Researchers at Cyata, an agentic identity specialist that has just emerged from stealth, found 14 CVEs in the widely used...more
What is enterprise risk management (ERM)?
Enterprise risk management (ERM) is the process of planning, organizing, directing and controlling the activities of an organization to minimize...more
Breaking Down Data Silos in the Age of AI: How Hitachi Vantara Sees The A/NZ Opportunity Evolving
Tame your data, unleash AI potential
Health expands cloud footprint with $32m Azure deal
Signed via the government's Microsoft volume sourcing arrangement.
Cyber criminals would prefer businesses don’t use Okta
Okta details a phishing campaign in which the threat actor demonstrated some unusually strong opinions on what authentication methods they...more
Companies House ID verification to start in November 2025
Companies House plans to start vetting director identities from the middle of November, but its reliance on the troubled One...more
NCSC updates CNI Cyber Assessment Framework
Updates to the NCSC’s Cyber Assessment Framework are designed to help critical services providers better manage their risk profiles.
US comms on verge of tipping point
Research from PwC finds that from fibre roll-outs to 5G breakthroughs, America’s broadband and mobile markets are undergoing major shifts,...more
AerFlex takes flight as first cloud-controlled AP-only private 5G platform
‘Breakthrough’ architecture claimed to be designed to eliminate deployment complexity without compromising security, performance or control
OpenAI now offers open AI models, but CIOs need to assess the risk
Open models offer enterprise IT a way to build tailored LLMs trained on corporate content. Open AI is now offering...more
















