SecurityBrief UK - Technology news for CISOs & cybersecurity decision-makers

Enterprise security stories

Developer workstation ai security shields protecting supply chain

Checkmarx revamps AI-era app security with new agents

Today
#
application security
#
devsecops
#
supply chain
Checkmarx overhauls its One platform with AI-native security agents to guard fast-moving, agentic development and AI software supply chains.
Secure datacenter with shielded servers and vetted oss packages flow

ActiveState unveils Curated Catalog for safer code

Today
#
application security
#
devsecops
#
supply chain
ActiveState launches Curated Catalog, a private, pre-vetted open source repository to tighten software supply chain security for enterprises.
Screenshot 2026 03 17 at 10.31.46

Hetzner deploys Nokia Deepfield to bolster DDoS defence

Yesterday
#
firewalls
#
ddos
#
data protection
Hetzner adopts Nokia Deepfield Defender across European data centres to automate edge DDoS mitigation and safeguard rising AI workloads.
Glowing fintech network shield smartphone fingerprint security

XConnect & SONIO team up to fight fraud in fintech

Yesterday
#
gaming
#
data protection
#
mfa
XConnect links its mobile network fraud signals into SONIO's identity platform to tighten onboarding and compliance for fintech and gambling.
Secure cloud fortress identity governance ai humans robots

SailPoint & AWS ally on AI agent identity governance

Yesterday
#
saas
#
digital transformation
#
hyperscale
SailPoint strikes multi-year AWS deal to govern fast-growing AI agent identities with unified controls across human and machine access.
Email attachment20260317 1585473 vn9nrh

Nozomi named Leader in Gartner CPS security ranking

Yesterday
#
iot security
#
iot
#
advanced persistent threat protection
Nozomi again lands in Gartner's Leaders quadrant for CPS protection, topping four key use cases in the 2026 Critical Capabilities report.
Daniel bernard headshot

CrowdStrike & Nvidia unveil secure AI agent blueprint

Yesterday
#
hyperscale
#
cloud security
#
dc
CrowdStrike and Nvidia launch a secure AI agent blueprint and MDR tools, promising faster probes and tighter control over autonomous systems.
Shiv ramji  president auth0 headshot

Rise of AI Agents introduces new infosec risk: Okta

2 days ago
#
data protection
#
digital transformation
#
mfa
Okta warns that surging numbers of uncontrolled AI agents pose a major identity and access risk as they become the new digital workforce.
Shadowy hacker cyber attack on hospital mobile device management

Stryker probes global cyber attack via MDM systems

Last week
#
dr
#
ransomware
#
iot security
Stryker says a cyber attack disrupted internal systems, with investigators examining mobile device tools as experts warn of rising state-linked threats.
Global security leaders roundtable ai governance cyber risk

Global CISO Council launched to steer AI governance

Last week
#
data protection
#
advanced persistent threat protection
#
risk & compliance
EC-Council launches the Global CISO Council to unify AI governance, tech risk oversight and regulatory response for senior security leaders.
Remote employee secure dns protection roaming wifi home office

DNSFilter adds DNS PreCheck to protect roaming staff

Last week
#
firewalls
#
vpns
#
endpoint protection
DNSFilter unveils DNS PreCheck to keep DNS security intact for roaming staff, blocking malicious domains across shifting Wi-Fi networks.
Secure data fortress ev hospital cloud with encrypted streams

Xiid secures EV charging, healthcare AI & multi-cloud

Last week
#
firewalls
#
data protection
#
vpns
Xiid inks trio of security deals to harden EV charging, healthcare AI data and multi-cloud landing zones against network-based attacks.
Ai cyberattack shadow figure robotscreens red alarm extortion

AI agents drive surge in cyber threats & extortion

Last week
#
malware
#
data protection
#
ransomware
AI agents are fuelling a new wave of cyber risk, as criminals weaponise automation to speed up ransomware and sharpen extortion tactics.
Hybrid it infrastructure network map cloud iot security visual

Zero Networks unveils real-time Network Map 2.0 tool

Last week
#
virtualisation
#
firewalls
#
ransomware
Zero Networks has launched Network Map 2.0, a real-time 'living map' to visualise hybrid networks and tighten microsegmentation security.
Office dusk executives over chaotic server room cyber defense

Midmarket firms overconfident as cyber tools fall short

Last week
#
devops
#
digital transformation
#
cloud security
Midmarket security chiefs brim with confidence yet lack the tools, staff and speed to keep pace with fast-moving cyber threats, survey finds.
Dino dimarino

Tenable appoints Dino DiMarino to drive AI security growth

Last week
#
network infrastructure
#
digital transformation
#
cloud security
Tenable appoints veteran cybersecurity sales leader Dino DiMarino as chief revenue officer to drive global growth in exposure and AI risk.
Secure data center corridor vault door quantum safe crypto

Forward Edge-AI unveils 12-month post-quantum roadmap

Last week
#
data protection
#
quantum computing
#
fleet management
Forward Edge-AI unveils a seven-phase post-quantum crypto playbook, giving regulators and critical sectors a 12-month migration roadmap.
Azure cloud security shield over servers and containers illustration

Upwind brings runtime cloud security platform to Azure

Last week
#
digital transformation
#
cloud security
#
advanced persistent threat protection
Upwind integrates its runtime cloud security with Azure, offering unified protection and Sentinel tie-ins via the Microsoft Marketplace.
Patrick

SonicWall revamps partner programme & appoints CRO

Last week
#
firewalls
#
network security
#
partner programmes
SonicWall overhauls its SecureFirst Partner Program and appoints Patrick O'Donnell as CRO to drive partner-led sales and managed services.
Chandrodaya prasad

Secure by default: Moving beyond secure by design

Last week
#
firewalls
#
hyperscale
#
network security
SonicWall champions 'Secure by Default', promising built-in, automated protection that tames tool sprawl and misconfigurations at scale.