TechDay Australia - Australia's technology news network

Enterprise security stories

Flux result 37b06ddc cc12 4dc7 9015 5a065fdc2765

Introducing Amazon bio discovery

Today
#
ai
#
ai models
#
enterprise security
Amazon Bio Discovery debuts with no-code AI workflows, letting researchers design antibody candidates and loop wet-lab results back into modelling.
Flux result 15ab3da2 ffdd 4799 b246 cb763a9d0d55

Sentra & Wiz add data classification to cloud risks

Today
#
storage
#
data protection
#
digital transformation
Sentra and Wiz link cloud risk findings to sensitive data, helping security teams prioritise the alerts most likely to expose PII, PHI or IP.
Flux result 980a0ac9 dd3e 46f1 abde 6cd7e60cc575

Appdome adds backend Risk Intelligence APIs for IDAnchor

Today
#
cloud security
#
application security
#
iam
Appdome expands IDAnchor with Risk Intelligence APIs to feed backend fraud systems mobile threat history, identity data and AI risk scoring.
Flux result 971dadc2 dd8b 4c6e 8468 c707f3c7e678

IBM unveils AI cyber defences against autonomous attacks

Today
#
digital transformation
#
iot security
#
advanced persistent threat protection
IBM rolls out assessment and multi-agent security services to help large organisations spot AI-driven weaknesses and speed up remediation across complex systems.
Flux result 6c691a34 515d 4b81 8e88 0408697cb091

Ransomware activity stays high as new groups surge

Today
#
ransomware
#
supply chain
#
cybersecurity
GuidePoint says ransomware attacks stayed elevated in Q1 as The Gentlemen surged, construction became a top target and extortion-only tactics spread.
Flux result 874008eb 69a5 4c98 a40f 5718013001a6

Artemis announces $70 million in seed funding for AI security

Today
#
firewalls
#
siem
#
digital transformation
Artemis lands $70 million as investors back AI-driven cyber defence platform for real-time threat detection and response.
Flux result 0d975fee 42cc 4d6a bd7b 34ac4a1a019d

Security teams want AI tools under human oversight

Yesterday
#
firewalls
#
digital transformation
#
network security
Survey finds 77% of security professionals want AI tools in security operations kept under human oversight, as 88% adopt guardrails.
Flux result 74ce5946 2da6 4b6d 9888 4b59ef1216c5

Claroty adds Visibility Orchestration to xDome platform

Yesterday
#
saas
#
manufacturing
#
digital transformation
Claroty boosts xDome with Visibility Orchestration to turn patchy cyber-physical asset data into prioritised security tasks across critical operations.
Flux result a694726b 7de5 48ce 9beb 896d40041b0f

Former Black Basta affiliates target executives in Teams

Yesterday
#
uc
#
mfa
#
phishing
ReliaQuest says suspected former Black Basta operators are bombarding staff with emails and posing as IT support in Microsoft Teams to reach senior executives.
Flux result 43638662 ed38 47d6 8ce9 8739c9cac94f

Keeper boosts endpoint privilege governance for firms

Yesterday
#
endpoint protection
#
encryption
#
pam
Keeper Security adds approval workflows and audit logging to Endpoint Privilege Manager as enterprises tighten control over temporary admin access.
Flux result c7112620 ee78 433f 9a4b 3ca2ccf1b56c

Tenable launches OT asset discovery engine for security

Yesterday
#
hyperscale
#
cloud security
#
iot security
Tenable adds OT asset discovery to core security tools as Chief Product Officer Eric Doerr says it will expose hidden devices without extra hardware.
Flux result bda8fa3f b9b2 421e 992b 6bbacbd7b7cc

Capsule Security raises $7 million to guard AI agents

Yesterday
#
pam
#
cloud security
#
application security
Capsule Security emerges from stealth with $7 million backing to police AI agents at runtime as enterprises widen their use.
Flux result 49909b38 8c47 4e38 898b d957c8fb477f

Bitdefender launches GravityZone email security for MSPs

Yesterday
#
ransomware
#
endpoint protection
#
hybrid cloud
Bitdefender adds integrated email defence to GravityZone, giving MSPs and businesses post-delivery protection against phishing, ransomware and BEC.
Flux result 9ea0103a 74d3 4424 8938 ca4713b7410d

Forrester maps AI shift from digital into physical use

Yesterday
#
robots
#
manufacturing
#
digital transformation
Forrester says the next wave of AI will reach robotics, transport and commerce, with agentic tools, security and trust set to pay off first.
Flux result 1fcd6b18 19dc 4e86 b539 9e9da376aba6

TrendAI partners Anthropic to embed Claude in security ops

Yesterday
#
firewalls
#
digital transformation
#
network security
TrendAI and Anthropic join forces to embed Claude in Vision One, targeting AI vulnerability research and automated cyber defences.
Flux result 0d86e3aa 7c87 46fe b286 10172a4c72bd

Tenable launches OT discovery tool for exposure management

Yesterday
#
datacentre infrastructure
#
hyperscale
#
cloud security
Tenable adds OT asset discovery to exposure management platform, helping IT teams spot hidden connected devices and cyber-physical risks.
Flux result e138c2c7 10d5 44b8 b5f2 1566c9a08fa9

Proofpoint flags mailbox rule abuse in Microsoft 365

Yesterday
#
edutech
#
mfa
#
cloud security
Proofpoint says mailbox rule abuse is becoming a routine Microsoft 365 takeover tactic, helping attackers hide alerts, hijack threads and drive fraud.
Flux result 51cf6bc6 caf3 4086 9aca 43f89e74737d

Cloudflare, Wiz link AI security tools for unified view

Yesterday
#
firewalls
#
data protection
#
digital transformation
Cloudflare and Wiz team up to map shadow AI risks across cloud estates and protect sensitive data as firms race to secure chatbot deployments.
Flux result c6603b88 b083 467d 8ba6 02ec2da118c8

MetTel launches connected laptop service for enterprises

Yesterday
#
firewalls
#
digital transformation
#
network security
MetTel unveils a connected laptop service that uses SingleSIM to ship, activate and support enterprise devices across multiple mobile networks.
Flux result be5832d1 2647 4b40 8c3f 54ddb15bfb62

OpenAI expands cyber access for verified defenders

Yesterday
#
application security
#
socs
#
physical security
OpenAI broadens Trusted Access for Cyber to verified defenders, giving vetted users GPT-5.4-Cyber for tougher security work and code analysis.