Incident Response stories
Security teams could cut investigation times as the new platform triages alerts and embeds threat intelligence into existing workflows.
It aims to cut outage investigation time for engineers by combining live telemetry with incident history, changes and service context.
The tie-up could cut downtime for enterprises by letting AI detect incidents, generate playbooks and trigger fixes across hybrid estates.
AI-driven attacks are exposing weak passwords on cameras and access controls, prompting calls for stricter governance across physical security systems.
Enterprises using Microsoft Defender will get round-the-clock human-led threat hunting, as CrowdStrike also broadens its AI risk coalition across partners.
Pressure to simplify fragmented security tools is driving BlueVoyant’s leadership shake-up as John Hernandez takes over as Chief Executive Officer.
Attackers were exploiting a critical Weaver E-cology flaw within five days of the vendor patch, Vega said, with repeated attempts blocked.
The ranking highlights growing demand for intelligence that can guide detection and response inside security tools, rather than stand-alone reports.
Rising identity-based attacks are pushing Australian and New Zealand businesses to seek faster recovery tools for Active Directory and hybrid systems.
Finance teams reviewing expense software may now see added assurance, as Weel has secured SOC 2 and ISO 27001 certifications and opened a Trust Centre.
Rising use of autonomous AI tools on corporate devices has left security teams blind to agents that can access sensitive data and systems.
IT teams can now open and record remote desktop sessions from Rippling, tying support actions to device records and policies.
Many security teams are deploying AI before proving it works, with readiness scores as low as 30% despite 78% confidence.
Broader attacker activity is increasingly moving beyond stolen credentials, even as identity still accounted for 58.7% of incidents in Q1 2026.
Threats are spreading beyond inboxes as phishing shifts into Teams, calendars and other collaboration tools, raising the risk for hybrid workers.
Attackers are exploiting help functions to reset credentials and bypass defences, putting entire networks at risk through a single call.
Operational gaps are emerging as most large companies push AI agents into production before staff believe they are ready.
Security teams can now trace AI-led attacks before phishing begins, as Outtake targets lookalike domains, bot networks and fake accounts.
Rising use of managed security services is prompting Infosecurity Europe to widen partner-only access and add new networking space for 2026.
Log bills are rising fast as cloud-native systems swamp legacy tools and drag incident resolution, and Australian firms are paying over USD $1 million a year.