TechDay Australia - Australia's technology news network

Security Posture stories - Page 9

Jon connet

Aeris & Palo Alto link SASE to secure global IoT fleets

Fri, 20th Feb 2026
#
uc
#
firewalls
#
digital transformation
Aeris links its IoT Watchtower with Palo Alto Networks' Prisma SASE 5G to unify zero-trust security and connectivity for global IoT fleets.
Ethical hacker monitoring ai driven pen testing server rack

Simbian unveils AI agent for continuous pentesting

Fri, 20th Feb 2026
#
data protection
#
devops
#
application security
Simbian launches an AI Pentest Agent that runs continuous, adaptive penetration tests, promising faster, context-aware vulnerability detection.
Server room night encrypted code swirls malware cracked shield

WatchGuard warns of surge in evasive, encrypted malware

Fri, 20th Feb 2026
#
malware
#
firewalls
#
ransomware
WatchGuard reports a 1,548% surge in new evasive malware and a 2,000% jump in encrypted threats, straining signature-based defences.
Secure cloud platform shields locks customer experience data iso

CrowdStrike, Qualtrics link up to secure AI-driven data

Fri, 20th Feb 2026
#
data protection
#
digital transformation
#
cloud security
CrowdStrike links Falcon Shield with Qualtrics XM to extend SaaS security, monitoring and automated policy enforcement across experience data.
Yuneeb khan

KnowBe4 appoints Yuneeb Khan as Chief Financial Officer

Fri, 20th Feb 2026
#
data protection
#
digital transformation
#
advanced persistent threat protection
KnowBe4 names Yuneeb Khan CFO to steer global finances as it sharpens focus on human and agentic AI risk in cyber security.
Cornelius mare

SD-WAN is the SASE foundation enterprises can't ignore

Wed, 18th Feb 2026
#
firewalls
#
network infrastructure
#
hybrid cloud
Enterprises rushing to adopt SASE must modernise with SD-WAN first, or risk poor performance, fragmented visibility and weak security.
Dark office night remote access shadowy hacker silent data theft

Data-only extortion surges as remote access abused

Wed, 18th Feb 2026
#
data protection
#
dr
#
vpns
Data-only extortion soars 11-fold as attackers 'log in instead of break in', abusing remote access tools for faster, stealthier raids.
Ai governance zero trust secure data center corridor shield

Xiid & Cytex link AI governance with zero trust access

Sun, 15th Feb 2026
#
firewalls
#
data protection
#
ransomware
Xiid and Cytex join forces to fuse AI governance with zero trust access, targeting shrinking attack paths and stricter cyber regulation.
Enterprise cloud security shields above offices and data racks

Brinqa brings exposure management platform to Google Cloud

Sun, 15th Feb 2026
#
saas
#
storage
#
hybrid cloud
Brinqa lists unified exposure management on Google Cloud Marketplace, streamlining procurement and deployment for committed cloud customers.
Cinematic soc night ai alert dashboards hidden apps control

Okta unveils tools to detect & govern shadow AI risks

Fri, 13th Feb 2026
#
pam
#
cloud security
#
application security
Okta launches Agent Discovery to uncover and rein in shadow AI agents, mapping risky app access and tightening identity-based controls.
Ciso monitoring data flows shadowy ai deepfake cyberattack threat

CISOs confident in cyber skills but lag on AI threats

Thu, 12th Feb 2026
#
digital transformation
#
cloud security
#
socs
CISOs show strong faith in cyber defences yet less than two-thirds feel ready for fast-rising AI-driven attacks and deepfake threats.
Visions of cb header

Visions of cyber attacks: The SonicSentry SOC in action on Christmas morning

Thu, 12th Feb 2026
#
firewalls
#
data protection
#
network security
While most slept through Christmas dawn, SonicSentry analysts foiled a 3am brute-force cyber attack on a French client's firewall.
2026 cybersecurity partnership award trophy asia pacific focus

Rapid7 crowns Orro APJ Partner of the Year for 2026

Thu, 12th Feb 2026
#
cx
#
martech
#
socs
Rapid7 names Orro its 2026 APJ Partner of the Year as four other Australian security specialists secure top regional award honours.
Wordly on phone

Wordly launches Workspaces for everyday AI translation

Thu, 12th Feb 2026
#
uc
#
data protection
#
cloud security
Wordly debuts Workspaces to bring its AI translation and captioning platform from big-ticket conferences into everyday corporate meetings.
Stealthy cloud server room data theft ghostly silhouette cable

Hackers ditch noisy ransomware for stealthy data theft

Thu, 12th Feb 2026
#
firewalls
#
data protection
#
dr
Hackers are abandoning noisy ransomware to quietly steal data, as a report finds 80% of top attack techniques now focus on evasion.
Soc cisos overwhelmed by red alerts few highlighted in focus

Cyber firms face 'verification crisis' on real risk

Wed, 11th Feb 2026
#
firewalls
#
devops
#
digital transformation
Cyber firms warned over 'verification crisis' as tools flag floods of flaws but only 0.47% prove exploitable, leaving real risk unresolved.
Amelia foss

SonicWall unifies NSM for future-ready security ops

Wed, 11th Feb 2026
#
firewalls
#
migration
#
hybrid cloud
SonicWall folds legacy tools into Network Security Manager, unifying firewall analytics and reporting across its Unified Management platform.
Jonathan dixon

CrowdStrike names Jonathon Dixon to lead JAPAC growth

Wed, 11th Feb 2026
#
ransomware
#
endpoint protection
#
digital transformation
CrowdStrike appoints veteran executive Jonathon Dixon to lead JAPAC, driving Falcon platform adoption and regional cyber security growth.
Arts centre melbourne spire cyber defence shields padlocks night

Arts Centre Melbourne deploys MDR services to contain phishing incident

Wed, 11th Feb 2026
#
firewalls
#
data protection
#
network security
Arts Centre Melbourne tightens cyber defences after a foiled phishing attack exposed gaps filled by Arctic Wolf's round-the-clock monitoring.
Secure cloud database stack with automatic pii data masking

Aerospike embeds default data masking in Database 8

Wed, 11th Feb 2026
#
data protection
#
application security
#
partner programmes
Aerospike Database 8 now embeds default dynamic data masking, tightening PII protection while easing compliance and operational overhead.