Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why ANZ Technology Leaders Are Rethinking How AI, Speed, and Security Intersect

The pace of technological change is always fast, but with AI everywhere, things have gone into overdrive. In Australia and New Zealand, businesses plan to spend heavily on generative AI—about $15 million on average, more than the global average. This puts immense pressure on technology, security, and engineering leaders. They must innovate quickly, but they also face complex risks from AI. This is forcing them to rethink how speed and security can work together.

AI Photography: Reshaping Visual Creation Through Intelligent Technology

The emergence of artificial intelligence in photography has fundamentally transformed how we capture, create, and manipulate visual content in the digital age. These sophisticated AI systems can generate photorealistic images from textual descriptions, enhance existing photographs, and even create entirely synthetic visual content that rivals traditional photography methods. Understanding both the revolutionary potential and serious implications of AI photography technology becomes crucial as these tools become increasingly accessible and sophisticated..

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced the release of its new Vishing Simulation module, a cutting-edge tool designed to train employees against one of the fastest-growing attack vectors: voice phishing (vishing). This new module uses AI-generated voices and adaptive dialogue systems to simulate live phone-based social engineering attacks - such as those impersonating IT support desks - in a realistic and scalable way.

Meet the Founders of Protecto: Securing Data for Agentic AI

In this video, we introduce the visionary founders behind Protecto — a company on a mission to make AI safe and compliant for the enterprise era. Amar Kanagaraj, Founder & CEO A second-time entrepreneur, Amar previously led a startup to a successful exit. He began his career as a developer at Sun Microsystems, then went on to lead product management for Microsoft Search & AI. With an MBA from Carnegie Mellon and an MS in Computer Science from LSU, Amar brings a powerful blend of business and technical insight to Protecto.

Lockdown Android Tablet for Business with miniOrange MDM

Thinking of using Android tablets for your business? Great choice—but unmanaged tablets can lead to data risks and distractions. In this blog, we’ll walk you through how to lockdown Android tablets using a Mobile Device Management (MDM) solution. Whether you are running a retail store, managing field staff, or setting up kiosks, learn how to restrict tablets to only business apps and tasks.

Shadow AI: Examples, Risks, and 8 Ways to Mitigate Them

Shadow AI refers to the unauthorized or unmanaged use of AI tools, models, frameworks, APIs or platforms within an organization, operating outside established governance frameworks. While employees may adopt these AI tools with good intentions, seeking to enhance productivity or solve problems more efficiently, the lack of oversight creates significant security, compliance, and operational risks.

What Is AI?

What is AI really? Throughout this article, I will remove the hype and get to the most honest answer ever. Artificial Intelligence, or AI, or at least the first version of how we think of it today, was “invented” in the 1950s…a long time ago. Since then, various computer scientists and groups have worked on different iterations, often using different names, including machine learning and neural networks.

theNET's Trending Stories: Security for an AI-powered, quantum-enhanced era

Tech leaders are racing to adopt today’s AI tools and envisioning ways to capitalize on tomorrow’s quantum computers. But cybercriminals are a few steps ahead. This month, theNET examines ways to make the most of AI agents while augmenting security with AI-enhanced solutions and safeguarding data with post-quantum cryptography.