Latest Advisory

Implementing Values-Driven AI: CEnet’s CEChat Allows Schools to Create & Deploy Safe AI Agents at Scale
CEnet’s ‘cechat’ platform scales values-driven AI through a subsidiarity-based architecture, balancing national safety guardrails with local pedagogical autonomy for schools.

Implementing Values-Driven AI: CEnet’s CEChat Allows Schools to Create & Deploy Safe AI Agents at Scale
CEnet’s ‘cechat’ platform scales values-driven AI through a subsidiarity-based architecture, balancing national safety guardrails with local pedagogical autonomy for schools.

Core, Shared, or Local – Know Your System
Clarity around which are core, shared, and local IT systems, and the implications that follow from this, empowers IT teams to maximise their impact against money, time, and effort.

Cyber Security Update for Executives and Boards – Presentation Kit
In the aftermath of the Optus breach, organisations are likely to see increased regulation and penalties in cases where private information in their possession has not been adequately protected.

Modernising Enterprise Learning: Fundamentals (Part 1)
Just because staff members remember something, does not mean they will act upon it. Successful task-oriented instruction can only be realised if learners have the opportunity to immediately apply it to their day-to-day work, and receive timely, staged feedback.

Hybrid CMS: Traditional Meets Headless CMS (Part 1 of 2)
While a pure headless content management system (CMS) has several advantages over traditional CMS, enterprises may be better served by a more traditional CMS that has some aspects of headless added, i.e., a hybrid CMS. IBRS explores how such a hybrid CMS can provide many of the benefits of headless, without the complexity, to support future digital content delivery strategies.

Voice Biometrics as a Component of Multi-Factor Authentication (MFA)
As many enterprises recognise the advantages of biometric authentication over traditional call centre verification methods, biometric voice recognition is increasing in popularity as a secondary source of identification due to its speed and user-friendliness.

The Customer Identity and Access Management (CIAM) Guide for the Enterprise: Consumer Trends (Part 1 of 4)
Digital customer convenience remains a top priority among users even if consumers acknowledge the necessity of defending their personal information against malicious actors. How have customer perceptions evolved to what they are today, and what can be done to influence better identity and access management practices among enterprises?