eCommerceNews Canada - Technology news for digital commerce decision-makers

Enterprise security stories - Page 23

It admin server room zero trust remote access rdp ssh vnc telnet

Portnox expands zero trust access to console tools

Thu, 12th Feb 2026
#
firewalls
#
vpns
#
network security
Portnox extends zero trust network access to RDP, SSH, VNC and Telnet, promising passwordless admin access and fewer VPN dependencies.
Saas investigations

Genetec adds AI tools to speed video incident review

Thu, 12th Feb 2026
#
digital transformation
#
cloud security
#
it automation
Genetec adds AI-powered natural language search and movement tracking to Security Centre SaaS to cut multi-site video reviews from hours to minutes.
Warehouse trucks cloud access control network dusk security scene

Wesco named exclusive US distributor for Acre Security

Thu, 12th Feb 2026
#
digital transformation
#
cloud security
#
socs
Wesco becomes Acre Security's exclusive US distributor, expanding cloud access control and intrusion offerings nationwide.
Primage saas investigations v2 hires

Genetec adds case investigation tools to Security Centre SaaS

Thu, 12th Feb 2026
#
cloud security
#
it automation
#
socs
Genetec adds AI-driven search and case tools to Security Centre SaaS, promising to cut multi-site video investigations from hours to minutes.
Briancunninghamphoto

QuSecure appoints Brian Cunningham to drive PQC growth

Thu, 12th Feb 2026
#
firewalls
#
data protection
#
digital transformation
QuSecure hires ex-Navy SEAL commander Brian Cunningham as EVP for strategy and growth to scale post-quantum cryptography adoption.
Stealthy cloud server room data theft ghostly silhouette cable

Hackers ditch noisy ransomware for stealthy data theft

Thu, 12th Feb 2026
#
firewalls
#
data protection
#
dr
Hackers are abandoning noisy ransomware to quietly steal data, as a report finds 80% of top attack techniques now focus on evasion.
Moody windows server room red rack cracked email lock binary

SmarterMail flaw exploited in China-linked ransomware push

Thu, 12th Feb 2026
#
firewalls
#
vpns
#
ransomware
China-linked Warlock ransomware group exploits SmarterMail flaw for admin takeovers, chaining features to gain full Windows control.
Global supply chain network dark web overlay cyber shield

Bitsight unveils dark web tool to secure supply chains

Wed, 11th Feb 2026
#
data protection
#
martech
#
advanced persistent threat protection
Bitsight launches an AI-driven dark web monitoring tool to give organisations earlier warning of cyber threats targeting key suppliers.
Enterprise devops secops room dashboard threat graphs containers

Armis unveils AI-native Centrix platform for app security

Wed, 11th Feb 2026
#
devops
#
application security
#
socs
Armis launches AI-native Centrix platform to secure application code, aiming to cut false alarms and safeguard AI-assisted development.
Soc cisos overwhelmed by red alerts few highlighted in focus

Cyber firms face 'verification crisis' on real risk

Wed, 11th Feb 2026
#
firewalls
#
devops
#
digital transformation
Cyber firms warned over 'verification crisis' as tools flag floods of flaws but only 0.47% prove exploitable, leaving real risk unresolved.
Vidya

Enterprises urged to act now on post-quantum security

Wed, 11th Feb 2026
#
data protection
#
digital transformation
#
encryption
Quantum leaps from Google, IBM and Microsoft are shrinking the Q‑Day countdown, forcing enterprises to race toward post‑quantum cryptography.
Amelia foss

SonicWall unifies NSM for future-ready security ops

Wed, 11th Feb 2026
#
firewalls
#
migration
#
hybrid cloud
SonicWall folds legacy tools into Network Security Manager, unifying firewall analytics and reporting across its Unified Management platform.
Cinematic secure data center ai shield hologram blue teal lighting

Token Security named RSAC 2026 Innovation Sandbox finalist

Wed, 11th Feb 2026
#
pam
#
cloud security
#
socs
Token Security named RSAC 2026 Innovation Sandbox finalist for its platform securing and governing autonomous AI agent identities.
Asia  pacific and japan

CyberArk crowns PwC 2025 Global Partner of the Year

Wed, 11th Feb 2026
#
digital transformation
#
hyperscale
#
pam
CyberArk names PwC its 2025 Global Partner of the Year as partner-led deals surge and certification-driven identity security gains pace.
Corporate it soc monitors network diagrams red attack path analysis

SpecterOps unveils BloodHound Scentry identity risk service

Wed, 11th Feb 2026
#
devops
#
pam
#
cloud security
SpecterOps has launched BloodHound Scentry, a managed identity risk service to find and remediate attack paths across complex environments.
Enterprise control room unified cloud security dashboard hub view

Fortinet unifies cloud risk signals in FortiCNAPP upgrade

Wed, 11th Feb 2026
#
firewalls
#
data protection
#
hybrid cloud
Fortinet updates FortiCNAPP to fuse network, data and runtime signals into one workflow, aiming to cut cloud tool sprawl and speed remediation.
Secure bank data center glass vault hsm blockchain cubes

Fireblocks & Thales deepen bank crypto key control

Tue, 10th Feb 2026
#
fintech
#
blockchain
#
physical security
Fireblocks deepens its Thales tie-up to keep bank crypto keys in customer-owned HSMs, tightening control, compliance and resilience.
Cloud fortress metal shields with gated data streams ai security

SentinelOne debuts lifecycle platform for AI security

Tue, 10th Feb 2026
#
storage
#
data protection
#
cloud security
SentinelOne has launched an end-to-end AI security lifecycle platform, adding DSPM, CSPM and runtime protections for enterprise AI deployments.
Moody user at desk surrounded by phishing login screens monitors

Record rise in digital squatting fuels phishing wave

Mon, 9th Feb 2026
#
malware
#
phishing
#
martech
Record digital squatting surge sees 6,200 disputes in 2025, as lookalike domains drive costly phishing, malware and payment fraud.
Ai malware tentacles in corporate mac network stealing crypto

Bitdefender warns OpenClaw AI skills rife with malware

Mon, 9th Feb 2026
#
malware
#
firewalls
#
network security
Bitdefender says 17% of OpenClaw AI skills act maliciously, with crypto-focused tools spreading macOS infostealers into corporate networks.