TechDay US - America's technology news network

Risk Management stories - Page 23

Flat data center hybrid cloud network map segmented risk zones blocked lateral

Illumio widens risk visibility with Network Posture

Last month
#
firewalls
#
network infrastructure
#
hybrid cloud
Illumio adds Network Posture to its Insights platform, using an AI security graph to expose and contain lateral movement risk across networks.
Enterprise security ops room layered dashboard attack paths runtime validation

Rapid7 adds runtime validation to Exposure Command

Last month
#
data protection
#
hybrid cloud
#
digital transformation
Rapid7's Exposure Command now adds runtime validation and DSPM to rank real attack paths in hybrid and multi-cloud environments.
Bodie lowe

Wallarm appoints new chief executive as AI focus grows

Last month
#
cloud security
#
application security
#
physical security
Wallarm names Shayne Higdon chief executive in leadership reshuffle as it pivots from pure API protection to securing wider AI-driven risks.
Nyc cybersecurity ops center ransomware intercept layers ids

Morphisec adds AI defence to anti-ransomware suite

Last month
#
dr
#
ransomware
#
endpoint protection
Morphisec unveils Adaptive AI Defence to spot shadow AI, block compromised agents and thwart AI-driven ransomware in real time.
Editorial soc analyst reviewing ai assisted cyber defense board oversight

Conifers expands AI cyber tools with clear oversight

Last month
#
digital transformation
#
advanced persistent threat protection
#
socs
Conifers updates its CognitiveSOC platform with auditable, transparent AI investigations to boost cyber defence oversight and trust.
Enterprise security permission sprawl cleanup keys padlocks flat

Opal launches AI tools to tackle unused permissions

Last month
#
data analytics
#
digital transformation
#
pam
Opal Security unveils AI agents and tools to root out unused access rights as research shows permissions sprawl swamping security teams.
Corporate security ops room network map ai agents permissions governance

Entro launches AI agent governance tool for enterprises

Last month
#
data protection
#
digital transformation
#
cloud security
Entro launches AGA to map, monitor and control AI agents in enterprises, tackling shadow AI and non-human identity risks at scale.
Editorial corporate network cybersecurity analysts limited testing shadowed connections risk

Firms test just 32% of attack surface, study finds

Last month
#
devops
#
digital transformation
#
cloud security
Organisations test just a third of their attack surface as reliance on agentic AI grows, raising fresh concerns over unseen cyber risks.
Australian boardroom reviewing event travel expense risk charts

HeadBox urges tighter control of corporate events spend

Last month
#
saas
#
risk & compliance
#
erp
HeadBox warns that fragmented control of meetings and events spend is exposing corporates to rising cost, compliance and governance risks.
Editorial cybersecurity analyst pen test results attack path cloud diagrams

Cobalt adds AI features to boost continuous pentests

Last month
#
devops
#
cloud security
#
application security
Cobalt weaves AI into its pentesting platform, automating recon and triage while keeping human experts on complex attack paths.
Secure government ai data center control room national security

Seekr, GDIT partner on secure agentic AI for government

Last month
#
data protection
#
data analytics
#
digital transformation
Seekr and GDIT team up to deliver secure, explainable agentic AI platforms for sensitive government operations across cloud and edge.
Corporate it security control room flat illustration pen testing

Cobalt unveils service to manage enterprise pentesting

Last month
#
devops
#
cloud security
#
application security
Cobalt launches Security Program Manager service to run enterprise pentesting, align tests with business goals and speed up remediation.
Secure data vault cloud ai agents network shield lock illustration

Bonfy unveils ACS 2.0 to secure data for AI agents

Last month
#
data protection
#
siem
#
encryption
Bonfy launches ACS 2.0, a cross-channel data security platform to monitor and control how AI agents access, process and share content.
Office worker desktop redacted sensitive data blurred ui locks

Polygraf debuts desktop AI tool to curb data leaks

Last month
#
data protection
#
endpoint protection
#
socs
Polygraf unveils a desktop AI overlay that flags sensitive data in real time as staff type, aiming to curb leaks across workplace tools.
It security operations center humans and ai agents unified network

Menlo unveils browser platform to secure rising AI agents

Last month
#
firewalls
#
data protection
#
network security
Menlo launches a browser-based platform to govern human users and AI agents with unified security controls as machine traffic surges.
Enterprise it security control room ai agents zero trust gateways

Token Security unveils intent-based AI agent controls

Last month
#
digital transformation
#
cloud security
#
advanced persistent threat protection
Token Security launches intent-based controls to govern AI agents' access by purpose, aiming to curb over-privileged, autonomous system behaviour.
Moody soc night cybersecurity analyst ai threat maps hidden agents

Coalfire launches AI threat hunting for shadow agents

Last month
#
firewalls
#
data protection
#
digital transformation
Coalfire's new DivisionHex service hunts shadow AI and rogue agents as most firms report AI-driven security incidents without proper oversight.
Ai cyber risk weak identity controls server room breached

Firms relax identity controls to speed risky AI rollouts

Last month
#
digital transformation
#
pam
#
it automation
Rushing to embrace AI, most firms are easing identity controls despite visibility gaps around powerful non-human and AI-linked accounts.
Software supply chain security dashboard global infrastructure

Keysight unveils SBOM Manager to meet new cyber rules

Last month
#
application security
#
physical security
#
devsecops
Keysight debuts SBOM Manager to automate software bills of materials as EU and US cyber rules tighten transparency and compliance demands.
Overworked apac cybersecurity analyst night soc moody blue monitors

Alert overload leaves mid-market security teams exposed

Last month
#
digital transformation
#
advanced persistent threat protection
#
socs
Manual context-gathering leaves mid-market security teams missing threats, as 79% rely on third parties to spot attacks their tools overlook.