CPI Consulting
  • About
  • Blog
  • Security Health Check
  • BI-Weekly Insights
  • Essential Eight Security
  • AI
  • Microsoft Foundry
  • Fractional CTO
Select Page

The North Korean Threat Actor Now Targeting macOS Fleets — and Why Your Intune for Mac Baseline Matters

by CPI Staff | Apr 22, 2026 | Blog, Cybersecurity, Essential 8, Microsoft 365 Security, Microsoft defender XDR, Microsoft Intune

For years, Australian IT leaders treated macOS as the “quiet corner” of the fleet. A handful of executives and designers on MacBooks, a sprinkle of engineers, and a general assumption that Apple’s built-in protections were enough. That assumption no...
Cloud Cost Is Back on Every CIO’s Agenda. Microsoft’s New Guidance Is a Useful Starting Point — But Not the Finish Line

Cloud Cost Is Back on Every CIO’s Agenda. Microsoft’s New Guidance Is a Useful Starting Point — But Not the Finish Line

by CPI Staff | Apr 22, 2026 | Azure, Blog, Cloud Cost & FinOps

Cloud cost has returned to the top of the CIO priority list. Budgets are tighter, AI workloads are expensive, and boards are asking harder questions about return on cloud investment than they were two years ago. Microsoft has been steadily refreshing its cost...
The Vercel Breach Shows Why Third-Party Hosting Belongs in Your Next Azure Well-Architected Review

The Vercel Breach Shows Why Third-Party Hosting Belongs in Your Next Azure Well-Architected Review

by CPI Staff | Apr 22, 2026 | Azure, Azure Security, Blog, Cybersecurity, Software Supply Chain Security

In this blog post, The Vercel Breach Shows Why Third-Party Hosting Belongs in Your Next Azure Well-Architected Review, we look at why platforms like Vercel, Netlify, Cloudflare Pages, and Railway can no longer sit quietly outside the governance perimeter of an...

ACSC’s New Guidance on Frontier Models Puts AI Risk Squarely on the CISO Agenda for Australian Organisations

by CPI Staff | Apr 21, 2026 | AI, Blog, Cybersecurity

For many organisations, AI risk has been treated as a future governance issue. The Australian Cyber Security Centre has just made that position harder to defend. In its 9 April 2026 guidance, Frontier models and their impact on cyber security, ACSC draws a direct line...
Microsoft’s Emergency Windows Server Updates Are a Reminder Mid-Market Patch Validation Cannot Be Optional

Microsoft’s Emergency Windows Server Updates Are a Reminder Mid-Market Patch Validation Cannot Be Optional

by CPI Staff | Apr 21, 2026 | Blog, Cybersecurity, Essential 8, Windows Server

Patch deployment failures are not supposed to become operational incidents. But that is exactly what many IT teams were forced to confront after Microsoft’s April 2026 Windows Server security updates triggered installation failures on some Windows Server 2025...
« Older Entries
Next Entries »

Recent Posts

  • Why Microsoft 365 Security Is More Than Just Turning on MFA
  • The Intune Policy Gap That Leaves Company Devices Exposed
  • How We Would Secure a Small Business Microsoft 365 Environment in 5 Days
  • The Microsoft 365 Tenant Looked Fine Until We Checked the Security Defaults
  • The Hidden Risk of Unmanaged Devices Accessing Microsoft 365
  • The First 10 Things We Check in a Microsoft 365 Security Review
  • Windows 365 and Intune Advanced Endpoint Management Give Australian IT Teams a Single Device Control Plane
  • Windows 365 and Intune Advanced Endpoint Management Give Australian IT Teams a Single Device Control Plane
  • INC Ransom’s Active Campaign Across Australia Shows Why Essential 8 ML2 Is No Longer Optional
  • Microsoft Teams Helpdesk Impersonation Attacks Are Rising. Here’s What Australian IT Teams Should Change This Week

Categories

Subscribe

Top Posts

How to Add a Registry Key to Windows 11 Using Microsoft Intune
Updating Microsoft Edge Using Intune
How to Turn Off Windows Hello in Microsoft Intune
Sync SharePoint Site Libraries with Microsoft Intune
How to Deploy a Wiz Outpost to Microsoft Azure
Setting Google Chrome as the Default Browser with Microsoft Intune
Whitelist USB Devices on Windows Using Intune
Create a Custom Extension Attribute Entra ID
Maximizing Security: When to Use Wiz Outpost with Azure
Block Copy Paste from iOS Business Apps with Intune