CMOtech US - Technology news for CMOs & marketing decision-makers

Incident Response stories

Global upg. phase 2 partner blog header 9 1200x500px 1200x500 3c18ef3

How MH Enterprise turns trust into cybersecurity success

Today
#
firewalls
#
digital transformation
#
network security
MH Enterprise upgrades most SonicWall customers as trust-first guidance, rapid deployments and threat blocking drive growth across Egypt.
Flux result 6b2914cf d0e4 4149 91cd 5329a22168ef

Proofpoint tracks cargo theft gang's post-breach tactics

Today
#
endpoint protection
#
iot security
#
advanced persistent threat protection
Proofpoint says a cargo theft gang spent weeks inside a decoy network, probing banking, fleet payment and load board systems for fraud.
Flux result 929b3280 4f28 43e8 a8b0 ff57ea3c5716

Anthropic's 'Mythos' signals a new era of AI-driven cyber threats

Today
#
ransomware
#
devops
#
phishing
Anthropic is to give UK banks controlled access to its Mythos AI model, as financial firms brace for a new era of autonomous cyber threats.
Flux result d75cefc3 d52d 493d bd7f 2aa9a802a2d2

Cisco launches sovereign infrastructure portfolio across EMEA

Yesterday
#
firewalls
#
data protection
#
private cloud
Cisco rolls out sovereign infrastructure portfolio and expanded support for air-gapped on-premises systems across EMEA as data control demands intensify.
Flux result cbfa8703 77de 42c6 b26d 0085048d5349

Sysdig report says cloud security shifts to machine speed

Yesterday
#
digital transformation
#
pam
#
cloud security
Sysdig says companies are increasingly leaning on automated defence as AI-driven attacks accelerate, with machine identities now dominating cloud access.
Rishi

Mythos changes everything: Is your AI agent security ready?

Yesterday
#
firewalls
#
data protection
#
dr
Anthropic's Mythos spots corporate network attacks in hours, while security experts warn unmanaged AI agents are becoming a critical enterprise risk.
Flux result 39a6fe52 cd41 4db0 ad6c 28f68704fac4

Team Cymru launches Total Insights Feeds for threat data

Last week
#
malware
#
firewalls
#
siem
Team Cymru unveils Total Insights Feeds, a single-stream threat intelligence framework blending internet-wide scoring, context and automated risk tagging.
Flux result 648d1b86 1387 4d26 9306 60913d8cb5e6

FIRST conference highlights AI & CVE disclosure push

Last week
#
iot security
#
application security
#
supply chain
FIRST conference in Scottsdale draws 500-plus as security leaders and AI firms debate vulnerability disclosure, CWE's role and CVE's future.
Flux result b9088d52 ffc8 48b1 a485 cd96e7c6e378

OpenAI launches Trusted Access for Cyber with major names

Last week
#
firewalls
#
network security
#
cloud security
OpenAI expands Trusted Access for Cyber with Bank of America, BlackRock and others, backing defenders, researchers and open-source security teams.
Flux result cf1d72c7 0896 4001 be4b 0fdff84ead5d

Cyber insurance now common among North American SMBs

Last week
#
endpoint protection
#
cybersecurity insurance
#
mfa
ESET survey finds North American SMBs increasingly buying cyber cover, with insurers shaping controls and managed detection services after repeated breaches.
Flux result 8c7648fd 0876 430a 8451 50bb98addee3

Cork Cyber adds automated mapping to Vantage platform

Last week
#
digital transformation
#
cloud security
#
socs
Cork Cyber boosts Cork Vantage for MSPs with automated mapping, cutting manual work and improving asset accuracy across client, device and inbox records.
Cohesity

11:11 Systems named Cohesity's MSP Strategic Partner

Last week
#
data protection
#
dr
#
ransomware
11:11 Systems wins Cohesity FY2025 MSP Strategic Partner of the Year award as joint cyber recovery services gain traction.
Kavitha mariappan  chief transformation officer at rubrik

Rubrik survey warns of AI agents outpacing security

Last week
#
data protection
#
dr
#
digital transformation
Survey finds AI agents are spreading faster than security teams can track them, with most firms lacking visibility, rollback controls and identity governance.
Flux result 2ba0c9a5 5404 44f7 94ef e5d50265c6ec

Index Engines lands third straight CRN Storage 100 nod

Last week
#
storage
#
data protection
#
dr
Index Engines wins third straight CRN Storage 100 spot as cyber recovery demand rises and partners seek cleaner ransomware restoration.
Flux result 971dadc2 dd8b 4c6e 8468 c707f3c7e678

IBM unveils AI cyber defences against autonomous attacks

Last week
#
digital transformation
#
iot security
#
advanced persistent threat protection
IBM rolls out assessment and multi-agent security services to help large organisations spot AI-driven weaknesses and speed up remediation across complex systems.
Flux result 6c691a34 515d 4b81 8e88 0408697cb091

Ransomware activity stays high as new groups surge

Last week
#
ransomware
#
advanced persistent threat protection
#
supply chain
GuidePoint says ransomware attacks stayed elevated in Q1 as The Gentlemen surged, construction became a top target and extortion-only tactics spread.
Flux result 874008eb 69a5 4c98 a40f 5718013001a6

Artemis announces $70 million in seed funding for AI security

Last week
#
firewalls
#
siem
#
digital transformation
Artemis lands $70 million as investors back AI-driven cyber defence platform for real-time threat detection and response.
Flux result e4336e7b a328 4fd8 a6ca b050d73b6f11

Manufacturing leads ransomware targets in 2025 report

Last week
#
dr
#
vpns
#
ransomware
Manufacturing was the most targeted sector for ransomware in 2025, as Check Point counted 1,466 attacks worldwide amid rising supply chain exposure.
Flux result 0d975fee 42cc 4d6a bd7b 34ac4a1a019d

Security teams want AI tools under human oversight

Last week
#
firewalls
#
digital transformation
#
network security
Survey finds 77% of security professionals want AI tools in security operations kept under human oversight, as 88% adopt guardrails.
Flux result 74ce5946 2da6 4b6d 9888 4b59ef1216c5

Claroty adds Visibility Orchestration to xDome platform

Last week
#
saas
#
manufacturing
#
digital transformation
Claroty boosts xDome with Visibility Orchestration to turn patchy cyber-physical asset data into prioritised security tasks across critical operations.