CPI Consulting
  • About
  • Blog
  • BI-Weekly Insights
  • Microsoft Intune & Essential Eight Security
  • AI
  • Microsoft Foundry
  • Fractional CTO
Select Page
Anthropic’s $30 Billion Revenue Run Shows Enterprise AI Demand Is Accelerating Faster Than Expected

Anthropic’s $30 Billion Revenue Run Shows Enterprise AI Demand Is Accelerating Faster Than Expected

by CPI Staff | Apr 7, 2026 | AI for Business & AI Strategy, AI Vendor Selection & Implementation, Blog

When a company that did not exist five years ago hits a $30 billion annualised revenue run rate, it is no longer a startup story. It is a market signal. Anthropic’s reported revenue trajectory — growing from roughly $2 billion in annualised revenue in early 2025...
Why Zero Trust for AI Agents Requires a Different Architecture Than Zero Trust for Users

Why Zero Trust for AI Agents Requires a Different Architecture Than Zero Trust for Users

by CPI Staff | Apr 4, 2026 | AI, AI Agents, Blog

Zero Trust is well understood for users. Verify identity, check device health, enforce least privilege, assume breach. Most mature IT organisations have some version of this in place. AI agents break that model. Not because Zero Trust principles are wrong — but...
Google’s AI Threat Landscape Report Signals Five Risks Every Australian CISO Should Act On Now

Google’s AI Threat Landscape Report Signals Five Risks Every Australian CISO Should Act On Now

by CPI Staff | Apr 3, 2026 | AI, Blog, Google

Google’s Threat Intelligence Group just published one of the most detailed reports to date on how adversaries are using AI to accelerate attacks. For Australian CISOs, five findings demand immediate attention. The GTIG AI Threat Tracker, published in early 2026...
How AI Is Expanding the Attack Surface for Mid-Market Organisations

How AI Is Expanding the Attack Surface for Mid-Market Organisations

by CPI Staff | Apr 2, 2026 | AI, Blog

The attack surface for mid-market organisations has expanded faster than most security strategies have adapted. AI is not just a tool for defenders. It is now an operational accelerator for attackers — and the techniques are not science fiction. Google’s Threat...
The Axios npm Compromise Exposed a Serious Gap in Enterprise Dependency Governance

The Axios npm Compromise Exposed a Serious Gap in Enterprise Dependency Governance

by CPI Staff | Apr 2, 2026 | Application Development, Blog, Cybersecurity, Essential 8

Most organisations still treat dependency management as a developer hygiene issue. The Axios npm compromise shows that assumption is now dangerous. When two malicious Axios versions were published on March 31, 2026, the problem was not limited to a bad package update....
« Older Entries
Next Entries »

Recent Posts

  • The Axios Supply Chain Attack Hit OpenAI’s Signing Pipeline. What Every Organisation Should Learn About Dependency Governance
  • Meta Muse Spark Promises “Personal Superintelligence.” Three Questions Every CIO Should Ask First
  • What Claude Managed Agents Means for Enterprise AI Governance and Vendor Risk
  • AI-Powered Device Code Phishing Now Bypasses MFA — What Australian Organisations Must Do Next
  • Anthropic, OpenAI, and Google Are All Locking In Enterprise Customers. How to Manage Vendor Risk
  • Anthropic’s $30 Billion Revenue Run Shows Enterprise AI Demand Is Accelerating Faster Than Expected
  • Why Zero Trust for AI Agents Requires a Different Architecture Than Zero Trust for Users
  • Google’s AI Threat Landscape Report Signals Five Risks Every Australian CISO Should Act On Now
  • How AI Is Expanding the Attack Surface for Mid-Market Organisations
  • The Axios npm Compromise Exposed a Serious Gap in Enterprise Dependency Governance

Categories

Subscribe

Top Posts

How to Add a Registry Key to Windows 11 Using Microsoft Intune
Updating Microsoft Edge Using Intune
How to Turn Off Windows Hello in Microsoft Intune
Sync SharePoint Site Libraries with Microsoft Intune
How to Deploy a Wiz Outpost to Microsoft Azure
Setting Google Chrome as the Default Browser with Microsoft Intune
Whitelist USB Devices on Windows Using Intune
Create a Custom Extension Attribute Entra ID
Maximizing Security: When to Use Wiz Outpost with Azure
Block Copy Paste from iOS Business Apps with Intune