Latest Advisory

The Mythos Manifesto: Anthropic’s High-Stakes AI Cyberwar – AFR Apr 8 2026
Anthropic’s Claude Mythos detects critical vulnerabilities effectively, yet risks overwhelming security teams without automated patching, creating potential national security bottlenecks.

The Mythos Manifesto: Anthropic’s High-Stakes AI Cyberwar – AFR Apr 8 2026
Anthropic’s Claude Mythos detects critical vulnerabilities effectively, yet risks overwhelming security teams without automated patching, creating potential national security bottlenecks.

Why SIAM Expands Beyond ITSM and Who Needs to Know
Have an outsourced, integrated, multi-vendor IT delivery model? Then ITSM is not enough to ensure you have a smooth running environment during critical events.

How to Develop an Effective Information Architecture
How many organisations are carrying technical debt in their holding of information. Do they need to hold the information they do, is it accessible, and are they in breach of the law holding information that is no longer needed? This advisory paper will assess how organisations can solve this problem.

Startup CIO Shares Proven Strategies for IT Leaders
Veteran CIO Sourav Sinha shares proven strategies for enterprise IT leaders to align and streamline their technology with business needs, based on his experience at a startup.

VENDORiQ: Graph-Based Retrieval-Augmented Generation: Business Impact of GraphRAG Release
Earlier this year, GraphRAG transformed retrieval-augmented generation (RAG) with its graph-based approach for question-answering over private datasets. Now, Microsoft has made GraphRAG available on GitHub, offering a user-friendly API on Azure—ready to enhance your AI-powered RAG projects. Interested in exploring its capabilities?

Leveraging Password Managers Successfully
Passwords will be in use for a long time yet. Make sure good practices are in place for their use.

Data Egress from Enterprises
Sensitive information should be kept confidential and not readily accessible. How can enterprises know what data is leaving, where it’s going, and who has access to it? IBRS outlines solutions to prevent data leaks and ensure external information security.