CFOtech US - Technology news for CFOs & financial decision-makers

Cyber Risk stories - Page 4

Editorial secure server room layered barriers malware blocked shields

OPSWAT founder urges prevention-first cyber defence

Last month
#
malware
#
firewalls
#
ransomware
OPSWAT founder Benny Czarny urges a prevention-first cyber defence in his new book, arguing detection-led tools can no longer keep pace.
Global cities cyber attacks fragile chains cracked data shards

Kroll warns of widening gap in global cyber resilience

Last month
#
dr
#
devops
#
digital transformation
Kroll warns boards are overestimating cyber resilience as attacks cost firms an average USD $2.2 million a year and response plans lag reality.
Hybrid it security control room cloud mac okta github network

BloodHound expands identity attack path mapping reach

Last month
#
data protection
#
encryption
#
pam
SpecterOps broadens BloodHound Enterprise to map identity attack paths across Okta, GitHub and Jamf-managed Macs in hybrid environments.
Modern security operations room copenhagen analytics video access control

Milestone unveils app platform & faster BriefCam AI

Last month
#
virtualisation
#
smart cities
#
digital transformation
Milestone debuts XProtect App Platform and a faster on-premise BriefCam engine, promising smoother AI video analytics and fewer disruptions.
Editorial corporate network cybersecurity analysts limited testing shadowed connections risk

Firms test just 32% of attack surface, study finds

Last month
#
devops
#
digital transformation
#
cloud security
Organisations test just a third of their attack surface as reliance on agentic AI grows, raising fresh concerns over unseen cyber risks.
It security operations center humans and ai agents unified network

Menlo unveils browser platform to secure rising AI agents

Last month
#
firewalls
#
data protection
#
network security
Menlo launches a browser-based platform to govern human users and AI agents with unified security controls as machine traffic surges.
Ai cyber risk weak identity controls server room breached

Firms relax identity controls to speed risky AI rollouts

Last month
#
digital transformation
#
pam
#
it automation
Rushing to embrace AI, most firms are easing identity controls despite visibility gaps around powerful non-human and AI-linked accounts.
Software supply chain security dashboard global infrastructure

Keysight unveils SBOM Manager to meet new cyber rules

Last month
#
application security
#
physical security
#
devsecops
Keysight debuts SBOM Manager to automate software bills of materials as EU and US cyber rules tighten transparency and compliance demands.
Overworked apac cybersecurity analyst night soc moody blue monitors

Alert overload leaves mid-market security teams exposed

Last month
#
digital transformation
#
advanced persistent threat protection
#
socs
Manual context-gathering leaves mid-market security teams missing threats, as 79% rely on third parties to spot attacks their tools overlook.
Ciso dashboard automated grc shields checkmarks cloud enterprise

TrustCloud unveils AI-native platform to transform GRC

Last month
#
digital transformation
#
cloud security
#
socs
TrustCloud launches AI-native security assurance platform to automate GRC, promising faster audits, reduced risk and lower compliance costs.
Moody western home office hacker mask north korea highlighted

North Korean IT workers infiltrate Western remote jobs

Last month
#
hcm
#
physical security
#
supply chain
North Korean IT workers using Western collaborators and fake identities are infiltrating remote jobs to funnel foreign salaries home.
Business handshake cyber insurance partnership data underwriting

Converge turns to KYND to power US cyber underwriting

Last month
#
digital transformation
#
converged infrastructure
#
risk & compliance
Cyber insurer Converge taps KYND's risk intelligence to scale US digital underwriting while chasing profitable cyber insurtech growth.
Sam peters

From fragmentation to focus: Can one security framework simplify compliance?

Last month
#
data protection
#
digital transformation
#
advanced persistent threat protection
As cyber risks and red tape surge, firms turn to ISO 27001 as a unified framework to tame fragmented compliance and build digital trust.
Secure hpe datacenter nvidia gpu private cloud ai shielded infra

TrendAI links with HPE to secure private cloud AI stack

Last month
#
virtualisation
#
data protection
#
private cloud
TrendAI integrates its AI security platform with HPE Private Cloud AI to secure enterprise AI deployments from infrastructure to applications.
Moody server room red alert cracked shield cyber vulnerabilities

Rapid7 warns exploited software flaws more than double

Last month
#
firewalls
#
ransomware
#
network security
Rapid7 warns exploited high and critical software flaws more than doubled in 2025, as attackers compress disclosure-to-attack windows.
Secure uk data center campus with flag and ransomware protection

Rubrik & Rackspace launch UK sovereign recovery cloud

Last month
#
data protection
#
dr
#
ransomware
Rubrik and Rackspace unveil a UK-only sovereign cyber recovery cloud, promising faster ransomware recovery and stricter data control.
Global cybersecurity conference stages rising software risk map

FIRST announces 2026 cyber security conference trio

Last month
#
application security
#
advanced persistent threat protection
#
socs
FIRST to host three cybersecurity conferences in 2026 as it predicts annual CVE disclosures will surpass 50,000 for the first time.
Images  12

Black Kite adds Open FAIR to quantify third-party risk

Last month
#
ransomware
#
digital transformation
#
supply chain
Black Kite weaves Open FAIR into its platform to automate financial loss estimates in third-party cyber risk assessments and reviews.
Corporate cyberattack command center world map dashboards scene

HPE report warns cyberattacks now run like big business

Last month
#
malware
#
firewalls
#
vpns
HPE warns cybercriminals now run attacks like global enterprises, using repeatable workflows, automation and AI to outpace defences.
Ai brain looms over australian nighttime office cyber incident

Custom AI to drive half of cyber incidents by 2028

Last month
#
data protection
#
devops
#
digital transformation
Custom AI apps will drive half of enterprise cyber incident response by 2028, as rushed rollouts outpace security testing and controls.