CPI Consulting
  • About
  • Blog
  • Security Health Check
  • BI-Weekly Insights
  • Essential Eight Security
  • AI
  • Microsoft Foundry
  • Fractional CTO
Select Page
Anthropic’s $30 Billion Revenue Run Shows Enterprise AI Demand Is Accelerating Faster Than Expected

Anthropic’s $30 Billion Revenue Run Shows Enterprise AI Demand Is Accelerating Faster Than Expected

by CPI Staff | Apr 7, 2026 | AI for Business & AI Strategy, AI Vendor Selection & Implementation, Blog

When a company that did not exist five years ago hits a $30 billion annualised revenue run rate, it is no longer a startup story. It is a market signal. Anthropic’s reported revenue trajectory — growing from roughly $2 billion in annualised revenue in early 2025...
Why Zero Trust for AI Agents Requires a Different Architecture Than Zero Trust for Users

Why Zero Trust for AI Agents Requires a Different Architecture Than Zero Trust for Users

by CPI Staff | Apr 4, 2026 | AI, AI Agents, Blog

Zero Trust is well understood for users. Verify identity, check device health, enforce least privilege, assume breach. Most mature IT organisations have some version of this in place. AI agents break that model. Not because Zero Trust principles are wrong — but...
Google’s AI Threat Landscape Report Signals Five Risks Every Australian CISO Should Act On Now

Google’s AI Threat Landscape Report Signals Five Risks Every Australian CISO Should Act On Now

by CPI Staff | Apr 3, 2026 | AI, Blog, Google

Google’s Threat Intelligence Group just published one of the most detailed reports to date on how adversaries are using AI to accelerate attacks. For Australian CISOs, five findings demand immediate attention. The GTIG AI Threat Tracker, published in early 2026...
How AI Is Expanding the Attack Surface for Mid-Market Organisations

How AI Is Expanding the Attack Surface for Mid-Market Organisations

by CPI Staff | Apr 2, 2026 | AI, Blog

The attack surface for mid-market organisations has expanded faster than most security strategies have adapted. AI is not just a tool for defenders. It is now an operational accelerator for attackers — and the techniques are not science fiction. Google’s Threat...
The Axios npm Compromise Exposed a Serious Gap in Enterprise Dependency Governance

The Axios npm Compromise Exposed a Serious Gap in Enterprise Dependency Governance

by CPI Staff | Apr 2, 2026 | Application Development, Blog, Cybersecurity, Essential 8

Most organisations still treat dependency management as a developer hygiene issue. The Axios npm compromise shows that assumption is now dangerous. When two malicious Axios versions were published on March 31, 2026, the problem was not limited to a bad package update....
Anthropic’s Claude Code Leak Just Changed the Business Case for AI Coding Tools

Anthropic’s Claude Code Leak Just Changed the Business Case for AI Coding Tools

by CPI Staff | Apr 2, 2026 | AI, AI Coding Agents, Anthropic, Blog, Claude Code, Cybersecurity, Essential 8

The immediate story was easy to misunderstand. On April 1-2 2026, Anthropic confirmed that a Claude Code release packaging issue was caused by human error, not a security breach. Anthropic also said no customer data or credentials were exposed. That matters. But the...
« Older Entries
Next Entries »

Recent Posts

  • How Intune Helps Businesses Control Devices Without Slowing People Down
  • How to Move from Basic Microsoft 365 Setup to a Proper Secure Workplace
  • Why Microsoft 365 Security Is More Than Just Turning on MFA
  • The Intune Policy Gap That Leaves Company Devices Exposed
  • How We Would Secure a Small Business Microsoft 365 Environment in 5 Days
  • The Microsoft 365 Tenant Looked Fine Until We Checked the Security Defaults
  • The Hidden Risk of Unmanaged Devices Accessing Microsoft 365
  • The First 10 Things We Check in a Microsoft 365 Security Review
  • Windows 365 and Intune Advanced Endpoint Management Give Australian IT Teams a Single Device Control Plane
  • Windows 365 and Intune Advanced Endpoint Management Give Australian IT Teams a Single Device Control Plane

Categories

Subscribe

Top Posts

How to Add a Registry Key to Windows 11 Using Microsoft Intune
Updating Microsoft Edge Using Intune
How to Turn Off Windows Hello in Microsoft Intune
Sync SharePoint Site Libraries with Microsoft Intune
How to Deploy a Wiz Outpost to Microsoft Azure
Setting Google Chrome as the Default Browser with Microsoft Intune
Whitelist USB Devices on Windows Using Intune
Create a Custom Extension Attribute Entra ID
Maximizing Security: When to Use Wiz Outpost with Azure
Block Copy Paste from iOS Business Apps with Intune