Latest Advisory

VENDORiQ: Inception’s Diffusion Mercury Models: Is it time for the big game?
Inception’s updates to Mercury models, including a larger context window, tool calling, and data privacy controls, make them a viable enterprise-grade alternative.

VENDORiQ: Inception’s Diffusion Mercury Models: Is it time for the big game?
Inception’s updates to Mercury models, including a larger context window, tool calling, and data privacy controls, make them a viable enterprise-grade alternative.

VENDORiQ: KKR to Acquire VMware’s End-User Computing Division from Broadcom
Uncover the effects of KKR’s acquisition of VMware’s End User Computer (EUC) Division on product development and market competition in the tech industry.

Essential Eight is Not a Complete Cyber Strategy
The Essential Eight is what it advertises – eight key mitigation strategies that work together primarily to prevent and limit cyber incidents. It has rightly become a widely adopted baseline for Australian organisations in and beyond the public sector. But it explicitly states that it is not a complete security strategy, and this assertion is correct. Organisations need to understand what Essential Eight does and does not cover, and use this to plan their next steps.

Content Cognition to the Rescue Whitepaper
In our era of digital revolution, the surge in information, termed ‘information hyperinflation’, poses unprecedented challenges.

The Australian Government Cyber Security Strategy – How Will it Impact Your Organisation?
In November 2023, the Federal Government released the 2023–2030 Australian Cyber Security Strategy. How will it impact your organisation?

How AI Transforms DevOps: From Silos to Synergy
Is your dev team set for the fast lane?

Learning and Development for the Introduction of New Technology (Part 2)
Following ‘Learning and Development for the Introduction of New Technology’, IBRS looks into the necessity of incorporating learning and development programs into all user acceptance testing processes for new solutions.