SecurityBrief India - Technology news for CISOs & cybersecurity decision-makers

Attack Surface Management stories - Page 2

Google wiz ai cloud defense illustration cloud fortress locked storm

Google closes Wiz deal & unveils AI security tools

Last month
#
virtualisation
#
firewalls
#
data protection
Google folds Wiz into its cloud security arm and launches AI-driven tools to counter rapidly evolving, automated cyber threats.
Security operations center ai agent routing alerts cloud identity industrial ops

Tenable launches Hexa AI to automate cyber workflows

Last month
#
digital transformation
#
cloud security
#
iot security
Tenable unveils Hexa AI engine for its One platform, automating orchestration of cyber security workflows amid rising AI-driven attacks.
Fletcher davis

BeyondTrust warns of 467% rise in enterprise AI agents

Last month
#
crm
#
hyperscale
#
pam
BeyondTrust warns a surge of unsupervised AI agents is creating a hidden “shadow workforce” with admin-level access inside enterprises.
Yanbing

Datadog launches AI security analyst for Cloud SIEM

Last month
#
siem
#
digital transformation
#
cloud security
Datadog rolls out Bits AI Security Analyst in Cloud SIEM, promising to slash alert investigations from hours to around 30 seconds.
It admin server room network dashboard unused endpoints overlays

Cork Cyber unveils AI engine for MSP asset oversight

Last month
#
dr
#
endpoint protection
#
mfa
Cork Cyber unveils an AI-driven asset analysis engine for MSPs, tackling zombie assets, coverage gaps and licence waste across client estates.
Moody soc under attack shadowy intruder blind speed stealth

Google Mandiant report spots faster, stealthier cyberattacks

Last month
#
virtualisation
#
firewalls
#
data protection
Google's latest Mandiant report warns cyberattacks are faster and stealthier as AI-powered tools narrow defenders' response times to seconds.
Devvret rishi x annekagupta

Rubrik deepens identity security & AI governance push

Last month
#
data protection
#
dr
#
pam
Rubrik links Microsoft Defender with new AI governance engine SAGE to speed identity attack recovery and tighten control of autonomous agents.
Security ops center cloud network map penetration test vuln remediation

Qualys launches Agent Val for live exploit validation

Last month
#
devops
#
cloud security
#
socs
Qualys rolls out Agent Val to live‑test exploit paths in production, promising sharper risk prioritisation and major remediation noise cuts.
Mathivanan v

ManageEngine adds EDR & Zero Trust access to platform

Last month
#
malware
#
firewalls
#
vpns
ManageEngine folds EDR and Zero Trust private access into Endpoint Central, unifying endpoint management and security in one console.
Modern enterprise soc unified cloud server network threat maps hub

Simbian launches AI platform for unified cyber ops

Last month
#
devops
#
cloud security
#
application security
Simbian unveils an AI-driven cyber security platform uniting offence and defence via a shared Context Lake to speed, link and automate response.
Editorial cybersecurity analyst pen test results attack path cloud diagrams

Cobalt adds AI features to boost continuous pentests

Last month
#
devops
#
cloud security
#
application security
Cobalt weaves AI into its pentesting platform, automating recon and triage while keeping human experts on complex attack paths.
Corporate it security control room flat illustration pen testing

Cobalt unveils service to manage enterprise pentesting

Last month
#
devops
#
cloud security
#
application security
Cobalt launches Security Program Manager service to run enterprise pentesting, align tests with business goals and speed up remediation.
Cybersecurity analyst dashboard network risks two click workflow

NetSPI unveils AI-led workflow redesign for pentesting

Last month
#
devops
#
cloud security
#
application security
NetSPI unveils an AI-powered overhaul of its pentesting platform UX, promising two-click workflows and sharper risk-based remediation focus.
Isometric cloud security alerts to calm monitoring dashboard network

Miggo & Grafana link runtime security with telemetry

Last month
#
devops
#
cloud security
#
application security
Miggo and Grafana link runtime security to Grafana Cloud telemetry, promising major cuts to critical vulnerability noise for joint users.
Overworked apac cybersecurity analyst night soc moody blue monitors

Alert overload leaves mid-market security teams exposed

Last month
#
digital transformation
#
advanced persistent threat protection
#
socs
Manual context-gathering leaves mid-market security teams missing threats, as 79% rely on third parties to spot attacks their tools overlook.
Archit lohokare 1

AppViewX buys Eos to secure machine & AI agent identities

Last month
#
saas
#
encryption
#
pam
AppViewX acquires AI identity start-up Eos and appoints its co-founder Archit Lohokare as Chief Executive, targeting non-human identity security.
Modern datacenter night racks flowing data cloud edge security

SentinelOne, Cloudflare link AI SIEM with edge data

Last month
#
firewalls
#
siem
#
digital transformation
SentinelOne and Cloudflare deepen ties, feeding edge and Zero Trust telemetry into Singularity AI SIEM to unify threat detection and response.
Secure hpe datacenter nvidia gpu private cloud ai shielded infra

TrendAI links with HPE to secure private cloud AI stack

Last month
#
virtualisation
#
data protection
#
private cloud
TrendAI integrates its AI security platform with HPE Private Cloud AI to secure enterprise AI deployments from infrastructure to applications.
Moody server room red alert cracked shield cyber vulnerabilities

Rapid7 warns exploited software flaws more than double

Last month
#
firewalls
#
ransomware
#
network security
Rapid7 warns exploited high and critical software flaws more than doubled in 2025, as attackers compress disclosure-to-attack windows.
Dns web shields cutting malicious red nodes early cybercrime stop

Netcraft tool targets malicious domains before attacks

Last month
#
phishing
#
advanced persistent threat protection
#
email security
Netcraft unveils Preemptive Domain Disruption to knock out attacker domains in their dormant phase before phishing and BEC scams launch.