IT Brief UK - Technology news for CIOs & IT decision-makers

Shadow IT stories - Page 7

Computer shield circuit lines glowing warnings ai neural network digital locks cybersecurity threats

Businesses boost AI in cybersecurity but fear rising new risks

Thu, 3rd Jul 2025
#
advanced persistent threat protection
#
casb
#
risk & compliance
A Trend Micro survey finds 81% of global firms use AI in cybersecurity but 94% fear rising AI-driven cyber risks in the next 3-5 years.
Secure digital cloud shields software apps automated gears it governance

Josys launches AI SaaS risk tool & boosts identity automation

Thu, 26th Jun 2025
#
data protection
#
cloud security
#
mdm
Josys launches AI-powered SaaS Risk Analyzer to automate software risk assessments, plus new identity workflows, enhancing IT control and governance.
Digital shield protecting interconnected servers cloud icons cybersecurity defense

Bitdefender unveils EASM for proactive attack surface security

Thu, 26th Jun 2025
#
endpoint protection
#
digital transformation
#
cloud security
Bitdefender launches GravityZone EASM, a tool for MSPs and businesses to proactively manage internet-facing assets and reduce security risks.
Techday f 83c5e026cf2561efecd2

Organisations ramp up AI tool blocks to counter shadow AI risks

Thu, 22nd May 2025
#
advanced persistent threat protection
#
casb
#
risk & compliance
Organisations are increasingly blocking access to generative AI tools, with DNSFilter halting over 60 million AI queries in March to curb shadow AI risks.
Techday f dfa9464b54bf5e421f49

CrowdStrike unveils new AI & cloud tools for cyber defence

Wed, 30th Apr 2025
#
saas
#
data protection
#
pam
CrowdStrike enhances its Falcon platform with new AI and cloud security tools, offering real-time protection across AI models, data, identities and SaaS environments.
Techday f 0fbacc1faa22e4e60202

UK firms face rising cyber incidents from unknown IT assets

Wed, 30th Apr 2025
#
devops
#
iot
#
casb
A Trend Micro survey reveals 70% of UK firms faced cyber incidents from unknown IT assets amid rising risks from AI tools and shadow IT.
1000000035

Google Threat Intelligence explains China's evolving cyber tactics

Wed, 16th Apr 2025
#
ransomware
#
mfa
#
advanced persistent threat protection
At Google Cloud Next, Sandra Joyce revealed China's advanced cyber tactics, highlighting a global surge in espionage and rising ransomware incidents.
Easm   vs vm funtap from getty images small

EASM vs vulnerability scanning: What's the difference?

Thu, 6th Mar 2025
#
iot
#
casb
#
supply chain
As organisations navigate a growing digital landscape, understanding the differences between external attack surface management and vulnerability management is crucial.
Techday dc95eb224f35c815d3fc

Omada partners with Microsoft to enhance AI-driven IGA

Tue, 21st Jan 2025
#
casb
#
microsoft
#
shadow it
Omada has unveiled a partnership with Microsoft, integrating its identity governance system with Microsoft Entra AI to enhance user experience and security.
Curtis 1

Countering the security threat from within

Thu, 12th Dec 2024
#
phishing
#
email security
#
casb
Internal security threats, both malicious and accidental, are rising concerns for organisations, necessitating robust measures to protect sensitive data.
Techday bab4180fd58fda110e04

Remote work trends spark new cybersecurity strategies

Thu, 28th Nov 2024
#
phishing
#
email security
#
casb
As remote work evolves, organisations must adapt to new cybersecurity challenges and regulatory demands, warns Apricorn's Jon Fielding.
Techday 2d06d7e1ae26b8d34ba3

Extreme Networks introduces advanced ZTNA security features

Tue, 29th Oct 2024
#
saas
#
firewalls
#
network security
Extreme Networks has unveiled new features in its ExtremeCloud Universal ZTNA, enhancing network access management and security for hybrid work environments.
David

Okta's redrawing its cybersecurity boundaries, says CSO

Fri, 18th Oct 2024
#
firewalls
#
cx
#
phishing
Okta is pivoting from identity management to a focus on security, aiming to strengthen its defenses against sophisticated cyberattacks, says CSO David Bradbury.
Techday a1e51c685bd1ff2aec2e

Wasting money on useless tech? Cut costs by preventing sprawl

Wed, 16th Oct 2024
#
data protection
#
casb
#
apm
With mid-sized firms averaging 255 apps and enterprises up to 664, tech sprawl is draining budgets and hurting productivity, urging firms to take control.
Techday b4efcb442e66dcfa2017

CrowdStrike & 1Password extend partnership to aid SMBs

Mon, 16th Sep 2024
#
ransomware
#
casb
#
ai security
CrowdStrike and 1Password have expanded their partnership to enhance cybersecurity for 150,000 SMBs, integrating advanced protection through AI-powered solutions.
Techday 97fb91d725f30bc0350e

AI-driven cyber threats dominate new Palo Alto Networks report

Thu, 15th Aug 2024
#
uc
#
firewalls
#
vpns
Palo Alto Networks' '2024 Unit 42 Report' reveals rising cybersecurity threats driven by AI, with sectors like insurance and pharmaceuticals facing heightened vulnerabilities.
Techday ab932975665e2ba2755e

Rapid7 launches Command Platform for security management

Tue, 6th Aug 2024
#
casb
#
ai
#
shadow it
Rapid7 has launched Command Platform, integrating security data for comprehensive threat monitoring and management.
Techday 89ef25794f5a627dbf88

Understanding and defending against the dangers of using open-source software

Wed, 24th Jul 2024
#
virtualisation
#
casb
#
breach prevention
As more businesses embrace open-source software for its affordability, experts warn of significant risks, including vulnerabilities and unverified code provenance.
Img 5utleoenj34cttptyx15zjqo

Major inefficiencies discovered in SaaS contract management

Fri, 8th Mar 2024
#
saas
#
casb
#
cloud services
A study by Vertice reveals businesses waste 385 hours in meetings annually due to inefficiencies in software contract management.
Img fummdxntaefjs9gtsdn9ybvy

Check Point Software launches new SaaS security tool

Fri, 8th Mar 2024
#
casb
#
shadow it
#
check point software
Check Point Software launches Harmony SaaS, an innovative tool designed seamlessly integrate into existing infrastructure.