CMOtech US - Technology news for CMOs & marketing decision-makers

Enterprise security stories - Page 13

Cyber ops center iran vs west global threat map oil refinery silhouette

Horizon3.ai opens Iranian cyber threat intel to all

Last month
#
dr
#
devops
#
surveillance
Horizon3.ai opens Iranian cyber threat intel to all NodeZero users as Western organisations brace for state-backed digital retaliation.
Developer workstation ai security shields protecting supply chain

Checkmarx revamps AI-era app security with new agents

Last month
#
devops
#
application security
#
devsecops
Checkmarx overhauls its One platform with AI-native security agents to guard fast-moving, agentic development and AI software supply chains.
Secure datacenter with shielded servers and vetted oss packages flow

ActiveState unveils Curated Catalog for safer code

Last month
#
application security
#
devsecops
#
supply chain
ActiveState launches Curated Catalog, a private, pre-vetted open source repository to tighten software supply chain security for enterprises.
Glowing fintech network shield smartphone fingerprint security

XConnect & SONIO team up to fight fraud in fintech

Last month
#
gaming
#
data protection
#
mfa
XConnect links its mobile network fraud signals into SONIO's identity platform to tighten onboarding and compliance for fintech and gambling.
Secure cloud fortress identity governance ai humans robots

SailPoint & AWS ally on AI agent identity governance

Last month
#
saas
#
digital transformation
#
hyperscale
SailPoint strikes multi-year AWS deal to govern fast-growing AI agent identities with unified controls across human and machine access.
Email attachment20260317 1585473 vn9nrh

Nozomi named Leader in Gartner CPS security ranking

Last month
#
iot security
#
iot
#
advanced persistent threat protection
Nozomi again lands in Gartner's Leaders quadrant for CPS protection, topping four key use cases in the 2026 Critical Capabilities report.
Daniel bernard headshot

CrowdStrike & Nvidia unveil secure AI agent blueprint

Last month
#
hyperscale
#
cloud security
#
dc
CrowdStrike and Nvidia launch a secure AI agent blueprint and MDR tools, promising faster probes and tighter control over autonomous systems.
Shiv ramji  president auth0 headshot

Rise of AI Agents introduces new infosec risk: Okta

Last month
#
data protection
#
digital transformation
#
mfa
Okta warns that surging numbers of uncontrolled AI agents pose a major identity and access risk as they become the new digital workforce.
Shadowy hacker cyber attack on hospital mobile device management

Stryker probes global cyber attack via MDM systems

Last month
#
dr
#
ransomware
#
iot security
Stryker says a cyber attack disrupted internal systems, with investigators examining mobile device tools as experts warn of rising state-linked threats.
Global security leaders roundtable ai governance cyber risk

Global CISO Council launched to steer AI governance

Last month
#
data protection
#
advanced persistent threat protection
#
risk & compliance
EC-Council launches the Global CISO Council to unify AI governance, tech risk oversight and regulatory response for senior security leaders.
Remote employee secure dns protection roaming wifi home office

DNSFilter adds DNS PreCheck to protect roaming staff

Last month
#
firewalls
#
vpns
#
endpoint protection
DNSFilter unveils DNS PreCheck to keep DNS security intact for roaming staff, blocking malicious domains across shifting Wi-Fi networks.
Secure data fortress ev hospital cloud with encrypted streams

Xiid secures EV charging, healthcare AI & multi-cloud

Last month
#
firewalls
#
data protection
#
vpns
Xiid inks trio of security deals to harden EV charging, healthcare AI data and multi-cloud landing zones against network-based attacks.
Ai cyberattack shadow figure robotscreens red alarm extortion

AI agents drive surge in cyber threats & extortion

Last month
#
malware
#
data protection
#
ransomware
AI agents are fuelling a new wave of cyber risk, as criminals weaponise automation to speed up ransomware and sharpen extortion tactics.
Hybrid it infrastructure network map cloud iot security visual

Zero Networks unveils real-time Network Map 2.0 tool

Last month
#
virtualisation
#
firewalls
#
ransomware
Zero Networks has launched Network Map 2.0, a real-time 'living map' to visualise hybrid networks and tighten microsegmentation security.
Office dusk executives over chaotic server room cyber defense

Midmarket firms overconfident as cyber tools fall short

Last month
#
devops
#
digital transformation
#
cloud security
Midmarket security chiefs brim with confidence yet lack the tools, staff and speed to keep pace with fast-moving cyber threats, survey finds.
Dino dimarino

Tenable appoints Dino DiMarino to drive AI security growth

Last month
#
network infrastructure
#
digital transformation
#
cloud security
Tenable appoints veteran cybersecurity sales leader Dino DiMarino as chief revenue officer to drive global growth in exposure and AI risk.
Secure data center corridor vault door quantum safe crypto

Forward Edge-AI unveils 12-month post-quantum roadmap

Last month
#
data protection
#
quantum computing
#
fleet management
Forward Edge-AI unveils a seven-phase post-quantum crypto playbook, giving regulators and critical sectors a 12-month migration roadmap.
Azure cloud security shield over servers and containers illustration

Upwind brings runtime cloud security platform to Azure

Last month
#
digital transformation
#
cloud security
#
advanced persistent threat protection
Upwind integrates its runtime cloud security with Azure, offering unified protection and Sentinel tie-ins via the Microsoft Marketplace.
Patrick

SonicWall revamps partner programme & appoints CRO

Last month
#
firewalls
#
network security
#
partner programmes
SonicWall overhauls its SecureFirst Partner Program and appoints Patrick O'Donnell as CRO to drive partner-led sales and managed services.
Chandrodaya prasad

Secure by default: Moving beyond secure by design

Last month
#
firewalls
#
hyperscale
#
network security
SonicWall champions 'Secure by Default', promising built-in, automated protection that tames tool sprawl and misconfigurations at scale.