TelcoNews UK - Telecommunications news for ICT decision-makers

Incident Response stories - Page 15

Secure multi cloud data resilience australia new zealand map

Cohesity & Cyera integrate DSPM to boost data security

Last month
#
data protection
#
dr
#
ransomware
Cohesity deepens its Cyera tie-up, embedding DSPM into its data cloud to sharpen discovery, classification and cyber recovery at scale.
Modern soc with analysts monitors network graphs threat alerts

Fortinet unveils AI-driven FortiSOC for unified SOC ops

Last month
#
firewalls
#
endpoint protection
#
hybrid cloud
Fortinet unveils FortiSOC cloud SOC and wider FortiAI automation to unify security ops, tackle AI-driven threats and cut tool sprawl.
Cybersecurity analyst soc offline file risk red alert monitor

Glasswall unveils Foresight AI for offline file threat risk

Last month
#
malware
#
firewalls
#
network security
Glasswall launches Foresight AI, scoring file-borne threat risk from CDR telemetry to help security teams prioritise offline investigations.
Alberto falcione vp sales targa telematics

IVECO launches AI theft recovery for connected fleets

Last month
#
cartech
#
partner programmes
#
supply chain
IVECO adds AI theft recovery to its connected services, offering 24/7 managed stolen vehicle assistance to boost commercial fleet security.
Yanbing

Datadog launches MCP Server to link AI with telemetry

Last month
#
saas
#
data protection
#
devops
Datadog's new MCP Server pipes live telemetry into AI agents and dev tools, promising real-time debugging under existing governance controls.
London underground control room european infrastructure feeds

Augur raises USD $15m to expand AI risk monitoring

Last month
#
data protection
#
surveillance
#
advanced persistent threat protection
London AI risk monitor Augur raises USD $15m seed round led by Plural to scale privacy-first surveillance across European infrastructure.
Uk cyberattack ransomware map dark blues red locks data loss

Ransomware dominates UK cyber incidents, data loss surges

Last month
#
data protection
#
ransomware
#
phishing
Ransomware drives over half of UK cyber incidents as data loss surges, with healthcare, retail and complex supply chains hardest hit.
Ai silhouette in enterprise server room cybersecurity visual

SailPoint adds AI agent tools to identity security

Last month
#
pam
#
cloud security
#
iam
SailPoint has added tools to govern AI agents, machine identities and privileged access as non-human accounts surge across cloud systems.
Modern industrial control room cyber secure factory screens

Claroty named Gartner Leader again for CPS protection

Last month
#
network infrastructure
#
iot security
#
iot
Claroty named a Leader in Gartner's 2026 CPS Protection Platforms Magic Quadrant for a second year, backed by fresh USD $150 million funding.
Enterprise it control room secure data portal to ai brain streams

Datadog unveils MCP Server for governed AI observability

Last month
#
devops
#
siem
#
digital transformation
Datadog launches an MCP Server to give AI agents governed, real-time access to observability data across live development and operations.
Dim corporate server room flashing red lights cracked shield vulnerability

Google warns of surge in enterprise zero-day attacks

Last month
#
virtualisation
#
firewalls
#
vpns
Google warns attackers are shifting from browsers to corporate systems, as tracked zero-day exploits climb and enterprise edge devices surge.
Dark binary figure cuffed cloud breach phishing mfa takedown

Tycoon 2FA phishing service disrupted in major sting

Last month
#
ransomware
#
mfa
#
crypto
Police and tech firms have dismantled Tycoon 2FA, a phishing service used to bypass MFA and hijack cloud accounts at industrial scale.
Modern corporate soc room screens network diagrams digital shield

Tufin unveils AI assistants & executive security hub

Last month
#
firewalls
#
hybrid cloud
#
data analytics
Tufin rolls out four AI assistants and a customisable executive hub to speed network security rule searches, access changes and risk insight.
Moody server room supply chain breach glowing red lock icon

ShinyHunters claims Woflow breach in supply chain hack

Last month
#
data protection
#
ransomware
#
mfa
ShinyHunters claims it hacked merchant data firm Woflow, raising supply chain fears for major brands despite no confirmed breach yet.
Email attachment20260307 3383640 7n6650

Droplet warns UK that identity-based cyber defences fail

Last month
#
malware
#
firewalls
#
network security
Droplet warns UK that identity-based cyber defences are failing against state-backed attackers, urging multi-layered, 'never trust' security.
Andy fielder cto at metacompliance

A resilient security culture is built in the flow of work, not the classroom

Last month
#
data protection
#
digital transformation
#
phishing
Rising UK cyber attacks show training alone is failing; firms must embed behavioural security cues into daily work to cut human risk.
Secure cloud shield dlp ai security risk managed genai workloads

Forcepoint adds ARIA AI assistant to Data Security Cloud

Last month
#
data protection
#
endpoint protection
#
hybrid cloud
Forcepoint adds ARIA AI assistant and a faster endpoint agent to Data Security Cloud to tighten policy control for generative AI workloads.
Massive cloud shield over office and datacenter network security

Cato unveils Dynamic Prevention engine for SASE security

Last month
#
firewalls
#
digital transformation
#
hyperscale
Cato launches Dynamic Prevention, a SASE-native engine that auto-detects multi-stage attacks by correlating months of security telemetry.
Overworked sysadmin hybrid it sprawl tangled cables dark monitors

Structural stress rises for sysadmins in hybrid IT era

Last month
#
devops
#
digital transformation
#
it automation
Hybrid IT sprawl is driving “structural stress” for sysadmins as security risks rise, responsibilities grow and control over tools shrinks.
Worried office worker old phone shadow hacker corporate network

Coruna exploit kit exposes risks for outdated iOS users

Last month
#
endpoint protection
#
pam
#
mfa
New Coruna exploit kit shows outdated iOS devices face automated, scalable attacks that can turn compromised phones into corporate gateways.