IT Brief Australia - Technology news for CIOs & IT decision-makers

Incident Response stories - Page 13

Yanbing

Datadog launches MCP Server to link AI with telemetry

Last month
#
saas
#
data protection
#
devops
Datadog's new MCP Server pipes live telemetry into AI agents and dev tools, promising real-time debugging under existing governance controls.
Ai silhouette in enterprise server room cybersecurity visual

SailPoint adds AI agent tools to identity security

Last month
#
pam
#
cloud security
#
iam
SailPoint has added tools to govern AI agents, machine identities and privileged access as non-human accounts surge across cloud systems.
Modern industrial control room cyber secure factory screens

Claroty named Gartner Leader again for CPS protection

Last month
#
network infrastructure
#
iot security
#
iot
Claroty named a Leader in Gartner's 2026 CPS Protection Platforms Magic Quadrant for a second year, backed by fresh USD $150 million funding.
Enterprise it control room secure data portal to ai brain streams

Datadog unveils MCP Server for governed AI observability

Last month
#
devops
#
siem
#
digital transformation
Datadog launches an MCP Server to give AI agents governed, real-time access to observability data across live development and operations.
Sydney waterfront tech conference ai observability evening view

Grafana brings ObservabilityCON to Sydney amid AI boom

Last month
#
virtualisation
#
devops
#
hybrid cloud
Grafana brings ObservabilityCON to Sydney as APAC engineers tackle soaring AI complexity, tool sprawl and rising telemetry costs.
Dim corporate server room flashing red lights cracked shield vulnerability

Google warns of surge in enterprise zero-day attacks

Last month
#
virtualisation
#
firewalls
#
vpns
Google warns attackers are shifting from browsers to corporate systems, as tracked zero-day exploits climb and enterprise edge devices surge.
Dark binary figure cuffed cloud breach phishing mfa takedown

Tycoon 2FA phishing service disrupted in major sting

Last month
#
ransomware
#
mfa
#
crypto
Police and tech firms have dismantled Tycoon 2FA, a phishing service used to bypass MFA and hijack cloud accounts at industrial scale.
Modern corporate soc room screens network diagrams digital shield

Tufin unveils AI assistants & executive security hub

Last month
#
firewalls
#
hybrid cloud
#
data analytics
Tufin rolls out four AI assistants and a customisable executive hub to speed network security rule searches, access changes and risk insight.
Moody server room supply chain breach glowing red lock icon

ShinyHunters claims Woflow breach in supply chain hack

Last month
#
data protection
#
ransomware
#
mfa
ShinyHunters claims it hacked merchant data firm Woflow, raising supply chain fears for major brands despite no confirmed breach yet.
Andy fielder cto at metacompliance

A resilient security culture is built in the flow of work, not the classroom

Last month
#
data protection
#
digital transformation
#
phishing
Rising UK cyber attacks show training alone is failing; firms must embed behavioural security cues into daily work to cut human risk.
Secure cloud shield dlp ai security risk managed genai workloads

Forcepoint adds ARIA AI assistant to Data Security Cloud

Last month
#
data protection
#
endpoint protection
#
hybrid cloud
Forcepoint adds ARIA AI assistant and a faster endpoint agent to Data Security Cloud to tighten policy control for generative AI workloads.
Overworked sysadmin hybrid it sprawl tangled cables dark monitors

Structural stress rises for sysadmins in hybrid IT era

Last month
#
devops
#
digital transformation
#
it automation
Hybrid IT sprawl is driving “structural stress” for sysadmins as security risks rise, responsibilities grow and control over tools shrinks.
Massive cloud shield over office and datacenter network security

Cato unveils Dynamic Prevention engine for SASE security

Last month
#
firewalls
#
digital transformation
#
hyperscale
Cato launches Dynamic Prevention, a SASE-native engine that auto-detects multi-stage attacks by correlating months of security telemetry.
Worried office worker old phone shadow hacker corporate network

Coruna exploit kit exposes risks for outdated iOS users

Last month
#
endpoint protection
#
pam
#
mfa
New Coruna exploit kit shows outdated iOS devices face automated, scalable attacks that can turn compromised phones into corporate gateways.
Japan factory night ransomware attack shadow figure network

Ransomware attacks surge 50% as industrial firms hit hardest

Last month
#
malware
#
data protection
#
ransomware
Global ransomware attacks jump 50% to 7,874 in 2025, with industrial firms bearing the brunt as criminal groups reshuffle their tactics.
Dev team monitoring code pipelines with app security scanning

Archipelo, Checkmarx tie dev context to app security

Last month
#
devops
#
application security
#
devsecops
Archipelo and Checkmarx partner to fuse dev workflow signals with app security scans, giving teams origin evidence to prioritise fixes.
Pro vs newbie socs side by side network diagrams cinematic lighting

Agentic AI boosts elite cyber teams but hinders rookies

Last month
#
devops
#
socs
#
apm
Agentic AI massively accelerates elite cyber teams but can slow inexperienced hackers, Hack The Box's large-scale benchmark reveals.
Heather mahalik  1

Why women can be leaders when it comes to AI

Last month
#
data protection
#
ransomware
#
digital transformation
Women in cybersecurity, long trained to question and validate, are uniquely placed to lead the era of risky, fast‑moving AI tools.
Conifers doron bachar and elad hoffer larger(2)

Conifers hires AI leaders to scale CognitiveSOC growth

Last month
#
advanced persistent threat protection
#
socs
#
llms
Conifers adds senior AI leaders Doron Bachar and Elad Hoffer to accelerate CognitiveSOC development and scale its agentic AI SOC platform.
Ai malware attack shadow figure targeting india australia maps

Bitdefender warns of AI 'vibeware' targeting India

Last month
#
malware
#
firewalls
#
network security
Bitdefender flags AI-powered 'vibeware' malware blitz hitting Indian government targets, using niche languages to overwhelm defences.