SecurityBrief New Zealand - Technology news for CISOs & cybersecurity decision-makers

Cyber resilience stories - Page 6

Dim office ransomware laptop chat bubbles qr codes masked figures

Ransomware attacks dip but NCC warns threat evolving

Fri, 27th Feb 2026
#
data protection
#
ransomware
#
iot security
Global ransomware attacks fell 17% in January, but NCC warns evolving tactics, AI and messaging apps mean risk is not receding.
Isometric hybrid cloud datacenter kubernetes nas backup recovery

CloudCasa boosts OpenShift backup with SMB & VM restores

Fri, 27th Feb 2026
#
storage
#
virtualisation
#
data protection
CloudCasa adds SMB backup targets, edge efficiencies and VM file-level restores to sharpen Red Hat OpenShift data protection.
Isometric cybersecurity control room threat dashboard resolution

Tonic unveils AI agent to automate cyber risk fixes

Fri, 27th Feb 2026
#
digital transformation
#
cloud security
#
application security
Tonic launches Mobilization Coordinator AI agent to unify exposure data and automate cyber risk remediation with verified outcomes.
Uk map cybersecurity partners secure network office icons

Zero Networks adopts channel-first model to grow UK partners

Thu, 26th Feb 2026
#
firewalls
#
network security
#
mfa
Zero Networks shifts to a 100% channel-first model and revamps its Zero to Sixty programme to accelerate UK partner growth in cybersecurity.
Email attachment20260226 1815753 m16khh

Industry 4.0 study warns OT ubiquity masks weak governance

Thu, 26th Feb 2026
#
robots
#
network infrastructure
#
manufacturing
OT is now near-universal in Industry 4.0, but an AMDT study warns weak governance and uneven automation are eroding resilience gains.
Cyber resilience office night glowing threat waves locked shield

AI reshapes cyber risk, N-able urges resilience shift

Thu, 26th Feb 2026
#
data protection
#
dr
#
digital transformation
AI-fuelled cyber threats are outpacing reactive defences, N-able warns, urging smaller firms to prioritise resilience over traditional security.
Enterprise datacenter cybersecurity cloud backup ransomware recovery

Commvault, CrowdStrike link backups to Falcon SIEM

Thu, 26th Feb 2026
#
malware
#
data protection
#
dr
Commvault deepens CrowdStrike tie-up with two-way link between backup telemetry and Falcon Next-Gen SIEM to speed trusted cyber recoveries.
Wendy koh pic 2

Hitachi Vantara tops APeJ high-end storage rankings

Thu, 26th Feb 2026
#
storage
#
data protection
#
dr
Hitachi Vantara claims top APeJ spot in IDC's Q3 2025 rankings for high-end external storage, leading key markets including India and Korea.
Marshall erwin ciso headshot

AI-first firms hit by slower, costlier cyber recoveries

Thu, 26th Feb 2026
#
firewalls
#
digital transformation
#
network security
AI-first firms face a seven-month average cyber recovery and 135% higher incident costs as AI adoption outpaces modern security controls.
Ajay biyani

Securonix promotes Ajay Biyani to lead APJ strategy

Thu, 26th Feb 2026
#
saas
#
siem
#
digital transformation
Securonix has promoted Ajay Biyani to Senior Vice President for Asia Pacific and Japan, tasking him with spearheading regional growth.
Cio nighttime office ai cyber attack warning screens digital storm

CIOs brace for AI-led cyber attacks but feel unready

Thu, 26th Feb 2026
#
digital transformation
#
cloud security
#
phishing
Most CIOs expect AI-driven cyber attacks within a year, but only a third feel prepared, exposing a widening gap in cyber resilience.
Moody enterprise server room chains ransomware hidden encryption

Polymorphic ransomware, shadow encryption hinder recovery

Thu, 26th Feb 2026
#
storage
#
malware
#
data protection
Polymorphic ransomware and 'shadow encryption' are rapidly rising, Index Engines warns, making attacks harder to detect and recovery riskier.
Glowing red world map ransomware ai cyber attack broken padlock

GenAI misuse & ransomware drive surge in cyber attacks

Thu, 26th Feb 2026
#
malware
#
edutech
#
uc
Global cyber attacks hit 2,090 a week in January as ransomware surges and risky GenAI use exposes fresh data-leak and intrusion paths.
Ai telecom datacenter hpe technicians 5g edge infrastructure

HPE launches AI‑native telecom kit spanning core to edge

Wed, 25th Feb 2026
#
virtualisation
#
uc
#
firewalls
HPE debuts AI-native telecom kit from core to edge, unifying Juniper routing, ProLiant telco servers and new cloud ops software stack.
Ciso hesitates at glowing deploy button in ai cyber soc

CISOs cautious as agentic AI adoption in security lags

Wed, 25th Feb 2026
#
firewalls
#
data protection
#
manufacturing
CISOs slow-roll agentic AI in defence, even as they brace for more advanced, AI-boosted attacks and rising personal liability risks.
Modern data center corridor interlocking cubes ai merger visual

Everpure rebrands from Pure Storage with 1touch deal

Tue, 24th Feb 2026
#
storage
#
data protection
#
dr
Everpure debuts as Pure Storage's new name and moves deeper into AI-ready data management with a planned acquisition of 1touch.
Wall street data center ai acquisition executives handshake

Everpure rebrands & moves into AI data intelligence

Tue, 24th Feb 2026
#
storage
#
virtualisation
#
data protection
Everpure debuts new name on Wall Street and moves deeper into AI by agreeing to acquire data intelligence specialist 1touch.
Img 2840

Proofpoint & Concentrix deepen Asia Pacific cyber push

Mon, 23rd Feb 2026
#
data protection
#
digital transformation
#
cloud security
Proofpoint and Concentrix form Asia Pacific partnership to embed people-centric cyber and data protection tools into regional SOC services.
Untitled design  76

From breach to recovery - 5 ways to prepare your IT team for the unexpected

Sat, 21st Feb 2026
#
firewalls
#
data protection
#
dr
When cyber attacks slip through defences, recovery readiness - not just prevention - decides whether your organisation bends or breaks.
Cinematic data center night firewall crack ransomware attack icon

Barracuda links 2025 ransomware wave to firewall flaws

Fri, 20th Feb 2026
#
firewalls
#
data protection
#
ransomware
Barracuda warns that unpatched firewalls and weak accounts drove 90% of 2025 ransomware attacks, as threats spread in mere hours.