SecurityBrief India - Technology news for CISOs & cybersecurity decision-makers

Risk Management stories - Page 17

Editorial hybrid cloud enterprise it team secure network governance

AI drives move to hybrid cloud amid sovereignty fears

Last month
#
data protection
#
private cloud
#
hybrid cloud
Enterprises shift AI workloads to hybrid and private clouds as digital sovereignty, governance and vendor lock-in fears reshape strategy.
Global cities cyber attacks fragile chains cracked data shards

Kroll warns of widening gap in global cyber resilience

Last month
#
dr
#
devops
#
digital transformation
Kroll warns boards are overestimating cyber resilience as attacks cost firms an average USD $2.2 million a year and response plans lag reality.
Secure austrian digital infrastructure vault fingerprint card network

TACEO launches shared network for finance, identity, AI

Last month
#
data protection
#
digital transformation
#
encryption
Austrian startup TACEO unveils encrypted shared network to run finance, identity and AI workloads without exposing sensitive data.
It security ops room analysts monitoring cloud map ai agent icons identity gaps

Delinea warns AI adoption is widening identity gaps

Last month
#
data protection
#
digital transformation
#
pam
Delinea warns that rapid AI rollout is eroding identity controls, leaving machine accounts exposed and widening security blind spots.
Indian corporate team boardroom collaboration ethical leadership sustainability

HCLTech named among world's most ethical companies

Last month
#
hcm
#
supply chain
#
risk & compliance
HCLTech has been named among the 2026 World's Most Ethical Companies by Ethisphere, securing recognition for a third consecutive year.
Hybrid it security control room cloud mac okta github network

BloodHound expands identity attack path mapping reach

Last month
#
data protection
#
encryption
#
pam
SpecterOps broadens BloodHound Enterprise to map identity attack paths across Okta, GitHub and Jamf-managed Macs in hybrid environments.
Indian corporate boardroom secure data protection risk ethics

HCLTech wins Ethisphere ethics accolade for third year

Last month
#
data protection
#
supply chain
#
risk & compliance
HCLTech has been named one of Ethisphere's 2026 World's Most Ethical Companies, securing the ethics accolade for a third consecutive year.
Flat data center hybrid cloud network map segmented risk zones blocked lateral

Illumio widens risk visibility with Network Posture

Last month
#
firewalls
#
network infrastructure
#
hybrid cloud
Illumio adds Network Posture to its Insights platform, using an AI security graph to expose and contain lateral movement risk across networks.
Enterprise security ops room layered dashboard attack paths runtime validation

Rapid7 adds runtime validation to Exposure Command

Last month
#
data protection
#
hybrid cloud
#
digital transformation
Rapid7's Exposure Command now adds runtime validation and DSPM to rank real attack paths in hybrid and multi-cloud environments.
Editorial soc analyst reviewing ai assisted cyber defense board oversight

Conifers expands AI cyber tools with clear oversight

Last month
#
digital transformation
#
advanced persistent threat protection
#
socs
Conifers updates its CognitiveSOC platform with auditable, transparent AI investigations to boost cyber defence oversight and trust.
Corporate security ops room network map ai agents permissions governance

Entro launches AI agent governance tool for enterprises

Last month
#
data protection
#
digital transformation
#
cloud security
Entro launches AGA to map, monitor and control AI agents in enterprises, tackling shadow AI and non-human identity risks at scale.
Australian boardroom reviewing event travel expense risk charts

HeadBox urges tighter control of corporate events spend

Last month
#
saas
#
risk & compliance
#
erp
HeadBox warns that fragmented control of meetings and events spend is exposing corporates to rising cost, compliance and governance risks.
Editorial cybersecurity analyst pen test results attack path cloud diagrams

Cobalt adds AI features to boost continuous pentests

Last month
#
devops
#
cloud security
#
application security
Cobalt weaves AI into its pentesting platform, automating recon and triage while keeping human experts on complex attack paths.
Corporate it security control room flat illustration pen testing

Cobalt unveils service to manage enterprise pentesting

Last month
#
devops
#
cloud security
#
application security
Cobalt launches Security Program Manager service to run enterprise pentesting, align tests with business goals and speed up remediation.
Secure data vault cloud ai agents network shield lock illustration

Bonfy unveils ACS 2.0 to secure data for AI agents

Last month
#
data protection
#
siem
#
encryption
Bonfy launches ACS 2.0, a cross-channel data security platform to monitor and control how AI agents access, process and share content.
Enterprise it security control room ai agents zero trust gateways

Token Security unveils intent-based AI agent controls

Last month
#
digital transformation
#
cloud security
#
advanced persistent threat protection
Token Security launches intent-based controls to govern AI agents' access by purpose, aiming to curb over-privileged, autonomous system behaviour.
Moody soc night cybersecurity analyst ai threat maps hidden agents

Coalfire launches AI threat hunting for shadow agents

Last month
#
firewalls
#
data protection
#
digital transformation
Coalfire's new DivisionHex service hunts shadow AI and rogue agents as most firms report AI-driven security incidents without proper oversight.
Ai cyber risk weak identity controls server room breached

Firms relax identity controls to speed risky AI rollouts

Last month
#
digital transformation
#
pam
#
it automation
Rushing to embrace AI, most firms are easing identity controls despite visibility gaps around powerful non-human and AI-linked accounts.
Software supply chain security dashboard global infrastructure

Keysight unveils SBOM Manager to meet new cyber rules

Last month
#
application security
#
physical security
#
devsecops
Keysight debuts SBOM Manager to automate software bills of materials as EU and US cyber rules tighten transparency and compliance demands.
Overworked apac cybersecurity analyst night soc moody blue monitors

Alert overload leaves mid-market security teams exposed

Last month
#
digital transformation
#
advanced persistent threat protection
#
socs
Manual context-gathering leaves mid-market security teams missing threats, as 79% rely on third parties to spot attacks their tools overlook.