CPI Consulting
  • About
  • Blog
  • BI-Weekly Insights
  • Microsoft Intune & Essential Eight Security
  • AI
  • Microsoft Foundry
  • Fractional CTO
Select Page
Google’s AI Threat Landscape Report Signals Five Risks Every Australian CISO Should Act On Now

Google’s AI Threat Landscape Report Signals Five Risks Every Australian CISO Should Act On Now

by CPI Staff | Apr 3, 2026 | AI, Blog, Google

Google’s Threat Intelligence Group just published one of the most detailed reports to date on how adversaries are using AI to accelerate attacks. For Australian CISOs, five findings demand immediate attention. The GTIG AI Threat Tracker, published in early 2026...
How AI Is Expanding the Attack Surface for Mid-Market Organisations

How AI Is Expanding the Attack Surface for Mid-Market Organisations

by CPI Staff | Apr 2, 2026 | AI, Blog

The attack surface for mid-market organisations has expanded faster than most security strategies have adapted. AI is not just a tool for defenders. It is now an operational accelerator for attackers — and the techniques are not science fiction. Google’s Threat...
The Axios npm Compromise Exposed a Serious Gap in Enterprise Dependency Governance

The Axios npm Compromise Exposed a Serious Gap in Enterprise Dependency Governance

by CPI Staff | Apr 2, 2026 | Application Development, Blog, Cybersecurity, Essential 8

Most organisations still treat dependency management as a developer hygiene issue. The Axios npm compromise shows that assumption is now dangerous. When two malicious Axios versions were published on March 31, 2026, the problem was not limited to a bad package update....
Anthropic’s Claude Code Leak Just Changed the Business Case for AI Coding Tools

Anthropic’s Claude Code Leak Just Changed the Business Case for AI Coding Tools

by CPI Staff | Apr 2, 2026 | AI, AI Coding Agents, Anthropic, Blog, Claude Code, Cybersecurity, Essential 8

The immediate story was easy to misunderstand. On April 1-2 2026, Anthropic confirmed that a Claude Code release packaging issue was caused by human error, not a security breach. Anthropic also said no customer data or credentials were exposed. That matters. But the...
OpenAI’s Superapp Strategy Signals Platform Lock-In at Scale

OpenAI’s Superapp Strategy Signals Platform Lock-In at Scale

by CPI Staff | Apr 1, 2026 | AI, Blog, OpenAI

Most enterprise leaders still think of ChatGPT as a chatbot. OpenAI is building something far more consequential — and the implications for vendor strategy deserve serious attention. On March 31, 2026, OpenAI announced a $122 billion funding round at an $852 billion...
How OpenAI’s New Safety Program Changes Enterprise AI Risk Profiles

How OpenAI’s New Safety Program Changes Enterprise AI Risk Profiles

by CPI Staff | Mar 31, 2026 | Blog

On 25 March 2026, OpenAI launched a public Safety Bug Bounty program — a dedicated program for identifying AI safety and abuse risks that sit outside the scope of traditional security vulnerabilities. It covers prompt injection, agentic risks, data exfiltration, and...
« Older Entries
Next Entries »

Recent Posts

  • Why Microsoft 365 Security Is More Than Just Turning on MFA
  • The Intune Policy Gap That Leaves Company Devices Exposed
  • How We Would Secure a Small Business Microsoft 365 Environment in 5 Days
  • The Microsoft 365 Tenant Looked Fine Until We Checked the Security Defaults
  • The Hidden Risk of Unmanaged Devices Accessing Microsoft 365
  • The First 10 Things We Check in a Microsoft 365 Security Review
  • Windows 365 and Intune Advanced Endpoint Management Give Australian IT Teams a Single Device Control Plane
  • Windows 365 and Intune Advanced Endpoint Management Give Australian IT Teams a Single Device Control Plane
  • INC Ransom’s Active Campaign Across Australia Shows Why Essential 8 ML2 Is No Longer Optional
  • Microsoft Teams Helpdesk Impersonation Attacks Are Rising. Here’s What Australian IT Teams Should Change This Week

Categories

Subscribe

Top Posts

How to Add a Registry Key to Windows 11 Using Microsoft Intune
Updating Microsoft Edge Using Intune
How to Turn Off Windows Hello in Microsoft Intune
Sync SharePoint Site Libraries with Microsoft Intune
How to Deploy a Wiz Outpost to Microsoft Azure
Setting Google Chrome as the Default Browser with Microsoft Intune
Whitelist USB Devices on Windows Using Intune
Create a Custom Extension Attribute Entra ID
Maximizing Security: When to Use Wiz Outpost with Azure
Block Copy Paste from iOS Business Apps with Intune