IT Brief Australia - Technology news for CIOs & IT decision-makers

Enterprise security stories

Shadowy hacker cyber attack on hospital mobile device management

Stryker probes global cyber attack via MDM systems

Today
#
dr
#
ransomware
#
iot security
Stryker says a cyber attack disrupted internal systems, with investigators examining mobile device tools as experts warn of rising state-linked threats.
Global security leaders roundtable ai governance cyber risk

Global CISO Council launched to steer AI governance

Today
#
data protection
#
advanced persistent threat protection
#
risk & compliance
EC-Council launches the Global CISO Council to unify AI governance, tech risk oversight and regulatory response for senior security leaders.
Remote employee secure dns protection roaming wifi home office

DNSFilter adds DNS PreCheck to protect roaming staff

Today
#
firewalls
#
vpns
#
endpoint protection
DNSFilter unveils DNS PreCheck to keep DNS security intact for roaming staff, blocking malicious domains across shifting Wi-Fi networks.
Secure data fortress ev hospital cloud with encrypted streams

Xiid secures EV charging, healthcare AI & multi-cloud

Today
#
firewalls
#
data protection
#
vpns
Xiid inks trio of security deals to harden EV charging, healthcare AI data and multi-cloud landing zones against network-based attacks.
Ai cyberattack shadow figure robotscreens red alarm extortion

AI agents drive surge in cyber threats & extortion

Today
#
malware
#
data protection
#
ransomware
AI agents are fuelling a new wave of cyber risk, as criminals weaponise automation to speed up ransomware and sharpen extortion tactics.
Dino dimarino

Tenable appoints Dino DiMarino to drive AI security growth

Yesterday
#
network infrastructure
#
digital transformation
#
cloud security
Tenable appoints veteran cybersecurity sales leader Dino DiMarino as chief revenue officer to drive global growth in exposure and AI risk.
Hybrid it infrastructure network map cloud iot security visual

Zero Networks unveils real-time Network Map 2.0 tool

Yesterday
#
virtualisation
#
firewalls
#
ransomware
Zero Networks has launched Network Map 2.0, a real-time 'living map' to visualise hybrid networks and tighten microsegmentation security.
Azure cloud security shield over servers and containers illustration

Upwind brings runtime cloud security platform to Azure

Yesterday
#
digital transformation
#
cloud security
#
advanced persistent threat protection
Upwind integrates its runtime cloud security with Azure, offering unified protection and Sentinel tie-ins via the Microsoft Marketplace.
Patrick

SonicWall revamps partner programme & appoints CRO

Yesterday
#
firewalls
#
network security
#
partner programmes
SonicWall overhauls its SecureFirst Partner Program and appoints Patrick O'Donnell as CRO to drive partner-led sales and managed services.
Chandrodaya prasad

Secure by default: Moving beyond secure by design

Yesterday
#
firewalls
#
hyperscale
#
network security
SonicWall champions 'Secure by Default', promising built-in, automated protection that tames tool sprawl and misconfigurations at scale.
Linux penguin shield cracked root key broken container isolation

CrackArmour flaws in AppArmour risk Linux root access

Yesterday
#
cloud security
#
advanced persistent threat protection
#
physical security
CrackArmour flaws in AppArmour could let local Linux users gain root, bypass namespaces and weaken container isolation at scale.
Enterprise datacenter sql server patch technicians security shield

Microsoft patches major SQL Server flaw in March update

Yesterday
#
firewalls
#
network security
#
mfa
Microsoft's March Patch Tuesday fixes 77 flaws, including a severe SQL Server bug that could grant attackers sysadmin rights remotely.
Secure data center ai brain zero trust hybrid cloud crypto

F5 boosts AI app security with zero trust, post-quantum

Yesterday
#
firewalls
#
encryption
#
hyperscale
F5 expands its app security platform with AI risk tools, zero trust access and post-quantum crypto to protect modern hybrid workloads.
Raghu nandakumara illumio

Big firms detect cyberattacks but fail to contain them

Yesterday
#
firewalls
#
ransomware
#
hybrid cloud
Big businesses can spot cyber intrusions but struggle to contain them fast, leaving cloud-era networks exposed to deeper, costlier breaches.
Global socc night ai brain cloud alerts multinational team

HackerOne warns of widening AI security & testing gap

Yesterday
#
devops
#
digital transformation
#
cloud security
HackerOne warns AI rollouts are outpacing security, with 89% of organisations lacking full testing and incidents driving up costs.
Corporate cyber network with warning nodes and security monitoring

Vicarius unveils vIntelligence for continuous validation

Yesterday
#
endpoint protection
#
advanced persistent threat protection
#
soc
Vicarius launches vIntelligence to continuously validate real-world exploitability and close the loop between detection, remediation and proof.
Home office devices suspicious messages shields locks flat vector

Norton unveils Genie scam detection assistant in ChatGPT

Yesterday
#
cloud security
#
phishing
#
physical security
Norton launches Genie scam assistant in ChatGPT, letting users tag @Norton to analyse emails, texts, images and links for fraud risks.
Unified enterprise security control room cloud saas ai firewalls

Red Access unveils firewall-native, agentless SSE layer

Yesterday
#
saas
#
firewalls
#
data protection
Red Access launches firewall-native, agentless SSE layer, promising hours-long rollout and reduced complexity for securing web, SaaS and GenAI use.
Moody cloud padlock human silhouettes identity theft pixels

Cloud identity compromise now drives most cyber attacks

Yesterday
#
malware
#
uc
#
firewalls
Cloud identity compromise now drives over 80% of cyber incidents, as attackers increasingly abuse trusted accounts and workplace tools.
Email attachment20260312 2842926 viqsh8

Fake Claude AI ads spread malware to target developers

2 days ago
#
cloud security
#
phishing
#
application security
Fake Claude AI search ads are spreading info-stealing malware, hijacking developer credentials and cloud access via spoofed download sites.