IT Brief Ireland - Technology news for CIOs & IT decision-makers

Risk Management stories - Page 29

Massive cloud shield over office and datacenter network security

Cato unveils Dynamic Prevention engine for SASE security

Last month
#
firewalls
#
digital transformation
#
hyperscale
Cato launches Dynamic Prevention, a SASE-native engine that auto-detects multi-stage attacks by correlating months of security telemetry.
Ethical hacker structured pentest multi monitors robot scanner

Survey shows pentesters favour PTaaS over bug bounties

Last month
#
devops
#
application security
#
devsecops
New research from Cobalt finds 98% of surveyed pentesters prefer PTaaS to bug bounties and show almost no faith in AI-only security scanning.
Modern bank operations room dashboard cards atms fraud monitoring

ACI unveils Connetic for Cards to unify payments ops

Last month
#
digital transformation
#
fintech
#
blockchain
ACI Connetic for Cards promises unified issuing, acquiring and ATM processing as banks race to modernise card systems and fight fraud.
Modern london fintech boardroom women leading tech finance meeting

Women push for faster gender parity in fintech & tech

Last month
#
fintech
#
socs
#
risk & compliance
Senior women across fintech, private equity and cyber call for faster gender parity, urging sponsorship, structural change and bold hiring.
Secure enterprise data hub governed ai access transparent shield

RecordPoint unveils MCP Server for governed AI data

Last month
#
physical security
#
ai security
#
risk & compliance
RecordPoint launches an MCP Server to give AI tools secure, auditable access to governed enterprise data via a standardised interface.
Minimalist financial compliance control room filtered alerts highlighted

Smarsh unveils AI tool to cut compliance alert noise

Last month
#
fintech
#
risk & compliance
#
ai
Smarsh launches AI-powered Noise Reduction Agent to suppress low-risk messages, promising 60% fewer false positives for smaller firms.
Email attachment20260306 2983184 ievz26

Climb, Sophos seal exclusive Irish cybersecurity deal

Last month
#
firewalls
#
data protection
#
endpoint protection
Climb secures exclusive Irish distribution of Sophos Threat Profile and full suite, targeting rising AI-driven cybersecurity demand.
Secure data center racks shield folders global regions

iManage enhances Insight+ to close the AI governance gap

Last month
#
data protection
#
document management
#
digital transformation
iManage upgrades Insight+ to plug the AI governance gap, adding richer metadata, data warehouse links and multi-region, compliant search.
Email attachment20260306 2443802 fgl5gw

CIOs warn AI adoption is racing ahead of governance

Last month
#
data protection
#
data analytics
#
digital transformation
CIOs warn AI is being rolled out faster than governance can keep up, with many fearing security gaps and lacking oversight of tools in use.
Worried office worker old phone shadow hacker corporate network

Coruna exploit kit exposes risks for outdated iOS users

Last month
#
endpoint protection
#
pam
#
mfa
New Coruna exploit kit shows outdated iOS devices face automated, scalable attacks that can turn compromised phones into corporate gateways.
Global it distribution hub cloud ai network europe apac mea latam

Distributors emerge as digital force in cloud & AI

Last month
#
data analytics
#
digital transformation
#
hyperscale
IT distributors are emerging as strategic cloud and AI power-brokers, driving subscription growth, hyperscaler ties and digital platforms.
Addison hero screenshot

Addepar unveils Addison AI to power wealth insights

Last month
#
data analytics
#
digital transformation
#
fintech
Addepar launches Addison AI to give wealth managers trusted, natural language portfolio intelligence embedded across its platform workflows.
Pro vs newbie socs side by side network diagrams cinematic lighting

Agentic AI boosts elite cyber teams but hinders rookies

Last month
#
devops
#
socs
#
apm
Agentic AI massively accelerates elite cyber teams but can slow inexperienced hackers, Hack The Box's large-scale benchmark reveals.
Heather mahalik  1

Why women can be leaders when it comes to AI

Last month
#
data protection
#
ransomware
#
digital transformation
Women in cybersecurity, long trained to question and validate, are uniquely placed to lead the era of risky, fast‑moving AI tools.
Japan factory night ransomware attack shadow figure network

Ransomware attacks surge 50% as industrial firms hit hardest

Last month
#
malware
#
data protection
#
ransomware
Global ransomware attacks jump 50% to 7,874 in 2025, with industrial firms bearing the brunt as criminal groups reshuffle their tactics.
Elaine mullan image

Where are the godmothers of AI in the tech industry?

Last month
#
fintech
#
risk & compliance
#
ai
Women shape our world, yet lack power over AI systems that govern work, wealth and welfare - where are the true godmothers of AI?.
Dev team monitoring code pipelines with app security scanning

Archipelo, Checkmarx tie dev context to app security

Last month
#
devops
#
application security
#
devsecops
Archipelo and Checkmarx partner to fuse dev workflow signals with app security scans, giving teams origin evidence to prioritise fixes.
Operator checking meters and reporting on radio resized

Stolthaven expands Ultimo use to boost safety & AI

Last month
#
manufacturing
#
digital transformation
#
supply chain
Stolthaven is rolling out more Ultimo tools to unify global terminal maintenance, tighten safety controls and embed AI into daily workflows.
Email attachment20260306 2729502 dfyi8t

RecordPoint unveils MCP Server to govern enterprise AI

Last month
#
data protection
#
digital transformation
#
physical security
RecordPoint launches an MCP Server to give AI agents standard, auditable access to governed enterprise data without bespoke connectors.
Asian engineer cybersecurity breach red warnings cloud repos

Claude Code flaws expose new risks in AI dev tools

Last month
#
devops
#
cloud security
#
application security
Claude Code flaws found by Check Point could let malicious repos run code and grab API keys before developers confirm a project is trusted.