ChannelLife Australia - Industry insider news for technology resellers

Supply Chain Security stories - Page 4

Corporate security vendor risk ai compliance dashboard team review

Drata launches AI tools for risk reviews & trust centres

Last month
#
cloud security
#
rpa
#
supply chain
Drata rolls out agentic AI tools to speed third-party risk reviews, automate security questionnaires and rapidly build online trust centres.
Software engineer reviewing branching dependency tree upgrade success green

Sonatype finds live data beats larger AI models on upgrades

Last month
#
devops
#
application security
#
supply chain
Sonatype says smaller AI tied to live software data can outsecure larger models on dependency upgrades, slashing risk and cost.
Editorial storm cloud over server racks cracked padlocks data risk

Red Hat survey finds cloud security incidents rife

Last month
#
data protection
#
digital transformation
#
cloud security
Red Hat survey finds 97% of organisations hit by cloud-native security incidents, forcing delays, higher costs and loss of customer trust.
Clean isometric data center control room ai workflow ux vm container clusters

SUSE adds AI & virtualisation tools to Rancher Prime

Last month
#
virtualisation
#
devops
#
hyperscale
SUSE expands Rancher Prime with AI agents and deeper virtualisation, unifying VM and container management to streamline modern workloads.
Disassembled industrial cellular iot device usb analyzer tech probing

Rapid7 warns of cellular IoT hardware attack risks

Last month
#
uc
#
firewalls
#
devops
Rapid7 warns that hands-on attacks against cellular IoT hardware can pivot through trusted modules to breach cloud and backend systems.
Andre durand

Ping launches Identity for AI with runtime controls

Last month
#
data protection
#
digital transformation
#
cloud security
Ping unveils Identity for AI, a runtime identity framework to govern autonomous software agents' access, actions and accountability.
It ops war room cyber incident analysts backup restore encrypted net activity

Dell adds quantum-ready security & AI recovery tools

Last month
#
firewalls
#
data protection
#
dr
Dell unveils quantum-safe PC firmware, faster ransomware recovery and expanded AI data monitoring to tackle emerging cyber threats.
Alison

Cloudsmith adds controls to block risky dependencies

Last month
#
devops
#
cloud security
#
application security
Cloudsmith adds automated controls to quarantine and block risky dependencies, tightening enforcement on software supply chain security.
Editorial storm cloud cloud security failure server racks padlocks warnings

Red Hat finds cloud security incidents hit 97% of firms

Last month
#
data protection
#
hybrid cloud
#
cloud security
Red Hat reports 97% of organisations suffered cloud-native security incidents last year, exposing basic failings in configuration and governance.
Editorial software dev code review open source supply chain shield repair vulnerable deps

Veracode launches Fix for open-source vulnerability repair

Last month
#
devops
#
application security
#
devsecops
Veracode unveils an AI-driven tool that automatically fixes open-source vulnerabilities, tackling mounting security debt in software supply chains.
Autonomous coding assistant secure cloud dev workstation v2 illustration

Sysdig launches runtime security for AI coding agents

Last month
#
devops
#
pam
#
cloud security
Sysdig unveils runtime security for AI coding agents, promising real-time monitoring of autonomous dev tools to curb emerging risks.
Editorial illustration corporate criminal network ops map servers

HPE Threat Labs spot industrialised cybercrime surge

Last month
#
malware
#
firewalls
#
vpns
HPE Threat Labs warns cybercrime now runs like big business, as AI-fuelled, industrial-scale attacks hammer government and finance.
Secure enterprise quantum ready servers ai encryption ransomware defense

Dell adds quantum-ready security for PCs & AI data

Last month
#
firewalls
#
data protection
#
dr
Dell unveils quantum-ready PC firmware and AI-focused data protection tools to counter emerging threats across devices and AI workloads.
Editorial compromised software supply chain key token leak dark

Trivy GitHub breach exposes CI/CD supply chain risk

Last month
#
devops
#
cloud security
#
application security
Aqua Security's Trivy GitHub Action was hijacked to ship infostealer code via CI/CD pipelines, exposing secrets across downstream users.
Ai assisted code review inclusive dev team modern office

GitLab widens AI access & sets flat review pricing

Last month
#
devops
#
application security
#
devsecops
GitLab opens agentic AI to free-tier users, sets USD $0.25 flat fee for automated code reviews and expands security false-positive filtering.
Editorial security key human approval robotic hand ai server control panels

Yubico & Delinea link AI actions to human approval

Last month
#
data protection
#
hybrid cloud
#
pam
Yubico and Delinea unite hardware keys with identity checks to ensure each high‑risk AI agent action is explicitly approved by a human.
Laptop security scan interface threat detection shield warning malware

Varist launches free malware scanner amid AI threat

Last month
#
cloud security
#
advanced persistent threat protection
#
socs
Iceland-based Varist has launched a free malware scanner that rates suspicious files in seconds to counter fast-evolving AI-driven threats.
Editorial secure server room layered barriers malware blocked shields

OPSWAT founder urges prevention-first cyber defence

Last month
#
malware
#
firewalls
#
ransomware
OPSWAT founder Benny Czarny urges a prevention-first cyber defence in his new book, arguing detection-led tools can no longer keep pace.
Corporate it cloud security automation dashboard server racks

DigiCert posts record Q4 ARR after expansion spree

Last month
#
digital transformation
#
encryption
#
hyperscale
DigiCert reports record Q4 ARR in FY26 as DigiCert ONE platform growth, acquisitions and automation demand drive digital trust expansion.
Hybrid it security control room cloud mac okta github network

BloodHound expands identity attack path mapping reach

Last month
#
data protection
#
encryption
#
pam
SpecterOps broadens BloodHound Enterprise to map identity attack paths across Okta, GitHub and Jamf-managed Macs in hybrid environments.