and resilient data infrastructure is the essential foundation that makes AI initiatives viable and protects enterprises from evolving cyber threats. Read More

Security Metrics That Matter

Security Metrics That Matter

Introduction Organisations must move beyond reactive security postures and embrace data-driven decision-making as the sophistication and prevalence of threat actors continues to increase. For ... Read More

Rethinking Cyber Resilience in the Age of AI

Rethinking Cyber Resilience in the Age of AI

AI is transforming both innovation and risk, driving advancements while enabling more sophisticated cyber threats. To achieve true cyber resilience, organizations must shift from passive data storage to intelligent, proactive defense, integrating AI-driven detection and recovery directly into the data layer to anticipate, withstand, and recover from attacks seamlessly. Read More

Cisco’s Bid to Anchor the Agentic Enterprise

Cisco’s Bid to Anchor the Agentic Enterprise

The Shift to Agentic Enterprise AI Artificial Intelligence (AI) now alters the commercial world with a speed that feels less evolutionary and more tectonic. Infrastructure strains, security ... Read More

Inside the DIY Scam Economy

Inside the DIY Scam Economy

Introduction The headquarters of the scam economy have always been elusive, shifting between countries, towns and cities like a shadow. Western Africa, once heralded as a hotbed for digital fraud operations, has now been superseded by Southeast Asia, where hundreds of major scam centres are scattered. The operations of these criminal groups transcend the digital world, securing land to build cities and special economic zones dedicated to crime operations. They’ve set up sophisticated money laundering and human trafficking networks dedicated to staffing operations across Southeast Asia, including scam bases in Cambodia, Laos, ... Read More

Closing the Human Gap in SAP Security: The Case for Cybersecurity Training

Closing the Human Gap in SAP Security: The Case for Cybersecurity Training

Cyber threats are happening at an overwhelming pace, and organizations using SAP systems have become favorite targets for cybercriminals. While specialized tools exist, there is a shortage of skilled professionals with expertise in SAP security. The need for training individuals in this area has never been greater. Read More

Share This