CFOtech India - Technology news for CFOs & financial decision-makers

Incident Response stories - Page 4

Flux result de21b3c2 1302 490f a498 b9e86bb7230c

Commvault adds threat-hunting tools to backup scans

Last month
#
data protection
#
dr
#
ransomware
Commvault adds Hyper Threat Hunting and Deep Inspection to Cloud Threat Scan, linking backup scanning with verified clean recovery after cyber attacks.
Ryan mahoney

Why AI-powered security needs network telemetry across the hybrid cloud

Last month
#
firewalls
#
private cloud
#
hybrid cloud
AI security tools are only as smart as the data they see, and network telemetry is emerging as the missing piece in hybrid cloud oversight.
Flux result d8c5482f 7ea3 4d79 86b2 7167cdd86ee6

World Backup Day warnings over ransomware resilience gaps

Last month
#
data protection
#
dr
#
ransomware
Cybersecurity experts say many firms are still relying on fragmented backup tools and untested recovery plans as ransomware attacks and cloud complexity surge.
Flux result 25a0f563 2d65 4cbc a27f 5a7905606b96

Fenix24 launches Argos99 as standalone resilience software

Last month
#
saas
#
dr
#
ransomware
Fenix24 has turned Argos99 into a standalone SaaS platform, giving customers continuous asset visibility and dependency mapping to speed ransomware recovery.
Flux result ba8d2704 eda7 41f8 a9f8 18086152136e

Keepit: enterprises still lag on SaaS recovery testing

Last month
#
data protection
#
dr
#
digital transformation
Keepit's 2026 data report says most SaaS restores are single files, while many organisations still fail to test identity and bulk recovery.
Flux result 171281d8 fa44 459c a8d5 363abbfe16a0

China-linked Red Menshen hides inside telecoms networks

Last month
#
uc
#
advanced persistent threat protection
#
supply chain
Rapid7 says China-linked Red Menshen has planted dormant “sleeper cells” inside global telecoms networks to quietly maintain long-term access.
Pawel staniec catalogic software jpg

Security leaders warn backup gaps as threats evolve

Last month
#
virtualisation
#
data protection
#
dr
Security executives say organisations must move beyond simple backups, as Kubernetes, AI and ransomware strain recovery plans ahead of World Backup Day.
Flux result 86c5d3ff 8544 4b88 ac41 93781b8158bc

AppOmni adds Heisenberg mode after LiteLLM supply attack

Last month
#
virtualisation
#
cloud security
#
application security
AppOmni upgrades Heisenberg to help teams trace GitHub Actions and spot tainted dependencies after the LiteLLM supply chain breach.
Flux result 20060d8e 7292 4b00 9027 6d112c3fdc35

Gcore sees DDoS attacks surge to 1.3 million in Q4

Last month
#
gaming
#
ddos
#
network infrastructure
Gcore warns DDoS attacks hit 1.3 million in late 2025 as brief, high-volume floods and longer app assaults expose more sectors to risk.
Flux result 5dc530d5 0ad9 41d3 92ee 0123be7b4b53

Tenable launches Hexa AI to automate security workflows

Last month
#
digital transformation
#
cloud security
#
iot security
Tenable unveils Hexa AI for its exposure management platform, promising to automate security tasks across IT, cloud and identity environments.
Tom 1

CrowdStrike extends flexible services model to partners

Last month
#
digital transformation
#
cloud security
#
advanced persistent threat protection
CrowdStrike broadens its consumption-based model into services, offering partners and new customers flexible access to incident response and advisory support.
Flux result 8910bca1 99ae 4239 a7bb 1c491f2f1d85

Ransomware attacks fall as CL0P & The Gentlemen surge

Last month
#
malware
#
firewalls
#
ddos
Qilin keeps top spot as ransomware incidents drop 8% in February, while CL0P and The Gentlemen post sharp gains and new AI risks emerge.
Daniel bernard headshot

CrowdStrike launches Charlotte AI AgentWorks ecosystem

Last month
#
hyperscale
#
cloud security
#
martech
CrowdStrike unveils Charlotte AI AgentWorks ecosystem with Accenture, AWS and OpenAI to let security teams build custom agents without code.
Flux result 57f66fd4 471b 47e6 a679 f64fe3859229

WatchGuard expands NDR portfolio for SMEs and MSPs

Last month
#
firewalls
#
network security
#
advanced persistent threat protection
WatchGuard adds embedded detection, managed monitoring and automated response to its NDR range to help SMEs and MSPs spot threats earlier.
Flux result 8926e588 7507 45de 80f7 1f3ff982140c

Veeam joins Cybersecurity Coalition as policy debates grow

Last month
#
virtualisation
#
data protection
#
dr
Veeam joins the Cybersecurity Coalition, boosting industry influence over data resilience, AI governance and post-attack recovery policy.
Flux result 110baaa4 c6d3 4b1c a508 287d019f2a12

Vorlon launches tools for AI agent security response

Last month
#
data protection
#
cloud security
#
socs
Vorlon unveils AI Agent Flight Recorder and Action Centre to help security teams trace activity across SaaS apps and coordinate responses.
Editorial ciso studying cloud saas dashboards ai security warning symbols incidents

Vorlon survey finds SaaS AI security gaps among CISOs

Last month
#
data protection
#
cloud security
#
application security
Vorlon survey reveals nearly all CISOs suffered SaaS and AI security incidents in 2025, despite high confidence in existing controls.
Flux result 21b28ffc 2d00 47ff 8fb1 45052168cbea

ControlMonkey adds observability recovery for cloud tools

Last month
#
saas
#
data protection
#
dr
ControlMonkey broadens disaster recovery to Datadog, New Relic and other observability tools, giving teams versioned snapshots of dashboards and alerts.
Secure enterprise control room ai agent nodes toolchain anomaly cloud

Miggo expands runtime defence for AI agents & tools

Last month
#
firewalls
#
network security
#
cloud security
Miggo extends its runtime security platform to map, monitor and rein in AI agents and MCP toolchains as live behaviour becomes attack focus.
Flux result 0b725e6f 488f 44c4 b57e 5c23a2bc516f

NetRise launches Provenance to trace open source risk

Last month
#
devops
#
iot security
#
iot
NetRise unveils Provenance, a tool to trace open source maintainers and stop risky dependencies before they spread through software.