SecurityBrief India - Technology news for CISOs & cybersecurity decision-makers

Incident Response stories - Page 20

Gareth cox

Why cybersecurity frameworks matter more than ever

Tue, 27th Jan 2026
#
ransomware
#
cloud security
#
supply chain
As cyber spend soars past USD $100 billion, rising breaches show Australian firms need clear security frameworks more than extra tools.
Raymond schippers

Hybrid mesh security emerges to counter AI cyber risks

Tue, 27th Jan 2026
#
firewalls
#
ransomware
#
hybrid cloud
As hybrid IT sprawl fuels blind spots and AI-driven attacks, experts say only a zero trust, hybrid mesh rethink can secure modern networks.
Modern devops ops room smooth monitoring dashboards high activity

New Relic links AI observability to faster deployments

Tue, 27th Jan 2026
#
devops
#
digital transformation
#
application security
New Relic data links use of its AI observability tools to 27% less alert noise, 25% faster fixes and up to fivefold higher deployment rates.
Zero trust office workstation vault laptop secure chains apps

Keeper brings zero-trust access governance to Slack

Mon, 26th Jan 2026
#
hybrid cloud
#
digital transformation
#
encryption
Keeper rolls out a zero-trust Slack integration, turning chat-based approvals into governed workflows while keeping enforcement in Keeper Vault.
Ziv

Komodor bolsters leadership for AI driven SRE growth

Sat, 24th Jan 2026
#
devops
#
data analytics
#
digital transformation
Komodor hires a new CFO and elevates its people chief to steer global expansion of its AI-driven site reliability engineering platform.
Cyderes

Cyderes names Lana Knop Chief Product Officer for AI push

Sat, 24th Jan 2026
#
saas
#
siem
#
digital transformation
Cyderes appoints Lana Knop as Chief Product Officer to steer post‑Lucidum product strategy and drive a new wave of AI‑powered security services.
Ai agents outpacing security with puzzles locks shields chains

AI agents race ahead of governance, security & trust

Fri, 23rd Jan 2026
#
data protection
#
digital transformation
#
phishing
AI agents surge into big business with scant oversight, leaving governance, security and trust frameworks struggling to keep pace.
Secure datacenter ai era privileged access protection servers

NCC Group, Delinea partner on managed PAM for AI era

Fri, 23rd Jan 2026
#
devops
#
hybrid cloud
#
digital transformation
NCC Group and Delinea launch managed privileged access service, targeting AI-era identity threats with Zero Trust, cloud-native controls.
Image

SonicWall pushes unified automation for faster cyber defence

Fri, 23rd Jan 2026
#
malware
#
firewalls
#
ransomware
SonicWall launches unified automation tools to cut alert fatigue, speed cyber threat remediation and streamline overstretched security teams.
Moody office worker phishing remote access cursor corporate net

Phishing campaign exploits RMM tools for stealthy access

Fri, 23rd Jan 2026
#
firewalls
#
network security
#
phishing
Phishing campaign uses stolen logins and trusted RMM tools like GoTo Resolve and LogMeIn to quietly maintain access to corporate systems.
Secure hybrid cloud identity protection rapid enterprise recovery

Cohesity boosts identity resilience for hybrid AD, Entra

Fri, 23rd Jan 2026
#
data protection
#
dr
#
ransomware
Cohesity has expanded its Identity Resilience tools to detect, block and rapidly undo attacks on hybrid Active Directory and Entra ID.
Katanasho

How AI-powered log management unlocks observability

Fri, 23rd Jan 2026
#
devops
#
data analytics
#
digital transformation
Companies that treat log data as strategic intelligence, not digital clutter, are unlocking faster recovery, resilience and innovation.
Cinematic datacenter cloud api security shield real time threat

Radware unveils cloud service for unified API security

Fri, 23rd Jan 2026
#
firewalls
#
hybrid cloud
#
digital transformation
Radware launches cloud-based API Security Service unifying discovery, posture management and runtime defence to counter evolving API threats.
Hooded binary figure ai cyber threats glowing locked data shield

Experts warn AI era demands tougher data protection

Fri, 23rd Jan 2026
#
data protection
#
digital transformation
#
pam
Experts say AI-driven attacks and rampant data leaks mean organisations must verify outputs, curb collection and harden identity controls.
Cinematic financial data center cloud security encryption control

Data Privacy Day spotlight on control, resilience, design

Fri, 23rd Jan 2026
#
data protection
#
dr
#
ransomware
Data Privacy Day shifts focus from policy to proof, as firms embed control, resilience and design into complex hybrid data estates.
Cloud computing classroom open padlocks security risk training

Misconfigured cloud training labs open paths to attacks

Fri, 23rd Jan 2026
#
firewalls
#
hyperscale
#
cloud security
Misconfigured cloud training labs on AWS, Google Cloud and Azure expose major firms to live attacks via overly permissive access roles.
Sleek cybersecurity control room ai brain certified governance

CrowdStrike secures ISO 42001 AI governance standard

Fri, 23rd Jan 2026
#
malware
#
cloud security
#
phishing
CrowdStrike earns ISO 42001 AI governance certification for its Falcon platform, touting independently audited, responsible AI controls.
Corporate boardroom dusk holographic data shield trust meeting

Privacy shifts from compliance checkbox to market edge

Fri, 23rd Jan 2026
#
data protection
#
data analytics
#
digital transformation
Privacy is shifting from a legal checkbox to a strategic differentiator as watchdogs and customers demand proof of real-world data protection.
Rob 768x768

Exclusive: e2e-assure CEO on CNI defence from geopolitical cyberattacks

Fri, 23rd Jan 2026
#
firewalls
#
network infrastructure
#
digital transformation
Rob Demain warns that cyber campaigns on critical infrastructure are demanding behaviour-led defence over compliance.
Modern european factory ai robots zero trust cybersecurity

Industrial AI drives new approach to OT cyber security

Thu, 22nd Jan 2026
#
firewalls
#
cloud security
#
iot security
Industrial AI and IT/OT convergence are forcing factories to abandon closed networks and adopt hybrid, zero trust cyber security architectures.