TelcoNews India - Telecommunications news for ICT decision-makers

Enterprise security stories - Page 17

Modern office home desk zero trust ai network shield illustration

TCS, Zscaler expand partnership with AI workspace suite

Last month
#
firewalls
#
digital transformation
#
network security
TCS and Zscaler launch an AI-powered zero trust workspace platform blending security, observability and experience analytics for enterprises.
Australian office ai data governance secure central archive vault

Proofpoint unveils AI-first Nuclei archiving suite

Last month
#
saas
#
uc
#
surveillance
Proofpoint launches AI-first Nuclei suite to simplify archiving and compliance for small firms swamped by complex, multi-channel comms.
Night corporate office cybersecurity team incident response scene

LevelBlue unveils flexible funds-based cyber IR retainer

Last month
#
ransomware
#
devops
#
socs
LevelBlue launches Resilience Retainer, a flexible funds-based cyber incident response service with rapid SLAs and rollover security spend.
Australian office it team ai agent workflow automation jira saas security

Atlassian brings AI agents to Jira with MCP support

Last month
#
saas
#
devops
#
digital transformation
Atlassian launches Jira AI agents with MCP support, embedding governed automation in existing workflows rather than separate chat tools.
Secure server room ai agents access rings locked and revoked scene

SentinelOne unveils identity tools for human & AI use

Last month
#
data protection
#
pam
#
cloud security
SentinelOne launches identity tools to monitor and revoke access for human users and fast-moving AI agents beyond initial authentication.
Global upg

Upgrading firewalls into a high‑margin MSP revenue win

Last month
#
firewalls
#
network infrastructure
#
network security
New SonicWall firewall upgrades promise MSPs and MSSPs lower costs, higher margins and stronger security-driven recurring revenue.
Zero trust enterprise network all devices segmented connections

Netskope, Forescout expand zero trust to all devices

Last month
#
firewalls
#
hyperscale
#
network security
Netskope and Forescout link tools to push zero trust across managed and unmanaged devices, curbing lateral movement on local networks.
Sleek desktop pc ryzen tower open panel ai circuits showcase

AMD unveils Ryzen AI 400 chips for Copilot+ desktops

Last month
#
network infrastructure
#
semiconductors
#
edge computing
AMD has launched Ryzen AI 400 desktop and PRO chips, its first Copilot+ PC-ready desktop processors, promising up to 50 TOPS of local AI.
Jason merrick

Consolidation Wave Hits Infosec, Sparing CISOs From Tool Sprawl

Last month
#
firewalls
#
pam
#
mfa
Overwhelmed CISOs are driving a consolidation wave in cybersecurity, slashing tool sprawl to close security gaps and cut mounting costs.
Modern soc room biometric gate monitors digital identity privacy

Identity management tops 2026 security & IT agenda

Last month
#
firewalls
#
data protection
#
surveillance
Identity management is set to dominate 2026 security agendas as HID research shows rising convergence, biometrics use and privacy scrutiny.
Secure cloud shield infrastructure filtering data stream icons

Proofpoint adds threat defence to AWS Security Hub plan

Last month
#
ransomware
#
digital transformation
#
hyperscale
Proofpoint plugs Collaboration Protection into AWS Security Hub Extended Plan, folding email and collaboration threat defence into one AWS deal.
Singapore office 52

Yubico picks Singapore for new Asia Pacific HQ push

Last month
#
data protection
#
manufacturing
#
digital transformation
Yubico has chosen Singapore for a new global HQ, bolstering Asia Pacific operations as demand for phishing-resistant authentication grows.
Business pro using fingerprint phone shield biometric mfa secure

CrowdStrike unveils FalconID to combat AI-driven phishing

Last month
#
pam
#
mfa
#
cloud security
CrowdStrike launches FalconID, a “zero-friction” biometric MFA tool that binds logins to trusted devices to counter AI-powered phishing.
Consistent cctv

Consistent wins BIS-ER nod for 'Made in Bharat' CCTV

Last month
#
storage
#
data protection
#
smart home
Consistent Infosystems wins BIS-ER approval for its 4G and Wi‑Fi CCTV range, backing a 'Made in Bharat' pitch on safety and data localisation.
Ai brain circuit shields security icons blocking red attacks

F5 Labs unveils monthly AI model security leaderboards

Last month
#
data protection
#
devops
#
application security
F5 Labs launches monthly AI security leaderboards, ranking popular models on new indices of risk, resilience and cost under live attack.
Sleek secure cloud fortress interlocking shields identity access

BeyondTrust named Leader in 2026 GigaOm CIEM Radar

Last month
#
hybrid cloud
#
hyperscale
#
pam
BeyondTrust's Pathfinder platform has been named a Leader and Outperformer in GigaOm's 2026 CIEM Radar, praised for unified identity security.
Modern it ops room dashboards cloud shields security triage flow

Contrast integrates with ServiceNow for app risk triage

Sat, 28th Feb 2026
#
application security
#
socs
#
partner programmes
Contrast links its sensors with ServiceNow workflows to sync app and API risk data, aiming to cut false positives and speed remediation.
Black smartphone glowing abstract lock circuits hsm dark table

HIROH unveils quantum-ready encrypted phone platform

Sat, 28th Feb 2026
#
data protection
#
encryption
#
mdm
HIROH debuts a quantum-ready, end-to-end encrypted phone platform, bundling secure calls and messaging into its premium HIROH Phone.
Data sovereignty gaps europe canada middle east leaking cloud

Survey reveals data sovereignty gap despite high spend

Sat, 28th Feb 2026
#
data protection
#
hybrid cloud
#
encryption
Firms spend millions on data sovereignty and rate awareness high, yet Kiteworks survey finds persistent breaches and cross-border exposure.
3d cloud shields aws data center real time security streams

Upwind joins AWS Security hub extended plan for CNAPP

Sat, 28th Feb 2026
#
data protection
#
digital transformation
#
hyperscale
Upwind plugs its CNAPP into AWS Security Hub Extended plan to feed runtime data into findings and streamline cloud security procurement.