Dumping Ground
Start:
Start:
End:

Register

Editors Pick

How ‘Verified Trust’ Is Redefining Digital Authentication in the Age of AI

When verified trust becomes embedded in every interaction, authentication transforms from a barrier into an enabler. It delivers not only protection against fraud and impersonation but also the confidence that underpins long-term relationships.

What Einstein would say about AI

Einstein was talking about the concept of “technological unemployment,” the idea that technology will destroy jobs and lead to disaster. Will AI cause mass unemployment? Probably not, because when it comes to economics, Einstein was no Einstein. The vast majority of economists, including me, do not think that automation was an important cause of the Great Depression. Historically, revolutionary technologies do not generally cause mass unemployment. Of course, it’s always possible that AI will be different due to its rapid introduction. But the big picture is that innovation eventually makes society richer and not poorer.

The AI Edge in Edge Security

As Australian organisations expand into hybrid cloud and edge environments, their attack surface is rapidly growing beyond the traditional perimeter. This byline explores how AI-first, platform-led security enables real-time threat detection at the edge, strengthens Zero Trust enforcement and unifies protection across cloud, OT and endpoints. It argues that intelligent, integrated security architectures are critical to building resilience and meeting evolving regulatory expectations in a borderless digital landscape.

AI Versus AI: Why The Next Cyber Security Battle Will Be Fought By Machines

Artificial intelligence has evolved from being a technical novelty into a powerful business tool with remarkable speed. Companies are embedding generative AI into customer service, software development, and finance operations to unlock efficiency gains and accelerate innovation. However, as adoption deepens, cyber security leaders are confronting a new reality: AI is not just enhancing productivity but also fundamentally reshaping cyber risk. Indeed, as AI becomes both a growth engine and a threat vector, the fundamentals of cyber security will become increasingly important. Cyber resilience will depend on embedding secure-by-design and Zero Trust principles across the enterprise.

No results found.
No results found.
No results found.
No results found.
No results found.
No results found.
Navigating AI with Cyber-Resilient Storage: Use Cases Lead, Infrastructure Enables

Navigating AI with Cyber-Resilient Storage: Use Cases Lead, Infrastructure Enables

This article discusses how intelligent data infrastructure enables AI adoption and innovation while providing robust cybersecurity protection through features like AI-powered ransomware detection and multi-layered security approaches. The piece emphasizes that while use cases drive technology adoption, secure and resilient data infrastructure is the essential foundation that makes AI initiatives viable and protects enterprises from evolving cyber threats. Read More

Security Metrics That Matter

Security Metrics That Matter

Introduction Organisations must move beyond reactive security postures and embrace data-driven decision-making as the sophistication and prevalence of threat actors continues to increase. For ... Read More

Rethinking Cyber Resilience in the Age of AI

Rethinking Cyber Resilience in the Age of AI

AI is transforming both innovation and risk, driving advancements while enabling more sophisticated cyber threats. To achieve true cyber resilience, organizations must shift from passive data storage to intelligent, proactive defense, integrating AI-driven detection and recovery directly into the data layer to anticipate, withstand, and recover from attacks seamlessly. Read More

Cisco’s Bid to Anchor the Agentic Enterprise

Cisco’s Bid to Anchor the Agentic Enterprise

The Shift to Agentic Enterprise AI Artificial Intelligence (AI) now alters the commercial world with a speed that feels less evolutionary and more tectonic. Infrastructure strains, security ... Read More

Why Identity Security Is Breaking Under the Weight of Silos

Why Identity Security Is Breaking Under the Weight of Silos

Identity has become the connective tissue of the modern enterprise, and the connective tissue of modern attacks. As digital environments grow more complex and AI-driven identities multiply, the cost of managing identity security in silos will only rise. Read More

Inside the DIY Scam Economy

Inside the DIY Scam Economy

Introduction The headquarters of the scam economy have always been elusive, shifting between countries, towns and cities like a shadow. Western Africa, once heralded as a hotbed for digital fraud operations, has now been superseded by Southeast Asia, where hundreds of major scam centres are scattered. The operations of these criminal groups transcend the digital world, securing land to build cities and special economic zones dedicated to crime operations. They’ve set up sophisticated money laundering and human trafficking networks dedicated to staffing operations across Southeast Asia, including scam bases in Cambodia, Laos, ... Read More

Share This