Western Australian local governments are failing to fix known IT security weaknesses, with 60 per cent of control flaws identified in 2025 carrying over unresolved from prior years.
Turning meeting transcripts into automated task lists is the promise behind HiNotes 3.0, a significant update from HiDock that repositions its note-taking platform from passive transcription toward post-meeting workflow management.
When AI agents start taking actions rather than merely answering questions, the integrity of their knowledge source becomes a compliance problem. Knowledge management vendor eGain has released a set of platform connectors designed to anchor Microsoft Copilot, Anthropic Claude, Google Gemini CLI, and the Cursor developer environment to a single governed knowledge repository.
AI knowledge management vendor Docsie has released a fully on-premise platform that runs entirely on customer-owned hardware and customer-controlled language models. The company says it is responding to a growing unwillingness among regulated enterprises to route sensitive data through third-party cloud infrastructure.
Enterprises deploying autonomous AI agents have a governance problem that traditional identity and access management was never designed to solve - and identity vendor Ping Identity is targeting that gap with a new product suite aimed at controlling what AI agents do at the moment they act.
WM New Zealand has deployed Fivetran to centralise operational, SaaS and high-volume IoT data into Snowflake, aiming to underpin AI and analytics across its fleet and waste management operations.
Insurance technology provider ICE-Tech has integrated intelligent document processing technology from TCG Process into its Alice software platform, automating the ingestion, validation and routing of unstructured content — including emails and attachments — across policy issuance, claims and mid-term adjustment workflows.
Copilot Cowork is Microsoft’s new cloud-based AI agent built with Anthropic's Claude technology that can plan, execute, and deliver multi-step work across Outlook, Teams, Excel, PowerPoint, and SharePoint on a user's behalf.
As someone working at the intersection of cybersecurity and public sector technology, I’ve long respected the Essential Eight framework developed by the Australian Cyber Security Centre (ACSC). It’s practical, actionable, and has helped lift the security posture across government agencies and critical infrastructure. But the world has changed. And so must our approach.
When most people think about the internet, they likely picture websites and apps. What they rarely see are the invisible services that make those experiences possible: systems that translate names into numbers, verify who you are, deliver messages and block malicious traffic.