CFOtech Australia - Technology news for CFOs & financial decision-makers

Security Posture stories - Page 8

Ciso hesitates at glowing deploy button in ai cyber soc

CISOs cautious as agentic AI adoption in security lags

Wed, 25th Feb 2026
#
firewalls
#
data protection
#
manufacturing
CISOs slow-roll agentic AI in defence, even as they brace for more advanced, AI-boosted attacks and rising personal liability risks.
072 infotrust sydney 2025 executive dsc00098  1

Infotrust sells Nexgen for AUD $50m to fund cyber push

Tue, 24th Feb 2026
#
data protection
#
ransomware
#
digital transformation
Infotrust sells its Nexgen cloud and communications unit for AUD $50m to bankroll acquisitions and double down on sovereign cyber security.
Arctic wolf made of network nodes guarding glowing it infra map

Arctic Wolf snaps up Sevco to boost exposure insight

Tue, 24th Feb 2026
#
hybrid cloud
#
digital transformation
#
cloud security
Arctic Wolf buys Sevco to fold its exposure assessment tech into the Aurora Platform, promising sharper asset insight for security teams.
Global upg. phase 2 partner blog header 1 1200x500px

Upgrade advantage: Why security enhancements matter for MSPs and MSSPs

Mon, 23rd Feb 2026
#
firewalls
#
vpns
#
digital transformation
For MSPs and MSSPs, next-gen firewall upgrades are now critical to stay secure, competitive and ready for relentless cyber threats.
Ai cloud puzzle shields dark gaps leaking data hidden keys

Tenable warns of widening AI exposure gap in cloud

Mon, 23rd Feb 2026
#
malware
#
digital transformation
#
public cloud
Tenable warns businesses that rapid AI and cloud adoption is creating an invisible exposure gap as identity and supply chain risks surge.
Ciso in dark ops room facing cloud ai chasm moody us scene

Tenable warns AI outpacing security, widening risk gap

Fri, 20th Feb 2026
#
pam
#
cloud security
#
application security
Tenable warns cloud and AI adoption is creating a widening 'zero‑margin' security gap as exposure grows faster than defenders can respond.
Jon connet

Aeris & Palo Alto link SASE to secure global IoT fleets

Fri, 20th Feb 2026
#
uc
#
firewalls
#
digital transformation
Aeris links its IoT Watchtower with Palo Alto Networks' Prisma SASE 5G to unify zero-trust security and connectivity for global IoT fleets.
Ethical hacker monitoring ai driven pen testing server rack

Simbian unveils AI agent for continuous pentesting

Fri, 20th Feb 2026
#
data protection
#
devops
#
application security
Simbian launches an AI Pentest Agent that runs continuous, adaptive penetration tests, promising faster, context-aware vulnerability detection.
Server room night encrypted code swirls malware cracked shield

WatchGuard warns of surge in evasive, encrypted malware

Fri, 20th Feb 2026
#
malware
#
firewalls
#
ransomware
WatchGuard reports a 1,548% surge in new evasive malware and a 2,000% jump in encrypted threats, straining signature-based defences.
Secure cloud platform shields locks customer experience data iso

CrowdStrike, Qualtrics link up to secure AI-driven data

Fri, 20th Feb 2026
#
data protection
#
digital transformation
#
cloud security
CrowdStrike links Falcon Shield with Qualtrics XM to extend SaaS security, monitoring and automated policy enforcement across experience data.
Yuneeb khan

KnowBe4 appoints Yuneeb Khan as Chief Financial Officer

Fri, 20th Feb 2026
#
data protection
#
digital transformation
#
advanced persistent threat protection
KnowBe4 names Yuneeb Khan CFO to steer global finances as it sharpens focus on human and agentic AI risk in cyber security.
Cornelius mare

SD-WAN is the SASE foundation enterprises can't ignore

Wed, 18th Feb 2026
#
firewalls
#
network infrastructure
#
hybrid cloud
Enterprises rushing to adopt SASE must modernise with SD-WAN first, or risk poor performance, fragmented visibility and weak security.
Dark office night remote access shadowy hacker silent data theft

Data-only extortion surges as remote access abused

Wed, 18th Feb 2026
#
data protection
#
dr
#
vpns
Data-only extortion soars 11-fold as attackers 'log in instead of break in', abusing remote access tools for faster, stealthier raids.
Ai governance zero trust secure data center corridor shield

Xiid & Cytex link AI governance with zero trust access

Sun, 15th Feb 2026
#
firewalls
#
data protection
#
ransomware
Xiid and Cytex join forces to fuse AI governance with zero trust access, targeting shrinking attack paths and stricter cyber regulation.
Enterprise cloud security shields above offices and data racks

Brinqa brings exposure management platform to Google Cloud

Sun, 15th Feb 2026
#
saas
#
storage
#
hybrid cloud
Brinqa lists unified exposure management on Google Cloud Marketplace, streamlining procurement and deployment for committed cloud customers.
Cinematic soc night ai alert dashboards hidden apps control

Okta unveils tools to detect & govern shadow AI risks

Fri, 13th Feb 2026
#
pam
#
cloud security
#
application security
Okta launches Agent Discovery to uncover and rein in shadow AI agents, mapping risky app access and tightening identity-based controls.
Ciso monitoring data flows shadowy ai deepfake cyberattack threat

CISOs confident in cyber skills but lag on AI threats

Thu, 12th Feb 2026
#
digital transformation
#
cloud security
#
socs
CISOs show strong faith in cyber defences yet less than two-thirds feel ready for fast-rising AI-driven attacks and deepfake threats.
Visions of cb header

Visions of cyber attacks: The SonicSentry SOC in action on Christmas morning

Thu, 12th Feb 2026
#
firewalls
#
data protection
#
network security
While most slept through Christmas dawn, SonicSentry analysts foiled a 3am brute-force cyber attack on a French client's firewall.
2026 cybersecurity partnership award trophy asia pacific focus

Rapid7 crowns Orro APJ Partner of the Year for 2026

Thu, 12th Feb 2026
#
cx
#
martech
#
socs
Rapid7 names Orro its 2026 APJ Partner of the Year as four other Australian security specialists secure top regional award honours.
Stealthy cloud server room data theft ghostly silhouette cable

Hackers ditch noisy ransomware for stealthy data theft

Thu, 12th Feb 2026
#
firewalls
#
data protection
#
dr
Hackers are abandoning noisy ransomware to quietly steal data, as a report finds 80% of top attack techniques now focus on evasion.