IT Brief Asia - Technology news for CIOs & IT decision-makers

Incident Response stories - Page 5

Tom 1

CrowdStrike extends flexible services model to partners

Last month
#
digital transformation
#
cloud security
#
advanced persistent threat protection
CrowdStrike broadens its consumption-based model into services, offering partners and new customers flexible access to incident response and advisory support.
Flux result 8910bca1 99ae 4239 a7bb 1c491f2f1d85

Ransomware attacks fall as CL0P & The Gentlemen surge

Last month
#
malware
#
firewalls
#
ddos
Qilin keeps top spot as ransomware incidents drop 8% in February, while CL0P and The Gentlemen post sharp gains and new AI risks emerge.
Daniel bernard headshot

CrowdStrike launches Charlotte AI AgentWorks ecosystem

Last month
#
hyperscale
#
cloud security
#
martech
CrowdStrike unveils Charlotte AI AgentWorks ecosystem with Accenture, AWS and OpenAI to let security teams build custom agents without code.
Flux result 57f66fd4 471b 47e6 a679 f64fe3859229

WatchGuard expands NDR portfolio for SMEs and MSPs

Last month
#
firewalls
#
network security
#
advanced persistent threat protection
WatchGuard adds embedded detection, managed monitoring and automated response to its NDR range to help SMEs and MSPs spot threats earlier.
Flux result 8926e588 7507 45de 80f7 1f3ff982140c

Veeam joins Cybersecurity Coalition as policy debates grow

Last month
#
virtualisation
#
data protection
#
dr
Veeam joins the Cybersecurity Coalition, boosting industry influence over data resilience, AI governance and post-attack recovery policy.
Flux result 110baaa4 c6d3 4b1c a508 287d019f2a12

Vorlon launches tools for AI agent security response

Last month
#
data protection
#
cloud security
#
socs
Vorlon unveils AI Agent Flight Recorder and Action Centre to help security teams trace activity across SaaS apps and coordinate responses.
Editorial ciso studying cloud saas dashboards ai security warning symbols incidents

Vorlon survey finds SaaS AI security gaps among CISOs

Last month
#
data protection
#
cloud security
#
application security
Vorlon survey reveals nearly all CISOs suffered SaaS and AI security incidents in 2025, despite high confidence in existing controls.
Flux result 21b28ffc 2d00 47ff 8fb1 45052168cbea

ControlMonkey adds observability recovery for cloud tools

Last month
#
saas
#
data protection
#
dr
ControlMonkey broadens disaster recovery to Datadog, New Relic and other observability tools, giving teams versioned snapshots of dashboards and alerts.
Secure enterprise control room ai agent nodes toolchain anomaly cloud

Miggo expands runtime defence for AI agents & tools

Last month
#
firewalls
#
network security
#
cloud security
Miggo extends its runtime security platform to map, monitor and rein in AI agents and MCP toolchains as live behaviour becomes attack focus.
Flux result 0b725e6f 488f 44c4 b57e 5c23a2bc516f

NetRise launches Provenance to trace open source risk

Last month
#
devops
#
iot security
#
iot
NetRise unveils Provenance, a tool to trace open source maintainers and stop risky dependencies before they spread through software.
Flux result f92b16d0 077a 40ea babc d8335b59a98f

Appdome launches Vault for mobile compliance history

Last month
#
mdm
#
application security
#
physical security
Appdome unveils Vault, a mobile app compliance history workspace with an AI agent to track, audit and reconstruct security controls.
Flux result 9ba48638 c50c 403b 89dd 564a9c45c989

Meta AI agent exposes sensitive data in internal leak

Last month
#
data protection
#
digital transformation
#
pam
Meta says an internal AI agent's bad guidance exposed sensitive staff and user data to workers company-wide for hours, sparking security alarm.
Flux result 4e30e281 0384 49fb 98f5 990d80107f1d

Brivo links Cobalt AI to cut false security alerts

Last month
#
digital transformation
#
cloud security
#
socs
Brivo links its security platform with Cobalt AI to fuse access, video and sensor data, cutting false alerts and speeding incident response.
Flux result 4cccdffa e627 44e4 9061 87014f0d98a3

AI agents blur human access lines in enterprise systems

Last month
#
data protection
#
devops
#
digital transformation
Most organisations cannot distinguish AI agents from human staff, exposing widening identity and access risks as autonomous tools spread.
Flux result 95402d75 a4c4 4756 b714 ce38640d61f0

LevelBlue & SentinelOne expand security partnership

Last month
#
ransomware
#
siem
#
digital transformation
LevelBlue becomes SentinelOne's preferred global partner for AI-powered managed detection, response and incident handling across hybrid estates.
Flux result e3bb5821 ae1a 407c b14f e01675ae60e4

Expel launches managed SIEM service for Sentinel & Splunk

Last month
#
siem
#
cloud security
#
advanced persistent threat protection
Expel unveils managed SIEM for Microsoft Sentinel and Splunk, embedding its engineers to tune detections and cut operational overheads.
Corporate security ops room identity access dashboard crew breach response

Rubrik links Microsoft Defender to speed identity recovery

Last month
#
data protection
#
dr
#
hybrid cloud
Rubrik links Microsoft Defender with its identity recovery tools to speed response to credential-based attacks and cut downtime after breaches.
Flux result b75b6c52 41bc 48f4 a421 ca157511836e

NSS Labs backs AI guardrail tests amid security fears

Last month
#
firewalls
#
devops
#
digital transformation
NSS Labs warns many enterprise AI guardrails fail basic security tests, urging independent, real-world validation of protections.
Flux result ee5ad0d5 3607 4258 9d99 6077b9989b34

Databricks launches Lakewatch to counter AI attacks

Last month
#
firewalls
#
data analytics
#
siem
Databricks unveils Lakewatch, an AI-driven security platform aiming to replace legacy SIEM tools and counter automated cyber attacks.
Google wiz ai cloud defense illustration cloud fortress locked storm

Google closes Wiz deal & unveils AI security tools

Last month
#
virtualisation
#
firewalls
#
data protection
Google folds Wiz into its cloud security arm and launches AI-driven tools to counter rapidly evolving, automated cyber threats.