ChannelLife Australia - Industry insider news for technology resellers

Supply Chain Security stories - Page 3

Flux result feea1db1 e988 45e3 b328 50fca0657709

NCC Group warns DC power regulation is a cyber risk

This month
#
hyperscale
#
iot security
#
dc
NCC Group says DC power regulation now sits in the cyber-physical attack surface, warning that firmware flaws and supply chains could let hackers disrupt critical systems.
Flux result 2134aca4 e1cc 446a 8945 80553175f1f3

Malware surge in open source software alarms firms

This month
#
malware
#
devops
#
application security
Open source malware advisories jumped in 2025 as Endor Labs warned that firms are under-prepared and budgets lag the threat.
Flux result f452b7e2 77ad 41cf 8342 a15ea8ce623a

Google links axios attack to suspected North Korean actor

This month
#
devops
#
advanced persistent threat protection
#
supply chain
Google says the axios npm supply chain attack was linked to suspected North Korean actor UNC1069, raising fears for Australian and New Zealand firms.
Aidan x marija x netskope and macquarie

Macquarie wins Netskope APJ managed services award

This month
#
data protection
#
network infrastructure
#
ransomware
Macquarie Technology Group lands Netskope's APJ managed service honour as its sovereign government and telecoms security push gathers pace.
Flux result ab916ad7 2d8e 4673 98e2 bc7cf7baf986

Forrester warns Middle East conflict will squeeze IT budgets

This month
#
digital transformation
#
hyperscale
#
public cloud
Forrester says Middle East tensions will push up infrastructure costs, sharpen cloud and AI spending scrutiny, and heighten cyber risk.
Govind rammurthy  ceo and managing director  escan  1

eScan wins AV-TEST award for enterprise protection

This month
#
firewalls
#
ransomware
#
endpoint protection
eScan bags AV-TEST honour as Enterprise EDR is named among the few products to win Best Advanced Protection for corporate users.
Flux result 4b7be8d2 61e2 4407 af1c 1088978c23b7

North Korean operatives target Australian jobs, DTEX warns

Last month
#
hcm
#
advanced persistent threat protection
#
physical security
DTEX warns North Korean operatives are using false identities to secure Australian tech jobs, with some applicants aided by AI and deepfakes.
Flux result 2dd6e765 d72a 468e ae19 7b5d4c3c4c21

Codenotary launches AgentMon for AI agent oversight

Last month
#
data protection
#
digital transformation
#
application security
Codenotary unveils AgentMon to help Chief Information Officers and security teams track AI agent behaviour, costs and policy risks.
Flux result b5f37711 6539 406f 9877 407f52f3e65f

Codenotary launches AgentX for Linux security automation

Last month
#
virtualisation
#
devops
#
hybrid cloud
Codenotary unveils AgentX to automate Linux security operations across hybrid cloud and on-premises systems while keeping administrators in control.
Flux result ff85c0f6 aa13 4ff7 ae42 c0b79c19e791

Percona & Chainguard launch supported database images

Last month
#
virtualisation
#
devops
#
digital transformation
Percona teams up with Chainguard to offer supported, hardened container images for MySQL, PostgreSQL and MongoDB databases.
Email attachment20260327 3694396 a95v2y

Manufacturers face CMMC readiness gap in defence chain

Last month
#
ransomware
#
iot security
#
supply chain
Small US defence manufacturers face CMMC readiness shortfalls as cybersecurity checks tighten, with many underestimating the work needed to win contracts.
Flux result c9914888 9e4c 4a56 a107 b3dc6dd433be

DigiCert posts record ARR after Valimail acquisition

Last month
#
saas
#
firewalls
#
digital transformation
DigiCert scales digital trust platform with Valimail deal as Q4 annual recurring revenue hits a company record and bookings top guidance.
Flux result 86c5d3ff 8544 4b88 ac41 93781b8158bc

AppOmni adds Heisenberg mode after LiteLLM supply attack

Last month
#
virtualisation
#
cloud security
#
application security
AppOmni upgrades Heisenberg to help teams trace GitHub Actions and spot tainted dependencies after the LiteLLM supply chain breach.
Flux result 02787d00 65b3 4fa4 8006 314fc884629f

HPE boosts AI security across networking & recovery

Last month
#
virtualisation
#
firewalls
#
data protection
HPE rolls out AI governance, recovery and post-quantum updates across networking and storage to strengthen cyber resilience in distributed operations.
Flux result 89c892f4 bb6f 446d ab90 b15476e99e4f

Phishing surge targets Gulf after Iran-Israel tensions

Last month
#
malware
#
firewalls
#
network security
Bitdefender reports a 130% jump in phishing and malware activity across Gulf markets, with fake invoices and banking lures driving attacks.
Email attachment20260326 1927777 rp0pkf

Auror named LPRC's most engaged partner on retail crime

Last month
#
data analytics
#
supply chain
#
risk & compliance
Auror recognised by Loss Prevention Research Council for engaging retailers and police on organised retail crime in the US.
Flux result 110baaa4 c6d3 4b1c a508 287d019f2a12

Vorlon launches tools for AI agent security response

Last month
#
data protection
#
cloud security
#
socs
Vorlon unveils AI Agent Flight Recorder and Action Centre to help security teams trace activity across SaaS apps and coordinate responses.
Security experts ops room governance autonomous ai agents cloud shield

Cloud Security Alliance launches CSAI for agentic AI

Last month
#
cloud security
#
iam
#
supply chain
Cloud Security Alliance unveils CSAI foundation to set rules, standards and assurance for securing autonomous agentic AI systems.
Flux result 0b725e6f 488f 44c4 b57e 5c23a2bc516f

NetRise launches Provenance to trace open source risk

Last month
#
devops
#
iot security
#
iot
NetRise unveils Provenance, a tool to trace open source maintainers and stop risky dependencies before they spread through software.
Cybersecurity analyst ai red teaming prompt injection shield branching

Novee launches AI red teaming tool for LLM app risks

Last month
#
devops
#
cloud security
#
application security
Novee unveils an autonomous AI red teaming tool to probe LLM apps for prompt injection, jailbreaks and other emerging security flaws.