Australia Tech News - Page 6 of 171 - Techbest - Top Tech Reviews In Australia

Super Funds Collaborate to Improve Cyber Threat Response Throughout the Industry


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Brief Overview

  • ASFA requests ACCC authorization for a platform to share threat intelligence aimed at tackling cyber threats.
  • The Superannuation Cyber and Financial Crime Exchange (SuperFCX) is integral to the SC3 framework.
  • A recent cyber incident affecting major super funds emphasized the necessity for enhanced communication within the sector.
  • ASFA seeks to avert leaks of competitive intelligence while bolstering sector security.
  • Feedback on the application is due by April 27, 2025.

ASFA’s Submission to ACCC for Cyber Threat Intelligence Sharing

Super funds look to coordinate sector's cyber threat response

The Association of Superannuation Funds of Australia (ASFA) has approached the Australian Competition and Consumer Commission (ACCC) for authorization to create a specialized platform for threat intelligence sharing. This initiative follows a series of cyber attacks that impacted the sector last year, highlighting the urgency for a cohesive approach.

The Suggested Superannuation Cyber and Financial Crime Exchange

ASFA’s plan includes the establishment of the Superannuation Cyber and Financial Crime Exchange (SuperFCX), a platform intended to promote the sharing of threat intelligence among its members. The focus will be on disseminating information regarding threat patterns, strategies, and technical indicators, while specifically excluding any data that may influence competitive factors such as pricing or business strategy.

Framework and Coordination Activities

SuperFCX is part of the overall SC3 framework, which seeks to bolster the superannuation sector’s capacity to respond to cyber threats through four essential pillars. ASFA is also developing a sector incident response guide and intends to carry out sector response drills to enhance coordination during cyber events.

Insights from the April 2025 Cyberattacks

The call for a synchronized threat intelligence platform follows a major credential-stuffing attack in April 2025. Prominent super funds such as AustralianSuper and Hostplus were targeted, resulting in financial losses and illustrating communication shortcomings that the SC3 intends to rectify.

Filling Communication Gaps

Mary Delahunty, CEO of ASFA, remarked on the lack of a reliable communication channel during the attacks, which led to uneven information dissemination and increased member anxiety. The SC3 framework strives to resolve these challenges by establishing a coordinated response system.

Concerns Surrounding AI and Sector Resilience

Delahunty also raised issues regarding the potential exploitation of AI models, referencing Anthropic’s choice not to deploy its latest model because of possible cybercrime threats. The superannuation sector must heed similar alerts to protect sensitive customer information.

Comparison with AFCX

SuperFCX is similar to the Australian Financial Crimes Exchange (AFCX), launched in 2016 as a cooperative, real-time intelligence-sharing platform among financial institutions.

Conclusion

ASFA’s initiative to create a dedicated threat intelligence sharing platform aims to reinforce the superannuation sector’s response to cyber threats. By seeking ACCC approval, ASFA aspires to cultivate an environment of collaboration where threat trends and intelligence can be exchanged securely, without compromising competitive positions.

Q: What is the Superannuation Cyber and Financial Crime Exchange?

A: SuperFCX is a proposed platform by ASFA to enable superannuation funds to exchange threat intelligence to enhance cyber threat responses.

Q: Why does ASFA require ACCC approval?

A: ACCC approval is needed to ensure that the intelligence-sharing platform doesn’t violate the Competition and Consumer Act.

Q: What led ASFA to put forth this proposal?

A: A notable cyber incident in April 2025 highlighted the necessity for better communication and coordination within the superannuation sector.

Q: In what ways does SuperFCX relate to AFCX?

A: SuperFCX is akin to AFCX in that both are intelligence-sharing platforms aimed at improving sector security through collaboration.

Q: What are the main exclusions in the intelligence-sharing process?

A: Competitive data such as pricing, profit margins, and business strategies are excluded to prevent leaks of competitive intelligence.

Q: When is the deadline for ACCC submissions?

A: Submissions regarding ASFA’s application to the ACCC are due by April 27, 2025.

Aussie Companies Confront Up to 130% Increase in Hardware Expenses Due to ‘RAMaggeddon’ Emergency


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Quick Read

  • Australian companies are experiencing a 130% increase in hardware expenses because of ‘RAMaggeddon’.
  • The demand for DRAM and flash memory is driven by AI infrastructure requirements.
  • Prices for servers and SSDs have risen significantly, leading to financial difficulties.
  • Infrastructure lead times have stretched to more than five months, hindering project timelines.
  • AI requirements are reallocating resources from conventional enterprise components.
  • Firms are encouraged to prolong asset lifecycles and explore cloud solutions.

The emergence of RAMaggeddon

The technology sector is witnessing ‘RAMaggeddon’, a term that illustrates the acute shortage of Dynamic Random Access Memory (DRAM) and flash storage. This predicament is exacerbated by hyperscalers and AI firms utilizing the available chips for language models, leading to constrained resources in other markets. Consequently, Australian companies are facing rising costs and supply challenges.

Impact on hardware pricing in the real world

Hardware costs are soaring, with server prices climbing 50 to 100% since late 2025. The situation is even more dire for SSD storage, where costs have surged between 75 and 150%. This market instability complicates procurement planning, as vendors provide quotes with limited validity amidst the rapidly changing landscape.

Lead times and the waiting game

In addition to costs, prolonged lead times for essential infrastructure are causing major interruptions. Delays exceeding five months are influencing digital transformation initiatives, creating friction between long-term strategies and immediate price fluctuations, a trend referred to as innovation inflation.

The AI surge is straining your IT budget

The increase in demand for generative AI is altering priorities for chip manufacturers. The necessity for high-bandwidth memory for AI training is diverting resources from traditional hardware. This structural change is unlikely to reverse in the near future, as AI leaders are prepared to pay higher prices, marginalizing conventional markets.

Procurement strategies are shifting

Organizations are reevaluating their procurement approaches, shifting towards modeled consumption and extending the lifespan of assets. Resilience and security have taken precedence over routine replacements, emphasizing the need to maintain stable and future-proof environments without incurring excessive costs.

Impacts on Australian consumers

Rising hardware prices not only affect technology departments but also consumers. Industries like healthcare, government, and finance are facing increased infrastructure expenses, which influence the quality of services offered. Companies are now prioritizing stability over acquiring the latest technologies.

“RAMaggeddon, the critical DRAM (Dynamic Random Access Memory) and flash scarcity driven by AI infrastructure demand, has propelled component prices to unprecedented levels.”Alex Coates, Chief Executive Officer, Interactive.

Strategies to navigate the crisis

Organizations approaching a hardware renewal cycle should assess their actual needs versus desires. Considering cloud and hybrid solutions can help mitigate the need for immediate hardware investments. It’s essential to foresee lead times and commence procurement discussions proactively to prevent delays.

For additional details, visit https://www.interactive.com.au

Conclusion

The ‘RAMaggeddon’ dilemma is leading Australian companies to confront unparalleled hardware cost increases due to shortages of DRAM and SSDs stemming from AI demand. This disruption necessitates strategic procurement adjustments and meticulous planning to navigate the unstable market.

Q: What factors are driving the increase in hardware costs?

A: The increase is attributed to ‘RAMaggeddon’, an acute shortage of DRAM and flash storage due to AI infrastructure requirements.

Q: What is the extent of the hardware price increases?

A: Server costs have surged by 50 to 100%, while SSD storage expenses have escalated by 75 to 150%.

Q: In what ways are lead times affecting projects?

A: Lead times for infrastructure have extended to over five months, causing delays in digital transformation projects and creating a cascading effect.

Q: How is the AI boom affecting traditional enterprise components?

A: The demand for high-bandwidth memory for AI is reallocating resources from traditional components, resulting in increased costs and resource availability problems.

Q: What procurement approaches are businesses implementing?

A: Organizations are concentrating on prolonging asset lifespans and considering cloud alternatives to manage expenses and ensure stability.

Q: How does this crisis influence consumers?

A: Rising hardware costs impact service quality in sectors like healthcare and banking, which ultimately affects consumers.

Q: What measures can businesses take to alleviate the situation?

A: Companies should review their requirements, investigate cloud options, and initiate procurement discussions early to manage lead times effectively.

South32 Initiates Legal Proceedings Against Siemens Regarding Supposed Software Flaw


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

South32 Files Lawsuit Against Siemens Over Alleged Software Issue

Brief Overview

  • South32 Aluminium has initiated a lawsuit against Siemens over a purported software flaw that reportedly led to the destruction of a steam turbine generator.
  • The incident took place in 2015 at the Worsley Alumina power facility in Western Australia.
  • A claimed omission of code within a programmable logic controller is said to have resulted in the overheating.
  • Siemens counters that the work was executed by Siemens Industrial Turbomachinery, a distinct entity.
  • The Federal Court has mandated Siemens to provide relevant documents and emails associated with the case.

South32 Initiates Legal Proceedings Against Siemens

South32 Aluminium has filed a lawsuit against Siemens following claims of the destruction of a steam turbine generator owing to a software defect. This legal action, initiated in late 2021, stems from an occurrence in October 2015 at a power facility in Worsley, Western Australia. South32 alleges that the generator was rendered inoperable due to an absent piece of code within a programmable logic controller, leading to overheating.

South32 initiates lawsuit against Siemens over alleged software issue

Incident Details

The Worsley Alumina operation, a major bauxite mining and alumina refining location in the southwest of Western Australia, was where the incident transpired. An investigation by South32 unveiled that the absent code in the programmable logic controller was vital for activating the generator circuit breaker, which could have averted the overheating.

Siemens’ Response

Siemens has asserted its defense by stating that while it was contracted for the work, the responsibilities in question were managed by Siemens Industrial Turbomachinery, now part of Siemens Energy. Siemens maintains that it bears no responsibility for the actions of this separate entity related to non-contractual claims.

Legal Proceedings

A procedural complication arose in the court process when South32 sought to obtain documents from Siemens during the discovery period. Siemens opposed this, contending that the documents were managed by Siemens Industrial Turbomachinery. Federal Court Justice Roger Derrington criticized Siemens for not fulfilling its discovery responsibilities and commanded them to deliver the necessary documents and emails, as well as cover South32’s legal fees.

Siemens has until May 8 to comply with the court’s orders.

Conclusion

This legal battle between South32 and Siemens underscores the vital importance of software integrity in industrial settings. The absence of code in a programmable logic controller that resulted in considerable operational failure highlights the necessity for meticulous testing and documentation. This case acts as a warning for industries that depend heavily on automated solutions.

Questions & Answers

Q: What led to the overheating of the steam turbine generator?

A: It is claimed that a missing segment of code in the programmable logic controller resulted in the overheating by failing to activate the generator circuit breaker.

Q: How has Siemens responded to the accusations?

A: Siemens claims that the work was conducted by Siemens Industrial Turbomachinery, a distinct entity, and asserts it is not accountable for non-contractual liabilities.

Q: What actions has the Federal Court undertaken?

A: The Federal Court instructed Siemens to present documents and emails pertinent to the case and to reimburse South32’s legal expenses, establishing a compliance deadline.

Q: What is the case’s significance?

A: The case highlights the critical significance of software dependability and the potential repercussions of neglect within industrial operations.

Wireless Broadband Alliance Claims Wi-Fi Security Competes with Cellular Networks


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Wi-Fi Security: A New Phase of Equality with Cellular Networks

Brief Overview

  • Wireless Broadband Alliance asserts Wi-Fi now equals cellular in terms of security.
  • A new framework unifies standards for authentication, encryption, and more.
  • Crucial technologies for achieving security parity include WPA3, OpenRoaming, and RadSec.
  • Transition mode and obsolete protocols create security vulnerabilities.
  • Experts verify that Wi-Fi can be as secure as cellular networks.

Wi-Fi Security Framework: A Step Towards Equality

The Wireless Broadband Alliance (WBA) has introduced a revolutionary Wi-Fi security framework that unifies current standards and practices to boost security features. This initiative seeks to bring Wi-Fi up to the same level as cellular networks regarding security, utilizing technologies like WPA3 and the OpenRoaming federation framework.

Wi-Fi achieves cellular security equivalence according to Wireless Broadband Alliance

Essential Technologies for Improved Security

The framework emphasizes key technologies like WPA3, which offers robust encryption and mutual authentication, and RadSec, which uses TLS for secure RADIUS authentication. These technologies are crucial for attaining the necessary security parity with cellular networks.

Challenges of Transition Mode and Legacy Protocols

WBA cautions against utilizing “transition mode,” which accommodates both WPA2 and WPA3 standards, introducing security vulnerabilities by possibly downgrading connections. Moreover, legacy protocols such as MSCHAPv2 are discouraged due to their exploitable vulnerabilities.

Insights from Experts on Wi-Fi Security

According to Tiago Rodrigues, chief executive of WBA, the guidelines can facilitate secure and interoperable Wi-Fi experiences. Security researcher Mathy Vanhoef concurs, stating that a well-configured Wi-Fi network can compete with cellular security, although cellular networks might necessitate more specialized equipment for attacks.

Conclusion

The Wireless Broadband Alliance is leading a change in Wi-Fi security, aligning it with the standards of cellular networks. By adopting recommended technologies and steering clear of outdated protocols, operators can secure reliable Wi-Fi connectivity, as affirmed by top experts in the domain.

Q: What is the primary objective of the new Wi-Fi security framework?

A: The framework seeks to synchronize Wi-Fi security with cellular network standards, improving features such as authentication and encryption.

Q: Which important technologies are referenced in the framework?

A: WPA3, OpenRoaming, and RadSec are noted as vital for attaining security parity with cellular networks.

Q: What makes “transition mode” a security concern?

A: Transition mode can reduce connection security to WPA2, which lacks the sophisticated security features of WPA3, rendering it susceptible to threats.

Q: Are legacy protocols still in operation, and what dangers do they present?

A: Yes, protocols like MSCHAPv2 are still in use but are exposed to attacks because of weak hashing algorithms, posing considerable security risks.

Q: Can Wi-Fi genuinely match cellular networks in security?

A: Experts indicate that with proper setup and compliance with the new framework, Wi-Fi can indeed match the security of cellular networks.

Q: How can operators ensure security equality with cellular networks?

A: By implementing the complete range of WBA’s recommendations, including advanced protocols such as WPA3 and RadSec, operators can achieve security parity.

Domain transforms property advertising with a comprehensive in-house photography and drone team


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Quick Read

  • Domain launches a dedicated team of photographers and drone pilots aimed at transforming property marketing.
  • Launch of immersive 3D property experiences becomes the new norm for listings.
  • Plans are in place to increase the team size to over 60 experts nationwide.
  • Adopts the successful model utilized by CoStar Group from the United States.
  • Features will include defurnishing, automatic room measurements, and high-resolution 4K photography.
  • Service is set to debut on 1 July 2026 in prominent Australian cities.
  • Provides cutting-edge marketing tools at no added expense to sellers.

Transforming Property Marketing in Australia

Domain has unveiled a groundbreaking initiative to improve the visual aspect of property searching in Australia. An in-house group of skilled photographers and CASA-licensed drone operators will change the presentation of real estate listings, representing a substantial departure from the conventional third-party approach.

A New Norm for Australian Real Estate

With a team of over 25 full-time professionals and visions to expand to beyond 60, Domain is establishing a new standard in property showcasing. The internal model guarantees standardized safety and quality practices, ensuring the same high level of excellence is upheld in every listing.

Utilising the CoStar Group Framework

Domain’s strategy reflects the effective methodology of its parent entity, CoStar Group, in the United States. By incorporating photography, aerial drones, and spatial data as fundamental assets, Domain is optimizing the property market in Australia, providing realistic 3D visual representations with leading-edge technology.

Engaging Features for Contemporary Buyers

Buyers will enjoy interactive 3D imagery, which features “defurnishing” options and automatic room measurements. These technological advancements empower users to inspect properties thoroughly, evaluate spatial possibilities, and confirm that their furnishings are suitable—all without needing a physical visit.

Eliminating Cost Barriers for Sellers

Domain’s pricing model incorporates these innovative features within its widely-used agent package without extra charges for vendors. This approach democratizes access to premium marketing tools, making them accessible for all properties, not solely those considered high-end.

Fostering Stable Employment in the Tech Sector

This initiative represents a major investment in the local talent pool, generating stable, high-skilled positions for photographers and drone pilots. Operators are fully licensed and insured, utilizing advanced spatial data technologies to elevate industry standards.

Launch and Deployment

The service is scheduled for launch on 1 July 2026, spanning over 1,700 suburbs in major Australian cities. With intentions for further growth, Domain aims to spearhead the industry with technology and superior data.

Conclusion

Domain is set to reshape the property marketing scene in Australia with its in-house photography and drone initiatives. By integrating advanced 3D experiences and removing economic barriers, the company is establishing a new standard within the industry while generating reliable employment opportunities. This initiative showcases a significant dedication to enhancing the experiences of both buyers and sellers in the real estate arena.

Q: What is the primary aim of Domain’s new initiative?

A: The primary aim is to revolutionize property marketing by delivering superior visual experiences and establishing advanced 3D property displays as a typical feature in listings.

Q: In what way does the new in-house model advantage buyers?

A: Buyers gain from interactive 3D imagery that provides comprehensive views of properties, featuring options such as “defurnishing” and automatic room measurements, allowing them to make well-informed decisions without needing to visit in person.

Q: What technology is Domain employing for 3D visual presentations?

A: Domain utilizes photorealistic 3D visual representations powered by advanced technology, including Gaussian splat, to create immersive “dollhouse” perspectives of properties.

Q: What implications does this initiative have for property sellers?

A: Sellers benefit from having advanced marketing resources integrated into their agent packages without additional costs, allowing them to effectively display their properties without financial obstacles.

Q: When and where will the service be introduced?

A: The service will commence on 1 July 2026, initially covering over 1,700 suburbs in Sydney, Melbourne, Brisbane, Perth, Adelaide, and the Gold Coast, with aspirations for further growth.

Q: How does this initiative impact the tech workforce in Australia?

A: The initiative generates stable, high-skilled positions for photographers and drone operators, elevating industry standards and ensuring excellence through fully licensed and insured professionals.

Optus Enhances Its Spectrum Strategy Competence


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Optus Enhances Spectrum Strategy Expertise

Quick Summary

  • Optus brings on Golnar Khomami as the senior director for network technology standardization.
  • Khomami offers nine years of spectrum strategy expertise from her tenure at Telstra.
  • Her position emphasizes the integration of international spectrum regulatory standards and frameworks.
  • Recent leadership modifications at Optus involve a new CTO and OSS head.

Optus Enhances Its Spectrum Strategy Expertise

Optus enhances its spectrum strategy expertise

Optus is reinforcing its network capabilities by naming Golnar Khomami as the senior director of network technology standardization. With a robust background in spectrum strategy from her nine years at Telstra, Khomami’s insights are anticipated to strengthen Optus’s approach to spectrum regulation and standards.

Leadership Shift from Telstra

Khomami’s strategic position at Optus reflects her former responsibilities at Telstra, where she provided guidance on efficient radio spectrum usage for fixed and mobile services. Her participation with international standards organizations, including the International Telecommunications Union’s radiocommunication division, equips her to lead Optus in harmonizing with worldwide standards.

Recent Leadership Changes at Optus

The selection of Khomami follows the recent transition of Optus CTO Sri Amirthalingam, another ex-Telstra executive. Amirthalingam’s arrival at Optus in January heralded a notable leadership shift after Tony Baird’s exit. Optus has also experienced changes in its operational systems and support leadership, recently appointing Wajid Baryalai as the new OSS head.

Overview

Optus is enhancing its network technology leadership through strategic acquisitions from Telstra, with Golnar Khomami stepping in as senior director of network technology standardization. Her background in spectrum strategy and international standards is projected to propel Optus’s progress in aligning with global standards and optimizing spectrum use.

Questions & Answers

Q: Who is Golnar Khomami?

A: Golnar Khomami is the senior director of network technology standardization at Optus, previously serving as a spectrum strategist at Telstra.

Q: What will Khomami’s responsibilities at Optus entail?

A: Khomami will concentrate on formulating and implementing technology standards, aligning international spectrum frameworks, and enhancing Optus’s global presence.

Q: What impact does Khomami’s role have on Optus?

A: Her position is crucial for optimizing spectrum usage and aligning Optus’s strategies with global standards, boosting its competitive advantage.

Q: What other changes in leadership have taken place at Optus?

A: Recent adjustments in leadership at Optus include the appointment of new CTO Sri Amirthalingam and OSS chief Wajid Baryalai.

Q: Why are these leadership adjustments important?

A: These modifications demonstrate Optus’s dedication to enhancing its network capabilities and implementing innovative strategies for superior service delivery.

Silent Vehicles: Untouched Information Uncovers Concealed Narratives


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Invisible Data in Contemporary Vehicles: Crucial Information

Brief Overview

  • Contemporary vehicles keep GPS information that can be accessed, disclosing a comprehensive travel log.
  • This information is frequently unencrypted and can be extracted from telematic control units (TCUs).
  • Restoring vehicles to factory settings does not entirely eliminate stored information.
  • Data confidentiality is a major issue for rental and leasing firms.
  • Connected vehicles send information back to manufacturers, creating privacy concerns.
  • The Australian Signals Directorate advises disabling data sharing whenever possible.

Invisible Data in Contemporary Vehicles: Crucial Information

Vehicles retaining GPS data that uncovers concealed narratives

Revealing the Data Footprint in Vehicles

Security analysts have disclosed that modern automobiles come with functionalities that record and retain GPS data over time. This data, usually unencrypted, can be extracted from telematic control units (TCUs) even after a vehicle has been sold or deconstructed.

Data Retention and Privacy Issues

Studies conducted by Romain Marchand from Quarkslab revealed that a TCU from a BYD Seal model contained GPS records from its entire usage history. This finding poses significant privacy challenges, particularly for rental and leasing firms, which may lack rigorous data deletion protocols.

Obstacles in Data Deletion

Although vehicles provide factory reset options to eliminate personal data, these methods do not entirely remove stored information. Marchand noted that a thorough memory deletion is not achievable with existing vehicle designs, leaving remnants of data accessible.

Advice for Vehicle Owners

The Australian Signals Directorate recommends that owners of connected vehicles examine privacy policies prior to purchase and turn off data sharing whenever feasible. The advantages of linked mobile applications should be weighed against possible privacy threats.

Regulatory and Security Considerations

The Office of the Australian Information Commissioner has voiced concerns regarding the privacy ramifications of data collection within connected vehicles. Adhering to privacy and cybersecurity regulations is critical to safeguarding individuals’ security and privacy.

Conclusion

Modern automobiles gather and maintain GPS data, which presents considerable privacy risks due to inadequate data deletion capacities. Vehicle owners are encouraged to engage in digital sanitation and inspect privacy settings to reduce these risks.

Q: What kind of information do modern vehicles retain?

A: Modern vehicles retain GPS data, system configuration data, and possibly other personal details.

Q: Can factory resets completely eliminate this data?

A: No, factory resets do not fully erase stored information, leaving behind traces that can still be accessed.

Q: What privacy challenges exist for rental and leasing firms?

A: Rental and leasing firms may not consistently follow data deletion protocols, leading to privacy concerns.

Q: How can vehicle owners safeguard their data?

A: Owners should disable data sharing, refrain from linking personal devices, and review privacy policies prior to acquiring connected vehicles.

Q: What is the viewpoint of the Australian Signals Directorate on vehicle data sharing?

A: The ASD encourages disabling data sharing when possible and thoroughly assessing the privacy policies of vehicle manufacturers.

Q: Are there regulations that protect the privacy of vehicle data?

A: Yes, under the EU’s GDPR, certain data must be anonymized, but the landscape for vehicle data is complex, necessitating compliance with cybersecurity standards.

NDIS Commission Prepared to Unveil Enhanced Intelligent Risk Engine by August


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

NDIS Commission Set to Unveil New Risk Engine

Quick Overview

  • The NDIS Commission intends to roll out a risk engine by August to enhance its regulatory capabilities.
  • This engine will assist the $50 billion National Disability Insurance Scheme.
  • Part of the $160 million DART initiative focused on modernising ICT infrastructures.
  • The risk engine is not designed as an automated enforcement tool but will generate risk scores.
  • An improved EDRMS is also in the plans to rectify existing system shortcomings.

Introduction to the NDIS Commission’s Upcoming Risk Engine

NDIS Commission to deploy a new intelligent risk engine by August

The NDIS Quality and Safeguards Commission is preparing to roll out a new risk engine by August. This “decision-support mechanism” is designed to assist the Commission in better managing the $50 billion insurance scheme by pinpointing high-risk providers, workers, participants, and networks.

Function of the DART Program

The risk engine is a feature of the Data and Regulatory Transformation (DART) program, a four-year project backed by a $160 million investment. The DART program aims to modernise the Commission’s ICT systems, improving its capacity for analytics and intelligence to tackle systemic risks.

Main Advantages of the Risk Engine

The forthcoming risk engine will not function as an “automated enforcement tool.” Rather, it will produce automated risk scores and classifications to inform the Commission’s regulatory actions. The engine is anticipated to foster better market visibility, prompt risk identification, and enhance consistency in decision-making.

Timeline for Implementation

The Commission aims to have the critical features of the risk engine operational by August, with ongoing enhancements for the next nine months. A complete transition is projected by May 2027, facilitating phased operational capability and continuous upgrades.

EDRMS Upgrade

Alongside the risk engine, the DART program will replace the current electronic document and records management system (EDRMS). The existing system, based on OpenText, faces inefficiencies and compatibility challenges with a new Salesforce-based CRM solution. The new EDRMS will be cloud-based, highly reliable, and equipped to manage 8TB of records.

Conclusion

The NDIS Commission is advancing its technology through the DART program, introducing both a new risk engine and EDRMS upgrade. These efforts are aimed at strengthening the Commission’s regulatory functions, ensuring the efficient and effective oversight of the National Disability Insurance Scheme.

Q: What is the function of the new risk engine?

A: The risk engine is intended to assist the NDIS Commission in identifying high-risk entities, enhancing regulatory functions, and ensuring improved oversight of the $50 billion National Disability Insurance Scheme.

Q: What does the DART program entail?

A: The Data and Regulatory Transformation (DART) program is a four-year initiative with a $160 million budget aimed at modernising the NDIS Commission’s ICT systems and enhancing analytics and intelligence in risk management.

Q: How will the risk engine impact the NDIS market?

A: The risk engine is projected to deliver increased market visibility, facilitate early risk detection, and enable more consistent decision-making, ultimately resulting in better regulatory outcomes.

Q: Will the risk engine serve as an automated enforcement mechanism?

A: No, the risk engine will not operate as an automated enforcement mechanism. It will generate risk scores and classifications to support the Commission in its regulatory responsibilities.

Q: What enhancements are planned for the EDRMS?

A: The new EDRMS will be cloud-based and will address current inefficiencies, such as subpar indexing and compatibility issues with the Salesforce-based CRM solution.

Q: When will the new systems be completely operational?

A: The essential elements of the risk engine are expected by August, with full operational readiness and improvements continuing until May 2027.

Anthropic Introduces Groundbreaking AI Cybersecurity Project


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Anthropic AI Cybersecurity Effort

Quick Overview

  • Anthropic collaborates with leading tech firms to strengthen AI cybersecurity.
  • Project Glasswing rolls out “Claude Mythos Preview” for cybersecurity functions.
  • Partners involve Amazon, Microsoft, Apple, CrowdStrike, among others.
  • The initiative’s goal is to detect weaknesses in software systems.
  • Anthropic has allocated over $143 million in usage credits and contributions.
  • Discussions with the US government about AI capabilities are ongoing.

Collaborations with Tech Leaders

Anthropic has announced a fresh AI cybersecurity initiative through alliances with prominent technology corporations such as Amazon, Microsoft, and Apple. This collaboration enables select entities to test an enhanced AI model termed “Claude Mythos Preview” for cybersecurity defense.

Collaboration in Anthropic AI cybersecurity initiative with tech leaders

Project Glasswing

As part of “Project Glasswing,” organizations will utilize the forthcoming AI model for cybersecurity tasks. Participants in this initiative include not just Amazon, Microsoft, and Apple, but also CrowdStrike, Palo Alto Networks, Google, and Nvidia. This project aspires to significantly improve the cybersecurity sector by harnessing AI to uncover vulnerabilities across diverse software systems.

Effect on the Cybersecurity Sector

The announcement follows a report suggesting that Anthropic’s Claude Mythos could introduce security threats while providing advanced functionalities. This has influenced the stock values of cybersecurity firms such as Palo Alto Networks and CrowdStrike. At the latest RSA cybersecurity conference, the focus was on AI-driven cyberattacks and the adequacy of conventional security measures.

Dedication to Security and Cooperation

Anthropic disclosed in a blog entry that the Claude Mythos Preview has already pinpointed thousands of vulnerabilities in operating systems, web browsers, and other software applications. The company is broadening access to about 40 more organizations tasked with essential software infrastructure, paired with a substantial commitment of up to US$100 million (A$143 million) in usage credits and US$4 million in contributions to open-source security organizations.

Upcoming Prospects and Government Partnerships

Ongoing conversations between Anthropic and the US government underscore the promise and capabilities of their AI model. The primary aim is for users to securely implement Mythos-class models at scale. This initiative arises after prior instances where hackers took advantage of weaknesses in Anthropic’s Claude AI, impacting several international organizations. A recent study by IBM and Palo Alto Networks found that 67% of surveyed executives experienced AI-centric attacks in the previous year.

Conclusion

The new AI cybersecurity initiative from Anthropic is poised to reshape the industry by utilizing AI to identify and rectify software vulnerabilities. Through collaboration with prominent technology firms, the project seeks to bolster defensive cybersecurity strategies while promoting cooperation and innovation in the field. With major financial commitments and ongoing discussions with governmental bodies, Anthropic is establishing itself as a leader in AI-driven cybersecurity solutions.

Q: What is Project Glasswing?

A: Project Glasswing is an initiative by Anthropic allowing selected organizations to employ an advanced AI model dubbed “Claude Mythos Preview” for defensive cybersecurity tasks.

Q: Which major companies are part of this initiative?

A: The initiative involves major technology firms like Amazon, Microsoft, Apple, CrowdStrike, Palo Alto Networks, Google, and Nvidia.

Q: What are the main goals of the initiative?

A: The primary goals include enhancing cybersecurity by identifying software system vulnerabilities and facilitating the secure deployment of Mythos-class models at scale.

Q: What financial commitments has Anthropic made?

A: Anthropic has promised up to US$100 million (A$143 million) in usage credits and US$4 million in contributions to open-source security organizations.

Q: Has the Claude Mythos Preview shown effectiveness thus far?

A: Yes, the Claude Mythos Preview has discovered thousands of vulnerabilities across various software systems, highlighting its efficacy in improving cybersecurity.

Q: What is the importance of Anthropic’s discussions with the US government?

A: These discussions emphasize the potential impact and functionalities of Anthropic’s AI model, along with its alignment with government cybersecurity priorities.

Rest Super Enhances Employee Access to IT, HR, and Information


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Brief Overview

  • Rest Super utilizes ServiceNow to improve employee access to HR and IT services.
  • The platform makes compliance with prudential regulations CPS 230 and CPS 234 more manageable.
  • AI and automation are essential for Rest Super’s operational transformation.
  • ServiceNow’s reusable models speed up application deployment and enhance the user experience.
  • Rest Super’s workforce expanded from 200 to 1100 employees within five years, indicating its growth.

Rest Super’s Evolution

Rest Super has initiated a major transformation, employing ServiceNow as a key platform to optimize employee access to IT, HR, and relevant information. This effort corresponds with Rest Super’s increase from 200 to 1100 employees over five years, underscoring its emphasis on growth and operational effectiveness.

Leveraging ServiceNow for Efficiency

ServiceNow acts as a ‘gateway’ for employees, streamlining access to information and organizational functions. Initially focused on IT service and operations management, the platform’s capabilities have broadened to cover integrated risk management and HR service delivery.

Compliance and Risk Oversight

Rest Super’s dedication to integrated risk management is in line with compliance initiatives concerning prudential standards CPS 230 and CPS 234. ServiceNow simplifies compliance documentation and oversight, thus lightening administrative responsibilities.

Accelerated Deployment and User Engagement

Applications developed on ServiceNow gain from reusable frameworks, allowing for quicker deployment and fostering user engagement. This groundwork has streamlined processes, assisting employees in effectively interacting with IT and HR services.

Adopting AI and Automation

Rest Super is investigating AI and automation to promote additional operational enhancements. A newly formed center of excellence backs this initiative, advocating for a grassroots method to AI integration and the examination of use cases.

Conclusion

Rest Super’s implementation of ServiceNow signifies a strategic approach to boost operational efficiency and compliance. With an emphasis on growth and innovation, the organization is poised to harness AI and automation during its ongoing transformation.

Q: What is the main aim of Rest Super’s transformation?

A: The main aim is to enhance employee access to IT and HR services while improving compliance and operational efficiency.

Q: How does ServiceNow enhance Rest Super’s operations?

A: ServiceNow streamlines access to information and service engagement, alleviates compliance pressures, and accelerates application deployment.

Q: What is the significance of AI in Rest Super’s strategy?

A: AI is used to innovate and enhance operational processes, focusing on practical use case exploration within the organization.

Q: How has the employee count at Rest Super changed lately?

A: Rest Super has increased its workforce from 200 to 1100, underscoring its notable growth and scaling initiatives.

Q: How does ServiceNow facilitate compliance obligations?

A: It simplifies the tracking and reporting of compliance with standards such as CPS 230 and CPS 234, minimizing administrative duties.

Q: What does the ‘gateway’ concept introduced by ServiceNow mean?

A: The ‘gateway’ concept offers a centralized access point for employees to interact with IT, HR, and other organizational resources.