ChannelLife Australia - Industry insider news for technology resellers

Infosec stories - Page 25

Kingston fips

Kingston gains FIPS 140-3 Level 3 for IronKey USBs

Wed, 28th Jan 2026
#
storage
#
data protection
#
iot security
Kingston wins FIPS 140-3 Level 3 for its IronKey Keypad 200 USBs, making it the first supplier with three drives at this stringent standard.
Ai driven soca enterprise security center cloud onprem unified maps

Tenable debuts AI exposure tool for unified cyber risk

Wed, 28th Jan 2026
#
digital transformation
#
cloud security
#
application security
Tenable launches Tenable One AI Exposure to map, govern and reduce AI-driven cyber risk across cloud, SaaS, APIs and on-prem estates.
Cybersecurity firm merger glass buildings lock bridge clouds

LevelBlue buys Alert Logic MDR unit in Fortra pact

Wed, 28th Jan 2026
#
firewalls
#
data protection
#
cloud security
LevelBlue is buying Fortra's Alert Logic MDR business in a strategic pact, expanding its global managed security and technology partnership.
001 coming soon a new layer of privacy five years in the making main thumbnail

Samsung readies anti-shoulder surf privacy feature

Wed, 28th Jan 2026
#
data protection
#
mdm
#
physical security
Samsung is preparing a Galaxy privacy tool that blurs on-screen details to thwart shoulder surfers on commutes and in crowded spaces.
Australian boardroom glowing lock table data lifecycle privacy

AI and data breaches force new approach to privacy

Wed, 28th Jan 2026
#
data protection
#
hybrid cloud
#
digital transformation
Rising data breaches and rapid AI adoption are forcing Australian boards to rethink privacy, shifting focus from perimeter security to full data lifecycle.
Global secure enterprise network automated certificate lifecycle

DigiCert named IDC MarketScape leader in CLM market

Wed, 28th Jan 2026
#
firewalls
#
hybrid cloud
#
digital transformation
DigiCert has been named a Leader in IDC MarketScape's first global report on certificate lifecycle management, citing automation and scale.
Sydney glass tower night ai brain screens shadow ai locks shields

AI security gaps expose 'shadow AI' risk in Australia

Wed, 28th Jan 2026
#
data protection
#
digital transformation
#
physical security
Australian firms race ahead with AI, yet weak governance and identity controls leave 'shadow AI' as a growing security blind spot.
Australian corporate office night ai data privacy lock map

AI forces Australian firms to make privacy a priority

Wed, 28th Jan 2026
#
data protection
#
digital transformation
#
cloud security
AI's rapid spread is forcing Australian organisations to treat data privacy as a constant priority, reshaping risk, policy and vendor scrutiny.
Moody person laptop translucent shields cookies dark web privacy risks

Data Privacy Week spotlights app conflicts, web risks

Wed, 28th Jan 2026
#
data protection
#
vpns
#
physical security
Data Privacy Week warns overlapping security apps and hidden web trackers are eroding consumer safety and exposing firms to fresh risks.
Moody night corporate tower swoosh architecture massive data breach

Nike probes suspected cyberattack & huge data leak

Wed, 28th Jan 2026
#
firewalls
#
data protection
#
ransomware
Nike is probing a suspected cyberattack after a hacker group claimed to leak 1.4TB of internal data, raising supply chain security fears.
Hybrid cloud security dashboard layers shields risk gauges modern

Fortinet boosts FortiCNAPP to sharpen cloud risk view

Wed, 28th Jan 2026
#
firewalls
#
data protection
#
hybrid cloud
Fortinet has upgraded FortiCNAPP with network, data and runtime signals to sharpen cloud risk scoring and cut alert overload for security teams.
Raymond schippers

Hybrid mesh security emerges to counter AI cyber risks

Tue, 27th Jan 2026
#
firewalls
#
ransomware
#
hybrid cloud
As hybrid IT sprawl fuels blind spots and AI-driven attacks, experts say only a zero trust, hybrid mesh rethink can secure modern networks.
Mathieu chevalier(2)

Genetec sets privacy rules for physical security data

Tue, 27th Jan 2026
#
data protection
#
smart cities
#
surveillance
Genetec issues privacy rules for physical security data, urging clear limits, encryption and ongoing cyber defence for surveillance systems.
Zero trust office workstation vault laptop secure chains apps

Keeper brings zero-trust access governance to Slack

Mon, 26th Jan 2026
#
hybrid cloud
#
digital transformation
#
encryption
Keeper rolls out a zero-trust Slack integration, turning chat-based approvals into governed workflows while keeping enforcement in Keeper Vault.
Moody anxious user vishing attack shadow screen mirroring mfa bypass

Okta warns of real-time vishing kits defeating MFA

Mon, 26th Jan 2026
#
mfa
#
crypto
#
physical security
Okta warns new real-time vishing kits can hijack browser sessions during calls, tricking users into defeating non‑phishing‑resistant MFA.
Unnamed  3 (2)

UK bill accelerates shift to offensive cyber security

Sat, 24th Jan 2026
#
firewalls
#
endpoint protection
#
devops
New UK cyber bill pushes critical sectors towards continuous offensive security testing as state-backed and criminal threats intensify.
Cyderes

Cyderes names Lana Knop Chief Product Officer for AI push

Sat, 24th Jan 2026
#
saas
#
siem
#
digital transformation
Cyderes appoints Lana Knop as Chief Product Officer to steer post‑Lucidum product strategy and drive a new wave of AI‑powered security services.
Cinematic us soc ai brain highlighting critical network threats

Check Point unveils AI-ready continuous exposure management

Sat, 24th Jan 2026
#
firewalls
#
network security
#
cloud security
Check Point launches AI-ready Exposure Management to plug remediation gaps, unifying threat intelligence, prioritisation and automated fixes.
Image

SonicWall pushes unified automation for faster cyber defence

Fri, 23rd Jan 2026
#
malware
#
firewalls
#
ransomware
SonicWall launches unified automation tools to cut alert fatigue, speed cyber threat remediation and streamline overstretched security teams.
Moody office worker phishing remote access cursor corporate net

Phishing campaign exploits RMM tools for stealthy access

Fri, 23rd Jan 2026
#
firewalls
#
network security
#
phishing
Phishing campaign uses stolen logins and trusted RMM tools like GoTo Resolve and LogMeIn to quietly maintain access to corporate systems.