ChannelLife Australia - Industry insider news for technology resellers

Threat detection stories - Page 4

Cloud security experts

Cloud security experts warn of control plane risks

This month
#
firewalls
#
data protection
#
hybrid cloud
Cloud security specialists say organisations must rethink defences as control plane exposure, swelling telemetry and fragmented tools create fresh risks.
Flux result a9ab9287 96dd 4887 9a3e 050aa7603299

Foxit adds PDF Action Inspector to spot hidden risks

This month
#
data protection
#
document management
#
ecm
Foxit's latest PDF Editor update adds Action Inspector to uncover hidden scripts and redaction-bypassing behaviour in business documents.
Au firms warned

Australian firms warned over AI & cloud cyber risks

This month
#
storage
#
data protection
#
hybrid cloud
Australian firms urged to tighten cloud defences as Zscaler and Reolink warn AI agents and connected cameras are widening cyber risk.
Flux result 960c2be4 ae2c 4ea9 bd06 f7c49197d590

Secure.com guide says AI helps CISOs, but judgements matter

This month
#
data protection
#
digital transformation
#
advanced persistent threat protection
Secure.com urges Chief Information Security Officers to use AI for alert triage and threat detection, but keep human judgement in the loop.
Flux result 570b5139 2d96 44f5 98a2 7155ae79b40f

Gigamon takes 51 per cent of deep observability market

This month
#
virtualisation
#
private cloud
#
hybrid cloud
Gigamon dominates the deep observability race as AI and hybrid cloud traffic push the fast-growing sector towards USD $2.1 billion by 2030.
Sunil sapra  co founder and chief growth officer  eventus security

Eventus Security wins four Global InfoSec awards

This month
#
advanced persistent threat protection
#
socs
#
risk & compliance
Eventus Security's AI-led platform earns four Global InfoSec honours at RSAC as the firm's managed detection and response offering gains fresh momentum.
Nam lam

Don't be fooled: The SaaS label that's misleading your security team

This month
#
saas
#
digital transformation
#
cloud security
Security teams risk sleepwalking into danger as vendors slap the SaaS label on hosted legacy tools disguised as modern cloud identity.
Flux result 4b7be8d2 61e2 4407 af1c 1088978c23b7

North Korean operatives target Australian jobs, DTEX warns

Last month
#
hcm
#
advanced persistent threat protection
#
physical security
DTEX warns North Korean operatives are using false identities to secure Australian tech jobs, with some applicants aided by AI and deepfakes.
Flux result d32cd562 e268 4931 a025 bb2ba5ec2314

Zapier launches AI Guardrails for safer automated workflows

Last month
#
data protection
#
martech
#
advanced persistent threat protection
Zapier adds AI Guardrails to its automation platform, giving teams inline checks to block risky content before it reaches business systems.
Ryan mahoney

Why AI-powered security needs network telemetry across the hybrid cloud

Last month
#
firewalls
#
private cloud
#
hybrid cloud
AI security tools are only as smart as the data they see, and network telemetry is emerging as the missing piece in hybrid cloud oversight.
Chris pallister

Slipstream Cyber appoints Chris Pallister to cyber role

Last month
#
devops
#
hyperscale
#
dc
Slipstream Cyber has named Chris Pallister as Head of Cyber Engineering and Operations, bolstering its 24/7 security operations centre and AI-led defence push.
World backup day 1

Data governance reshapes backup strategies in AI era

Last month
#
data protection
#
dr
#
digital transformation
Organisations are shifting from backup-heavy strategies to data governance as AI growth exposes rising costs, risks, and inefficiencies in data resilience.
Flux result 1c7a65d6 0886 4e3d 8921 13bf5894a2db

Jazz wins CrowdStrike & AWS cybersecurity accelerator

Last month
#
data protection
#
digital transformation
#
hyperscale
Jazz has won a CrowdStrike and AWS-led cybersecurity accelerator, beating five other finalists with its AI-native data loss prevention platform.
Flux result 171281d8 fa44 459c a8d5 363abbfe16a0

China-linked Red Menshen hides inside telecoms networks

Last month
#
uc
#
advanced persistent threat protection
#
supply chain
Rapid7 says China-linked Red Menshen has planted dormant “sleeper cells” inside global telecoms networks to quietly maintain long-term access.
John maddison  chief marketing officer at f5

F5 & Forcepoint join forces on enterprise AI security

Last month
#
data protection
#
digital transformation
#
application security
F5 and Forcepoint team up to give enterprises continuous AI security, linking data discovery with runtime controls to reduce risk in production systems.
Flux result 4a0010e1 6565 48ef a6f5 ad792476acf1

Australian firms urged to rethink backup amid cyber risk

Last month
#
data protection
#
dr
#
ransomware
Cohesity and Semperis urge Australian firms to move beyond basic backup, warning that fragmented systems and identity compromise can derail cyber recovery.
Flux result 86c5d3ff 8544 4b88 ac41 93781b8158bc

AppOmni adds Heisenberg mode after LiteLLM supply attack

Last month
#
virtualisation
#
cloud security
#
application security
AppOmni upgrades Heisenberg to help teams trace GitHub Actions and spot tainted dependencies after the LiteLLM supply chain breach.
Flux result 152657c8 7738 4bac 81b1 a1995321cc8c

N-able adds AI detections for stealthier cyber attacks

Last month
#
firewalls
#
network security
#
cloud security
N-able rolls out AI-led SOC detections to flag PowerShell abuse, suspicious DNS traffic and unusual Windows processes across multiple layers.
Flux result 02787d00 65b3 4fa4 8006 314fc884629f

HPE boosts AI security across networking & recovery

Last month
#
virtualisation
#
firewalls
#
data protection
HPE rolls out AI governance, recovery and post-quantum updates across networking and storage to strengthen cyber resilience in distributed operations.
Flux result 537bf998 485d 4f51 98f1 67db9a8eee74

ROC launches Face1 biometric reader for access control

Last month
#
surveillance
#
mfa
#
edge computing
ROC moves into physical access control with Face1 biometric reader, combining identity checks, video analytics and legacy system integration.