SecurityBrief India - Technology news for CISOs & cybersecurity decision-makers

Identity Security stories - Page 7

Cinematic data center night firewall crack ransomware attack icon

Barracuda links 2025 ransomware wave to firewall flaws

Fri, 20th Feb 2026
#
firewalls
#
data protection
#
ransomware
Barracuda warns that unpatched firewalls and weak accounts drove 90% of 2025 ransomware attacks, as threats spread in mere hours.
Cynthia lee x adam perks x chris waynforth

Delinea boosts EMEA, APAC growth with senior hires

Fri, 20th Feb 2026
#
data protection
#
siem
#
digital transformation
Delinea has named three senior leaders across EMEA and APAC to accelerate regional sales, channel growth and AI-driven identity security.
Enterprise cloud security procurement modern corporate it

CrowdStrike Falcon now available via Microsoft Marketplace

Thu, 19th Feb 2026
#
endpoint protection
#
digital transformation
#
hyperscale
CrowdStrike's Falcon platform is now sold via Microsoft Marketplace, letting customers spend existing Azure commitments on security tools.
Dim server room admin workstation security shield network nodes

12Port unveils AI session intelligence for PAM security

Thu, 19th Feb 2026
#
data protection
#
pam
#
mfa
12Port adds AI-powered session intelligence to its agentless PAM platform, promising real-time detection and disruption of risky admin activity.
Dark office night remote access shadowy hacker silent data theft

Data-only extortion surges as remote access abused

Wed, 18th Feb 2026
#
data protection
#
dr
#
vpns
Data-only extortion soars 11-fold as attackers 'log in instead of break in', abusing remote access tools for faster, stealthier raids.
Cinematic soc analysts network map cloud kubernetes identity alerts

ExtraHop boosts agentic SOC with richer network insight

Wed, 18th Feb 2026
#
virtualisation
#
hybrid cloud
#
pam
ExtraHop sharpens its network detection tools with deeper identity and Kubernetes insight to power more reliable agentic SOC automation.
Untitled design  63

One Identity names Michael Henricks Finance & Ops Chief

Wed, 18th Feb 2026
#
saas
#
hybrid cloud
#
pam
One Identity appoints Michael Henricks as combined finance and operations chief to steer scaling identity security business growth.
Roi karo

Check Point unveils four-pillar AI security strategy

Mon, 16th Feb 2026
#
firewalls
#
hybrid cloud
#
digital transformation
Check Point launches four-pillar AI security strategy and three targeted acquisitions to secure networks, workspaces and AI agents.
Asia pacific night map cyber breaches shipping supply chain

AI-fuelled supply chain cyber attacks surge in Asia-Pacific

Mon, 16th Feb 2026
#
firewalls
#
ransomware
#
network security
AI is supercharging supply chain cyber attacks across Asia-Pacific, with Group-IB warning single hacks now threaten thousands of victims.
Modern soc dark room analysts monitors world maps network threats

Simbian touts AI SOC growth as automation race intensifies

Fri, 13th Feb 2026
#
firewalls
#
digital transformation
#
cloud security
Simbian claims 15-fold customer surge as its AI-driven SOC agents vie to replace rules-based automation in the cyber defence arms race.
Australian cybersecurity control room ai threats safe internet

AI reshapes cyber threats as Safer Internet Day nears

Wed, 11th Feb 2026
#
firewalls
#
ddos
#
network security
AI-driven agents and rising network attacks are reshaping cyber risks, experts warn, as Safer Internet Day 2026 urges 'verified trust' online.
Cinematic secure data center ai shield hologram blue teal lighting

Token Security named RSAC 2026 Innovation Sandbox finalist

Wed, 11th Feb 2026
#
pam
#
cloud security
#
socs
Token Security named RSAC 2026 Innovation Sandbox finalist for its platform securing and governing autonomous AI agent identities.
Jonathan dixon

CrowdStrike names Jonathon Dixon to lead JAPAC growth

Wed, 11th Feb 2026
#
ransomware
#
endpoint protection
#
digital transformation
CrowdStrike appoints veteran executive Jonathon Dixon to lead JAPAC, driving Falcon platform adoption and regional cyber security growth.
Asia  pacific and japan

CyberArk crowns PwC 2025 Global Partner of the Year

Wed, 11th Feb 2026
#
digital transformation
#
hyperscale
#
pam
CyberArk names PwC its 2025 Global Partner of the Year as partner-led deals surge and certification-driven identity security gains pace.
Corporate it soc monitors network diagrams red attack path analysis

SpecterOps unveils BloodHound Scentry identity risk service

Wed, 11th Feb 2026
#
devops
#
pam
#
cloud security
SpecterOps has launched BloodHound Scentry, a managed identity risk service to find and remediate attack paths across complex environments.
Secure bank data center glass vault hsm blockchain cubes

Fireblocks & Thales deepen bank crypto key control

Tue, 10th Feb 2026
#
fintech
#
blockchain
#
physical security
Fireblocks deepens its Thales tie-up to keep bank crypto keys in customer-owned HSMs, tightening control, compliance and resilience.
Us military data center zero trust identity security cloud shield

Cayosoft, XMS to bolster US War Department identity

Sat, 7th Feb 2026
#
dr
#
pam
#
cloud security
Cayosoft and XMS Solutions will overhaul identity systems for a US war agency, bolstering Zero Trust security across hybrid Microsoft environments.
Arctic wolf shield logo guarding enterprise buildings network locks

Arctic Wolf named Chubb's preferred MDR cyber partner

Fri, 6th Feb 2026
#
vpns
#
ransomware
#
cybersecurity insurance
Arctic Wolf has been chosen as Chubb's preferred MDR partner, tying cyber cover to continuous security monitoring for larger policyholders.
Ai identity security cloud lock humans robots enterprise net

1Password expands global partner push for AI identity

Fri, 6th Feb 2026
#
saas
#
digital transformation
#
pam
1Password revamps its global partner programme to tap soaring demand for AI-era identity security and non-human access governance.
Yuvraj

Exclusive: Yuvraj Pradhan warns legacy VPNs are now a security risk

Fri, 6th Feb 2026
#
malware
#
firewalls
#
vpns
Legacy VPNs are emerging as a prime security liability as hybrid work, identity‑based attacks and cloud apps expose their design flaws.