
This week on The Enterprise Tech Playbook, we unpack the critical stories shaping the IT landscape. We start with a crucial look at the new economics of artificial intelligence, exploring how GenAI FinOps and token-based pricing are creating massive, unexpected budget challenges. We then shift to the strategic implications of Westpac's major investment in AIOps and what it signals for the future of IT operations careers.On the cybersecurity front, we dissect three urgent threats: a classic endpoint security nightmare involving a WinRAR zero-day vulnerability, a persistent software supply chain risk with the XZ backdoor still lurking on Docker Hub, and a frightening glimpse into the future of AI attack vectors that could turn your calendar into a weapon.Finally, we land in an Australian courtroom to analyse the Epic Games vs. Apple & Google battle and what the potential end of the "walled garden" app store model means for enterprise security and mobile device management.We're on a mission to empower every IT professional with actionable wisdom and a collaborative community, making their next stride in enterprise tech one that truly leads with impact.This Week's News Stories & ResourcesHere are the links to all the articles discussed in this episode:GenAI FinOps: How token pricing really worksA foundational guide from the FinOps Foundation on the new consumption-based cost models of Generative AI.https://www.finops.org/wg/genai-finops-how-token-pricing-really-works/Epic Games' App Store Fight with Apple & Google Hits Australian CourtsABC News covers the kick-off of the landmark anti-competition case in Australia's Federal Court.https://www.abc.net.au/news/2025-08-12/epic-games-fortnite-v-apple-google-federal-court-case/105641794Inside Westpac's Push into AIOps and Event-Driven AutomationiTnews reports on how the major Australian bank is moving from a reactive to a predictive IT operations model.https://www.itnews.com.au/news/westpac-turns-to-aiops-and-event-driven-automation-619369WinRAR Zero-Day Exploited in the Wild, Highlighting Endpoint Blind SpotsArs Technica details a high-severity vulnerability in the popular utility, exploited by attackers for weeks.https://arstechnica.com/security/2025/08/high-severity-winrar-0-day-exploited-for-weeks-by-2-groups/Ghost in the Machine: Docker Hub Still Hosting Images with XZ BackdoorBleepingComputer reveals that the notorious software supply chain vulnerability persists in public container repositories.https://www.bleepingcomputer.com/news/security/docker-hub-still-hosts-dozens-of-linux-images-with-the-xz-backdoor/amp/"Hey Google, Hijack My Calendar": AI Assistants Create New Attack VectorsWIRED explores a novel attack that uses poisoned data to trick AI assistants into performing unauthorised actions.https://www.wired.com/story/google-gemini-calendar-invite-hijack-smart-home/Join the Conversation!Which of these stories hits closest to home for your organisation? Join the conversation by leaving a comment on our YouTube video or connecting with us on LinkedIn.If you found value in this episode, please subscribe on your favourite podcast platform.