CPI Consulting
  • About
  • Blog
  • BI-Weekly Insights
  • Microsoft Intune & Essential Eight Security
  • AI
  • Microsoft Foundry
  • Fractional CTO
Select Page
GitHub Agents with Codex and Claude Cut PR Rework and Security Bugs

GitHub Agents with Codex and Claude Cut PR Rework and Security Bugs

by CPI Staff | Mar 1, 2026 | Blog

In this blog post GitHub Agents with Codex and Claude Cut PR Rework and Security Bugs we will walk through what “GitHub Agents” are, how Codex and Claude Code fit into pull requests (PRs), and the practical ways they reduce rework and security bugs without slowing...
AI Export Controls Are a Board-Level Risk for Australian Firms

AI Export Controls Are a Board-Level Risk for Australian Firms

by CPI Staff | Mar 1, 2026 | AI, Blog

In this blog post AI Export Controls Are a Board-Level Risk for Australian Firms we will explain why AI export controls have moved from “someone else’s problem” to a real board-level risk, and what Australian IT and engineering leaders can do about it. If you’re...
GitHub Agents Make Copilot a Real Dev Team Asset with Codex and Claude

GitHub Agents Make Copilot a Real Dev Team Asset with Codex and Claude

by CPI Staff | Mar 1, 2026 | Blog

In this blog post GitHub Agents Make Copilot a Real Dev Team Asset with Codex and Claude we will unpack what GitHub Agents are, why they matter, and how to use them safely so your team ships faster without creating new security or quality risks. If you’ve tried...
Your Competitor Just Hired an AI Employee And It Works 24/7

Your Competitor Just Hired an AI Employee And It Works 24/7

by CPI Staff | Mar 1, 2026 | AI, Blog

In this blog post Your Competitor Just Hired an AI Employee And It Works 24/7 we will explain what an “AI employee” really is, why it’s suddenly working in real businesses, and how to build one safely on Microsoft and modern AI platforms. If you’ve had that...
DeepSeek, Moonshot and MiniMax Caught Copying Claude What Anthropic Used

DeepSeek, Moonshot and MiniMax Caught Copying Claude What Anthropic Used

by CPI Staff | Feb 24, 2026 | AI, Anthropic, Blog, Claude

In this blog post DeepSeek, Moonshot and MiniMax Caught Copying Claude What Anthropic Used we will unpack what actually happened, how Anthropic says it proved the copying, and the practical lessons for IT leaders and engineering teams deploying AI in real products. If...
AI Recommendation Poisoning How Attackers Skew What Your AI Suggests

AI Recommendation Poisoning How Attackers Skew What Your AI Suggests

by CPI Staff | Feb 23, 2026 | AI, Blog, Cybersecurity

In this blog post AI Recommendation Poisoning How Attackers Skew What Your AI Suggests we will walk through what recommendation poisoning is, why it’s becoming a real-world risk, and what practical steps you can take to reduce the chance your AI gets “nudged” into...
« Older Entries
Next Entries »

Recent Posts

  • Why Microsoft 365 Security Is More Than Just Turning on MFA
  • The Intune Policy Gap That Leaves Company Devices Exposed
  • How We Would Secure a Small Business Microsoft 365 Environment in 5 Days
  • The Microsoft 365 Tenant Looked Fine Until We Checked the Security Defaults
  • The Hidden Risk of Unmanaged Devices Accessing Microsoft 365
  • The First 10 Things We Check in a Microsoft 365 Security Review
  • Windows 365 and Intune Advanced Endpoint Management Give Australian IT Teams a Single Device Control Plane
  • Windows 365 and Intune Advanced Endpoint Management Give Australian IT Teams a Single Device Control Plane
  • INC Ransom’s Active Campaign Across Australia Shows Why Essential 8 ML2 Is No Longer Optional
  • Microsoft Teams Helpdesk Impersonation Attacks Are Rising. Here’s What Australian IT Teams Should Change This Week

Categories

Subscribe

Top Posts

How to Add a Registry Key to Windows 11 Using Microsoft Intune
Updating Microsoft Edge Using Intune
How to Turn Off Windows Hello in Microsoft Intune
Sync SharePoint Site Libraries with Microsoft Intune
How to Deploy a Wiz Outpost to Microsoft Azure
Setting Google Chrome as the Default Browser with Microsoft Intune
Whitelist USB Devices on Windows Using Intune
Create a Custom Extension Attribute Entra ID
Maximizing Security: When to Use Wiz Outpost with Azure
Block Copy Paste from iOS Business Apps with Intune