TelcoNews UK - Telecommunications news for ICT decision-makers

Enterprise security stories - Page 15

Cinematic it control room ai intent security monitoring night

Proofpoint unveils AI intent security for enterprises

Last month
#
data protection
#
digital transformation
#
cloud security
Proofpoint launches intent-based AI security to govern autonomous agents, promising real-time checks on behaviour across enterprise systems.
Corporate cyberattack command center world map dashboards scene

HPE report warns cyberattacks now run like big business

Last month
#
malware
#
firewalls
#
vpns
HPE warns cybercriminals now run attacks like global enterprises, using repeatable workflows, automation and AI to outpace defences.
Acaas roundup safr

Genetec upgrades Security Centre SaaS for access control

Last month
#
surveillance
#
hybrid cloud
#
digital transformation
Genetec has upgraded Security Centre SaaS with a unified front desk interface, broader intrusion support and optional facial authentication.
Peter barker

Verified trust boosts conversions, cuts fraud losses

Last month
#
digital transformation
#
biometrics
#
socs
Verified trust leaders see 51% higher sign-ups, 43% less fraud and faster onboarding as AI-era identity moves from static gate to dynamic fabric.
Nighttime european office lobby cctv surveillance ai view

Brivo unveils Eeva AI agent for smarter video security

Last month
#
data protection
#
smart cities
#
digital transformation
Brivo launches Eeva, an AI video agent that uses plain-English prompts to spot risks and automate actions across existing camera networks.
Corporate soc email security analysts unified cloud phishing bec

VIPRE email security integrates with Microsoft Defender

Last month
#
cloud security
#
phishing
#
advanced persistent threat protection
VIPRE links its Integrated Email Security with Microsoft Defender, unifying phishing and BEC detections in a single Defender console view.
Developer workstation ai security shields protecting supply chain

Checkmarx revamps AI-era app security with new agents

Last month
#
devops
#
application security
#
devsecops
Checkmarx overhauls its One platform with AI-native security agents to guard fast-moving, agentic development and AI software supply chains.
Secure datacenter with shielded servers and vetted oss packages flow

ActiveState unveils Curated Catalog for safer code

Last month
#
application security
#
devsecops
#
supply chain
ActiveState launches Curated Catalog, a private, pre-vetted open source repository to tighten software supply chain security for enterprises.
Screenshot 2026 03 17 at 10.31.46

Hetzner deploys Nokia Deepfield to bolster DDoS defence

Last month
#
firewalls
#
ddos
#
data protection
Hetzner adopts Nokia Deepfield Defender across European data centres to automate edge DDoS mitigation and safeguard rising AI workloads.
Glowing fintech network shield smartphone fingerprint security

XConnect & SONIO team up to fight fraud in fintech

Last month
#
gaming
#
data protection
#
mfa
XConnect links its mobile network fraud signals into SONIO's identity platform to tighten onboarding and compliance for fintech and gambling.
Madhu

Leading security in the AI era: Why CISOs must secure AI while using AI to secure the enterprise

Last month
#
data protection
#
devops
#
digital transformation
CISOs now face a dual AI mandate: securing fast‑growing AI systems while deploying AI to transform and harden enterprise defences.
Secure cloud fortress identity governance ai humans robots

SailPoint & AWS ally on AI agent identity governance

Last month
#
saas
#
digital transformation
#
hyperscale
SailPoint strikes multi-year AWS deal to govern fast-growing AI agent identities with unified controls across human and machine access.
Email attachment20260317 1585473 vn9nrh

Nozomi named Leader in Gartner CPS security ranking

Last month
#
iot security
#
iot
#
advanced persistent threat protection
Nozomi again lands in Gartner's Leaders quadrant for CPS protection, topping four key use cases in the 2026 Critical Capabilities report.
Daniel bernard headshot

CrowdStrike & Nvidia unveil secure AI agent blueprint

Last month
#
hyperscale
#
cloud security
#
dc
CrowdStrike and Nvidia launch a secure AI agent blueprint and MDR tools, promising faster probes and tighter control over autonomous systems.
Shiv ramji  president auth0 headshot

Rise of AI Agents introduces new infosec risk: Okta

Last month
#
data protection
#
digital transformation
#
mfa
Okta warns that surging numbers of uncontrolled AI agents pose a major identity and access risk as they become the new digital workforce.
Global security leaders roundtable ai governance cyber risk

Global CISO Council launched to steer AI governance

Last month
#
data protection
#
advanced persistent threat protection
#
risk & compliance
EC-Council launches the Global CISO Council to unify AI governance, tech risk oversight and regulatory response for senior security leaders.
Shadowy hacker cyber attack on hospital mobile device management

Stryker probes global cyber attack via MDM systems

Last month
#
dr
#
ransomware
#
iot security
Stryker says a cyber attack disrupted internal systems, with investigators examining mobile device tools as experts warn of rising state-linked threats.
Remote employee secure dns protection roaming wifi home office

DNSFilter adds DNS PreCheck to protect roaming staff

Last month
#
firewalls
#
vpns
#
endpoint protection
DNSFilter unveils DNS PreCheck to keep DNS security intact for roaming staff, blocking malicious domains across shifting Wi-Fi networks.
Secure data fortress ev hospital cloud with encrypted streams

Xiid secures EV charging, healthcare AI & multi-cloud

Last month
#
firewalls
#
data protection
#
vpns
Xiid inks trio of security deals to harden EV charging, healthcare AI data and multi-cloud landing zones against network-based attacks.
Ai cyberattack shadow figure robotscreens red alarm extortion

AI agents drive surge in cyber threats & extortion

Last month
#
malware
#
data protection
#
ransomware
AI agents are fuelling a new wave of cyber risk, as criminals weaponise automation to speed up ransomware and sharpen extortion tactics.