IT Brief New Zealand - Technology news for CIOs & IT decision-makers

Identity Security stories - Page 8

Singapore skyline dusk cloud datacenters ai security network

EY maps hyper-velocity AI priorities for tech during 2026

Fri, 20th Feb 2026
#
devops
#
digital transformation
#
phishing
EY urges tech leaders to pursue AI-fuelled deals, agentic systems and sovereignty-by-design as 2026 competition and security pressures grow.
Cloud identity recovery security glowing shield canada us growth

Cayosoft posts 76% ARR surge on identity recovery boom

Fri, 20th Feb 2026
#
saas
#
dr
#
hybrid cloud
Cayosoft posts 76% ARR jump for 2025 as identity recovery demand soars and it wins major public sector and enterprise customers.
Cinematic data center night firewall crack ransomware attack icon

Barracuda links 2025 ransomware wave to firewall flaws

Fri, 20th Feb 2026
#
firewalls
#
data protection
#
ransomware
Barracuda warns that unpatched firewalls and weak accounts drove 90% of 2025 ransomware attacks, as threats spread in mere hours.
Cynthia lee x adam perks x chris waynforth

Delinea boosts EMEA, APAC growth with senior hires

Fri, 20th Feb 2026
#
data protection
#
siem
#
digital transformation
Delinea has named three senior leaders across EMEA and APAC to accelerate regional sales, channel growth and AI-driven identity security.
Enterprise cloud security procurement modern corporate it

CrowdStrike Falcon now available via Microsoft Marketplace

Thu, 19th Feb 2026
#
endpoint protection
#
digital transformation
#
hyperscale
CrowdStrike's Falcon platform is now sold via Microsoft Marketplace, letting customers spend existing Azure commitments on security tools.
Dim server room admin workstation security shield network nodes

12Port unveils AI session intelligence for PAM security

Thu, 19th Feb 2026
#
data protection
#
pam
#
mfa
12Port adds AI-powered session intelligence to its agentless PAM platform, promising real-time detection and disruption of risky admin activity.
Dark office night remote access shadowy hacker silent data theft

Data-only extortion surges as remote access abused

Wed, 18th Feb 2026
#
data protection
#
dr
#
vpns
Data-only extortion soars 11-fold as attackers 'log in instead of break in', abusing remote access tools for faster, stealthier raids.
Cinematic soc analysts network map cloud kubernetes identity alerts

ExtraHop boosts agentic SOC with richer network insight

Wed, 18th Feb 2026
#
virtualisation
#
hybrid cloud
#
pam
ExtraHop sharpens its network detection tools with deeper identity and Kubernetes insight to power more reliable agentic SOC automation.
Untitled design  63

One Identity names Michael Henricks Finance & Ops Chief

Wed, 18th Feb 2026
#
saas
#
hybrid cloud
#
pam
One Identity appoints Michael Henricks as combined finance and operations chief to steer scaling identity security business growth.
Roi karo

Check Point unveils four-pillar AI security strategy

Mon, 16th Feb 2026
#
firewalls
#
hybrid cloud
#
digital transformation
Check Point launches four-pillar AI security strategy and three targeted acquisitions to secure networks, workspaces and AI agents.
Frank cesarini

BeyondTrust names Frank Cesarini ANZ partner manager

Mon, 16th Feb 2026
#
pam
#
cx
#
martech
BeyondTrust has appointed experienced channel executive Frank Cesarini as ANZ partner manager to accelerate its regional identity security growth.
Asia pacific night map cyber breaches shipping supply chain

AI-fuelled supply chain cyber attacks surge in Asia-Pacific

Mon, 16th Feb 2026
#
firewalls
#
ransomware
#
network security
AI is supercharging supply chain cyber attacks across Asia-Pacific, with Group-IB warning single hacks now threaten thousands of victims.
Modern soc dark room analysts monitors world maps network threats

Simbian touts AI SOC growth as automation race intensifies

Fri, 13th Feb 2026
#
firewalls
#
digital transformation
#
cloud security
Simbian claims 15-fold customer surge as its AI-driven SOC agents vie to replace rules-based automation in the cyber defence arms race.
Australian cybersecurity control room ai threats safe internet

AI reshapes cyber threats as Safer Internet Day nears

Wed, 11th Feb 2026
#
firewalls
#
ddos
#
network security
AI-driven agents and rising network attacks are reshaping cyber risks, experts warn, as Safer Internet Day 2026 urges 'verified trust' online.
Cinematic secure data center ai shield hologram blue teal lighting

Token Security named RSAC 2026 Innovation Sandbox finalist

Wed, 11th Feb 2026
#
pam
#
cloud security
#
socs
Token Security named RSAC 2026 Innovation Sandbox finalist for its platform securing and governing autonomous AI agent identities.
Jonathan dixon

CrowdStrike names Jonathon Dixon to lead JAPAC growth

Wed, 11th Feb 2026
#
ransomware
#
endpoint protection
#
digital transformation
CrowdStrike appoints veteran executive Jonathon Dixon to lead JAPAC, driving Falcon platform adoption and regional cyber security growth.
Asia  pacific and japan

CyberArk crowns PwC 2025 Global Partner of the Year

Wed, 11th Feb 2026
#
digital transformation
#
hyperscale
#
pam
CyberArk names PwC its 2025 Global Partner of the Year as partner-led deals surge and certification-driven identity security gains pace.
Corporate it soc monitors network diagrams red attack path analysis

SpecterOps unveils BloodHound Scentry identity risk service

Wed, 11th Feb 2026
#
devops
#
pam
#
cloud security
SpecterOps has launched BloodHound Scentry, a managed identity risk service to find and remediate attack paths across complex environments.
Secure bank data center glass vault hsm blockchain cubes

Fireblocks & Thales deepen bank crypto key control

Tue, 10th Feb 2026
#
fintech
#
blockchain
#
physical security
Fireblocks deepens its Thales tie-up to keep bank crypto keys in customer-owned HSMs, tightening control, compliance and resilience.
Arctic wolf shield logo guarding enterprise buildings network locks

Arctic Wolf named Chubb's preferred MDR cyber partner

Fri, 6th Feb 2026
#
vpns
#
ransomware
#
cybersecurity insurance
Arctic Wolf has been chosen as Chubb's preferred MDR partner, tying cyber cover to continuous security monitoring for larger policyholders.