CFOtech Asia - Technology news for CFOs & financial decision-makers

Enterprise security stories

Shiv ramji  president auth0 headshot

Rise of AI Agents introduces new infosec risk: Okta

Yesterday
#
data protection
#
digital transformation
#
mfa
Okta warns that surging numbers of uncontrolled AI agents pose a major identity and access risk as they become the new digital workforce.
Global security leaders roundtable ai governance cyber risk

Global CISO Council launched to steer AI governance

Last week
#
data protection
#
advanced persistent threat protection
#
risk & compliance
EC-Council launches the Global CISO Council to unify AI governance, tech risk oversight and regulatory response for senior security leaders.
Shadowy hacker cyber attack on hospital mobile device management

Stryker probes global cyber attack via MDM systems

Last week
#
dr
#
ransomware
#
iot security
Stryker says a cyber attack disrupted internal systems, with investigators examining mobile device tools as experts warn of rising state-linked threats.
Remote employee secure dns protection roaming wifi home office

DNSFilter adds DNS PreCheck to protect roaming staff

Last week
#
firewalls
#
vpns
#
endpoint protection
DNSFilter unveils DNS PreCheck to keep DNS security intact for roaming staff, blocking malicious domains across shifting Wi-Fi networks.
Secure data fortress ev hospital cloud with encrypted streams

Xiid secures EV charging, healthcare AI & multi-cloud

Last week
#
firewalls
#
data protection
#
vpns
Xiid inks trio of security deals to harden EV charging, healthcare AI data and multi-cloud landing zones against network-based attacks.
Ai cyberattack shadow figure robotscreens red alarm extortion

AI agents drive surge in cyber threats & extortion

Last week
#
malware
#
data protection
#
ransomware
AI agents are fuelling a new wave of cyber risk, as criminals weaponise automation to speed up ransomware and sharpen extortion tactics.
Hybrid it infrastructure network map cloud iot security visual

Zero Networks unveils real-time Network Map 2.0 tool

Last week
#
virtualisation
#
firewalls
#
ransomware
Zero Networks has launched Network Map 2.0, a real-time 'living map' to visualise hybrid networks and tighten microsegmentation security.
Dino dimarino

Tenable appoints Dino DiMarino to drive AI security growth

Last week
#
network infrastructure
#
digital transformation
#
cloud security
Tenable appoints veteran cybersecurity sales leader Dino DiMarino as chief revenue officer to drive global growth in exposure and AI risk.
Azure cloud security shield over servers and containers illustration

Upwind brings runtime cloud security platform to Azure

Last week
#
digital transformation
#
cloud security
#
advanced persistent threat protection
Upwind integrates its runtime cloud security with Azure, offering unified protection and Sentinel tie-ins via the Microsoft Marketplace.
Patrick

SonicWall revamps partner programme & appoints CRO

Last week
#
firewalls
#
network security
#
partner programmes
SonicWall overhauls its SecureFirst Partner Program and appoints Patrick O'Donnell as CRO to drive partner-led sales and managed services.
Chandrodaya prasad

Secure by default: Moving beyond secure by design

Last week
#
firewalls
#
hyperscale
#
network security
SonicWall champions 'Secure by Default', promising built-in, automated protection that tames tool sprawl and misconfigurations at scale.
Linux penguin shield cracked root key broken container isolation

CrackArmour flaws in AppArmour risk Linux root access

Last week
#
cloud security
#
advanced persistent threat protection
#
physical security
CrackArmour flaws in AppArmour could let local Linux users gain root, bypass namespaces and weaken container isolation at scale.
Enterprise datacenter sql server patch technicians security shield

Microsoft patches major SQL Server flaw in March update

Last week
#
firewalls
#
network security
#
mfa
Microsoft's March Patch Tuesday fixes 77 flaws, including a severe SQL Server bug that could grant attackers sysadmin rights remotely.
Secure data center ai brain zero trust hybrid cloud crypto

F5 boosts AI app security with zero trust, post-quantum

Last week
#
firewalls
#
encryption
#
hyperscale
F5 expands its app security platform with AI risk tools, zero trust access and post-quantum crypto to protect modern hybrid workloads.
Raghu nandakumara illumio

Big firms detect cyberattacks but fail to contain them

Last week
#
firewalls
#
ransomware
#
hybrid cloud
Big businesses can spot cyber intrusions but struggle to contain them fast, leaving cloud-era networks exposed to deeper, costlier breaches.
Global socc night ai brain cloud alerts multinational team

HackerOne warns of widening AI security & testing gap

Last week
#
devops
#
digital transformation
#
cloud security
HackerOne warns AI rollouts are outpacing security, with 89% of organisations lacking full testing and incidents driving up costs.
Corporate cyber network with warning nodes and security monitoring

Vicarius unveils vIntelligence for continuous validation

Last week
#
endpoint protection
#
advanced persistent threat protection
#
soc
Vicarius launches vIntelligence to continuously validate real-world exploitability and close the loop between detection, remediation and proof.
Home office devices suspicious messages shields locks flat vector

Norton unveils Genie scam detection assistant in ChatGPT

Last week
#
cloud security
#
phishing
#
physical security
Norton launches Genie scam assistant in ChatGPT, letting users tag @Norton to analyse emails, texts, images and links for fraud risks.
Unified enterprise security control room cloud saas ai firewalls

Red Access unveils firewall-native, agentless SSE layer

Last week
#
saas
#
firewalls
#
data protection
Red Access launches firewall-native, agentless SSE layer, promising hours-long rollout and reduced complexity for securing web, SaaS and GenAI use.
Moody cloud padlock human silhouettes identity theft pixels

Cloud identity compromise now drives most cyber attacks

Last week
#
malware
#
uc
#
firewalls
Cloud identity compromise now drives over 80% of cyber incidents, as attackers increasingly abuse trusted accounts and workplace tools.