eCommerceNews US - Technology news for digital commerce decision-makers

Cyber Risk stories - Page 5

Boardroom canada us execs vs concerned ciso ai cyber risk

CISOs brief boards often but lack strategic influence

Last month
#
data protection
#
digital transformation
#
partner programmes
Boards hear from CISOs more than ever, yet most security chiefs still lack clout over strategy, spending and fast-rising AI-driven risks.
Modern corporate soc room screens network diagrams digital shield

Tufin unveils AI assistants & executive security hub

Last month
#
firewalls
#
hybrid cloud
#
data analytics
Tufin rolls out four AI assistants and a customisable executive hub to speed network security rule searches, access changes and risk insight.
Modern datacenter cloud with ai security testing shield lock

Terra Security gains first AWS nod for AI threat tests

Last month
#
network infrastructure
#
devops
#
hyperscale
Terra Security becomes first AWS partner validated for Autonomous Security Validation, as AI-driven continuous threat testing gains pace.
Andy fielder cto at metacompliance

A resilient security culture is built in the flow of work, not the classroom

Last month
#
data protection
#
digital transformation
#
phishing
Rising UK cyber attacks show training alone is failing; firms must embed behavioural security cues into daily work to cut human risk.
Secure cloud shield dlp ai security risk managed genai workloads

Forcepoint adds ARIA AI assistant to Data Security Cloud

Last month
#
data protection
#
endpoint protection
#
hybrid cloud
Forcepoint adds ARIA AI assistant and a faster endpoint agent to Data Security Cloud to tighten policy control for generative AI workloads.
Cybersecurity ops center explainable ai data analyst monitors

SAP teams with Uptycs on 'Glass Box' AI security analyst

Last month
#
hybrid cloud
#
cloud security
#
socs
SAP teams with Uptycs to launch Juno, a “Glass Box” AI security analyst designed to augment SOC teams with verifiable, auditable outputs.
Ethical hacker structured pentest multi monitors robot scanner

Survey shows pentesters favour PTaaS over bug bounties

Last month
#
devops
#
application security
#
devsecops
New research from Cobalt finds 98% of surveyed pentesters prefer PTaaS to bug bounties and show almost no faith in AI-only security scanning.
Car factory assembly line stoppage robotic arms smoking cabinet

Manufacturing downtime driven by failures, not cyber

Last month
#
data protection
#
dr
#
ransomware
Manufacturers lose up to USD $100,000 an hour to downtime, with botched maintenance and network failures eclipsing cyberattacks as causes.
Kristina

Why fintech needs more women in the room where risk decisions are made

Last month
#
crypto
#
fintech
#
hcm
Fintech's risk frameworks are missing a vital safeguard: more women in decision rooms to challenge blind spots and prioritise resilience.
Young pro studying network security glowing global nodes bg

Interconnection Academy & GCA expand free cyber training

Last month
#
firewalls
#
datacentre infrastructure
#
network security
Interconnection Academy and GCA team up to share free MANRS-based routing and cyber training as global security skills gaps and risks surge.
Japan factory night ransomware attack shadow figure network

Ransomware attacks surge 50% as industrial firms hit hardest

Last month
#
malware
#
data protection
#
ransomware
Global ransomware attacks jump 50% to 7,874 in 2025, with industrial firms bearing the brunt as criminal groups reshuffle their tactics.
Msp security operations center analysts monitoring threat dashboards

LevelBlue & Tenable launch exposure service for MSPs

Last month
#
digital transformation
#
cloud security
#
iot security
LevelBlue and Tenable have teamed up to launch a tiered exposure management service giving MSPs continuous, risk-based visibility.
Cluttered small business it office unattended windows laptops dust

Slow patching leaves SMB endpoints exposed for weeks

Last month
#
it automation
#
risk & compliance
#
edr
Acronis finds SMBs patch Microsoft flaws in about eight days, but the slowest endpoints stay exposed to known bugs for over five weeks.
Untitled design   2026 03 06t021144.313

KYND hires Aaron Aanenson to lead US cyber insurance

Last month
#
ransomware
#
cybersecurity insurance
#
supply chain
KYND appoints Aaron Aanenson to spearhead its North American cyber insurance push, targeting sharper SME risk assessment and underwriting.
Overwhelmed security analyst shadowy cyber threats night office

AI cyber threats outpace staff readiness, report warns

Last month
#
firewalls
#
data protection
#
digital transformation
Attackers' AI use is surging faster than staff skills, Fortinet warns, leaving firms exposed despite rising security awareness spending.
Ai security lock glass office data breach neural network night

AI adoption drives security spend but breaches persist

Last month
#
data protection
#
hybrid cloud
#
digital transformation
Rising AI adoption is driving higher security spend, yet most enterprises still suffer repeated breaches as risk outpaces new defences.
Automated assembly line fixing cyber risks into secure shields

UpGuard unveils Risk Automations to speed cyber fixes

Last month
#
uc
#
siem
#
cloud security
UpGuard debuts Risk Automations to link cyber risk findings with security workflows, promising faster fixes after USD $75 million raise.
Jason merrick

Consolidation Wave Hits Infosec, Sparing CISOs From Tool Sprawl

Last month
#
firewalls
#
pam
#
mfa
Overwhelmed CISOs are driving a consolidation wave in cybersecurity, slashing tool sprawl to close security gaps and cut mounting costs.
Uk security operations center night monitors shield backup alert

N-able adds real-time alerts to protect backup policies

Fri, 27th Feb 2026
#
firewalls
#
data protection
#
dr
N-able adds real-time anomaly alerts to Cove Data Protection, flagging risky backup policy changes linked to identity-driven attacks.
Story 300075

OpenClaw AI assistant surge sparks major security fears

Fri, 27th Feb 2026
#
malware
#
phishing
#
application security
A rapid surge in OpenClaw AI assistant use has left tens of thousands of exposed systems and a trail of hijacked tools and malicious add-ons.