
Hexnode has launched Hexnode IdP, a native identity provider embedded within its unified endpoint management (UEM) platform. The solution combines authentication, single sign‑on, MFA and role‑based access with real‑time device posture checks, allowing only compliant devices to access corporate applications. By leveraging Hexnode’s Device Trust Engine, organizations can replace separate IdP licenses and enforce continuous zero‑trust policies. Integration with Microsoft Entra ID, Google Workspace and other directories streamlines provisioning and governance.

Cyolo has launched Cyolo PRO 7.0, an upgrade that extends its OT‑first secure remote access platform with AI‑driven session intelligence, passive asset and traffic discovery, and a consolidated operational dashboard. The AI engine automatically transcribes session video, categorizing user actions to speed...
Dangling DNS records—stale domain pointers left after cloud resources are shut down—are being weaponized by attackers to create automated data exfiltration pipelines for AI agents. By hijacking the abandoned hostname, threat actors embed hidden prompts that AI assistants interpret as...
In 2026 enterprises are spread across AWS, Azure and Google Cloud largely due to mergers, product deadlines and lock‑in avoidance, not a deliberate strategy. Multicloud adoption has outpaced the development of a unified operating model, leaving companies with three separate...

Business email compromise (BEC) and funds transfer fraud (FTF) accounted for 58% of cyber‑insurance claims in 2025, with BEC alone representing 31% of all claims. Average BEC loss fell 28% to $27,000 and FTF loss dropped 14% to $141,000, while...

Gal Livschitz, senior penetration tester at Terra Security, explains how phishing has become harder to detect by leveraging HTTPS, branded look‑alike domains, and sophisticated delivery methods. He highlights the rise of QR‑based phishing in PDFs, MFA‑fatigue attacks that pressure users...

The NeuroGrid competition, hosted on Hack The Box, pitted 120 AI‑augmented teams against 958 human‑only teams across 36 security challenges. AI‑augmented participants completed 73% of challenges, far outpacing the 46% completion rate of human‑only teams. The advantage was strongest on...
Audit readiness assessments are proactive reviews that verify an organization’s controls, policies, and evidence before an official audit. By mapping controls to frameworks such as SOC 2, ISO 27001, HIPAA, or PCI DSS, firms can pinpoint gaps, assign ownership, and remediate issues early....

Enterprise Security Operations Centers face overwhelming alert volumes—averaging 4,484 alerts daily, with 67% never investigated. Autonomous triage platforms such as D3 Security's Morpheus use AI to ingest, investigate, and respond to 100% of alerts, cutting false‑positive handling by 99% and...
Tufin has appointed HAT Distribution as its official distributor for Australia and New Zealand, expanding the vendor's footprint in the region. The partnership stresses technical enablement and architectural alignment rather than a purely transactional sales model. HAT will embed Tufin’s policy‑management...
EY announced the launch of EY.ai Agentic for Sales, an AI‑driven sales orchestration platform built with Snowflake’s data cloud and Canva’s design automation. The solution integrates real‑time data intelligence, automated content generation, and EY’s consulting frameworks to streamline prospecting, outreach,...

ShinyHunters claims to have breached Woflow, a SaaS vendor serving large enterprises such as Uber, DoorDash, and Walmart, highlighting a shift toward upstream supply‑chain attacks. The alleged breach, though unconfirmed, follows a pattern of targeting integration‑heavy providers to gain downstream...

Traditional data protection programs are fragmented, leading to gaps and compliance risk. PKWARE advocates a policy‑based approach that centralizes discovery, classification, encryption, masking, and redaction across all environments. By automating controls with customizable policies, organizations can scale protection, maintain productivity,...

📊⚡️The enterprise technology agenda just shifted again in a very fast-paced market: My latest @TheFuturumGroup 1H 2026 CIO & Tech Buyers Global Enterprise Decision Maker Survey reveals a set of structural changes happening inside enterprises right now. Across three quarterly waves of...
If you are a practicing fractional CISO and want to be part of something bigger, we are building. CXO Advisor is scaling and we are looking for experienced security leaders who want impact across multiple organizations. DM me.

Cisco disclosed 48 vulnerabilities across its ASA, Secure FTD and Secure FMC firewall portfolio, including two CVE‑2026‑20079 and CVE‑2026‑20131 that received a perfect 10‑out‑of‑10 CVSS rating. The critical flaws affect the FMC web interface, enabling authentication bypass and remote code execution with...
In winter survival training they call it 'dirt time'. You need to get hands-on and practice. Skills decay if you do not practice them. The same is true in security: Tabletop exercises, incident response drills, access reviews. If you only touch...
"Trust, but verify" is the new data mantra for AI literacy. Teach employees to validate LLM and AI agent outputs instead of treating them as unquestioned truth. #DataCulture #AI #CIO https://t.co/aiB5P99ido

CrowdStrike and Schwarz Digits have teamed up to launch the Falcon cybersecurity platform on STACKIT, the sovereign cloud operated by Schwarz Digits. The integration lets European enterprises run endpoint, cloud, identity and exposure protection while keeping all telemetry and detection...
Model progress continues unabated, with GPT-5.4 showing significant improvements in critical knowledge worker tasks. In our Box AI tests, we saw a 6 point jump in agentic document processing, which is upstream from most automation workflows. GPT-5.4 is now available...

My latest research: The Great CIO Platform Reset: Why Agentic AI Is Forcing a 2026 Reckoning | @TheFuturumGroup https://t.co/5nUzVNyJb8 https://t.co/mo0N1ROE2a

ThreatLocker announced that its deny‑by‑default security model now covers cloud workloads and mobile devices, extending its zero‑trust network and cloud‑access offerings. The new solution binds SaaS access to both user identity and approved devices, eliminating the need for VPNs and...
Think beyond co-pilots. Agentic AI in ops means agents that observe signals, reason across security and reliability data, and take guarded actions - not just summarize alerts. #ITOps #SecOps https://t.co/e3w3lXkvfc

#CIOChat Q4: Endgame: Modern CIOs are shifting from control to credibility: Transparency, shared roadmaps, product operating models, and visible tradeoffs. What current or new practices are working for you to build durable trust between IT and the business today? https://t.co/pO7J5Oaktf

Hexnode has upgraded its Genie AI assistant with a conversational interface for its Unified Endpoint Management (UEM) platform. The new natural‑language layer lets IT administrators ask for device data, run remote actions, and receive automated troubleshooting steps in real time....

#CIOChat Q2: Realities force tradeoffs. Product teams, business units, and leadership all expect priority. What governance, transparency, or portfolio practices have helped you keep stakeholders aligned when “everything” can’t be top priority? https://t.co/4w0YiIJOHF

#CIOChat Q1: Trust is the invisible operating system of IT. When stakeholders feel ignored, often due to massive backlogs and the reality that not every request can match their priority, where does the trust gap typically begin in your org?...
Edge AI is moving from data‑center inference to real‑time execution at the edge, where decisions must be made within milliseconds. Wind River CTO Paul Miller highlighted the role of its 45‑year‑old VxWorks real‑time operating system in delivering deterministic performance for...

The industry has confused adding digital features with true transformation. Having a mobile app and digital account opening doesn’t make you digitally mature. Real transformation changes culture, processes, and mindset. Download the free report now: https://t.co/gNGFxphUMy https://t.co/bz0SeOWTSW

LucidLink Corp. launched LucidLink Connect, a feature that lets enterprises mount S3‑compatible object storage as a live file system, enabling real‑time collaboration without data migration. The platform streams files on demand, using byte‑range reads, caching and parallel TCP streams to...

Kevin O’Leary’s O’Leary Digital announced a joint venture with West GenCo to build the Wonder Valley data‑center campus in Utah, targeting up to 7.5 gigawatts of power. A sister campus in Grande Prairie, Alberta, will mirror the capacity, creating an initial 15‑gigawatt...

Codenotary unveiled Codenotary Trust, a SaaS platform that leverages artificial intelligence to detect, prioritize, and autonomously remediate security, configuration, and performance issues across Linux, containers, VMs, and applications. The solution is built for junior and mid‑level administrators, addressing the talent gap...

Push Security has introduced a malicious browser‑extension detection and blocking feature within its browser‑based security platform. The capability leverages a continuously updated intelligence database to automatically block known‑bad extensions and provide real‑time visibility into all extensions across employee browsers. Administrators...
The Administration for Strategic Preparedness and Response (ASPR) has added a cybersecurity module to its Risk Identification and Site Criticality (RISC) 2.0 Toolkit, giving health systems a standardized way to assess cyber risk. The module uses a questionnaire scored against the...
RT Chaotic AI experiments feel exciting, but they're quietly burning time, trust, and budget. Without focus, governance, and integration into real workflows, "innovation" becomes noise, not value. #AI #CIO #DigitalTransformation @Star_CIO https://t.co/VtuS5rQ0ZG

WisdomAI, an AI‑native business intelligence startup, announced the launch of its Federated Agentic Intelligence platform, shifting its focus from passive insights to autonomous enterprise execution. The platform combines an Enterprise Context Layer, a Model Context Protocol client, and an Adaptive...
State-affiliated hackers set up for critical OT attacks that operators may not detect | CSO Online https://t.co/bvLvNOk8Fn
Cybersecurity is evolving from a patch‑centric practice to Exposure Management (EM), a framework that quantifies an organization’s attack surface in business terms. EM aggregates vulnerability, cloud, identity and attack‑surface data into exposure scores tied to revenue, compliance and brand reputation....

TransUnion announced its AI Analytics Orchestrator Agent, an AI‑driven layer on the TruIQ platform that leverages Google Vertex AI and Gemini models to automate credit analytics. The agent translates natural‑language queries into governed workflows, generating models, studies, and recommendations in...

Narada, an enterprise AI startup founded by veteran entrepreneur David Park, built its product by conducting more than 1,000 customer calls to pinpoint workflow automation pain points. The team deliberately postponed fundraising, preferring bootstrapped growth to stay lean and avoid...

Uptycs and SAP announced a strategic partnership to integrate Uptycs’ AI analyst platform, Juno, into enterprise cybersecurity operations. Juno functions as a virtual analyst, using a glass‑box approach that links AI‑generated insights to a unified telemetry set of roughly 150,000...
Ethio Telecom and Ericsson have signed a landmark agreement to expand and modernize Ethiopia’s mobile network. The project will upgrade 1,500 sites, add 2.8 million new 4G capacity and extend LTE to 276 towns, raising population coverage to 85 %. It includes...

Uganda Development Bank (UDB) has named Peter Mukuru as Director of Business Technology and Executive Committee member, tasking him with leading the bank’s enterprise‑wide digital transformation. Mukuru arrives with over two decades of experience across development finance, government agencies and...

Confluent announced that its Streaming Agents now support Anthropic’s Model Context Protocol (MCP) and the Agent2Agent (A2A) protocol, creating a dual‑layer for real‑time data ingestion and inter‑agent coordination. The platform also introduced multivariate anomaly detection powered by Apache Flink, offering...

Cavero Quantum, a University of Leeds spin‑out, has developed post‑quantum cryptography and password‑less authentication that can run on ultra‑constrained devices such as SIM cards. Backed by the UK government’s CyberASAP programme, the startup moved from a funded demo to real‑world...

Capitec has introduced Pulse, an AI‑powered contact‑centre tool that delivers real‑time context about a client’s issue before the call starts. By aggregating payment data, app diagnostics and risk signals, Pulse enables agents to resolve queries faster, cutting handling times by...
Modernizing your tech stack and investing in new platforms might not save you money long-term. Moving to the cloud can keep you relevant, but expect increased costs. #CloudMigration #TechCosts https://t.co/A83D0Fky42

HP has deepened its partnership with the Ferrari Formula 1 team, delivering AI‑enabled infrastructure and HP Workstation Z hardware to power massive simulation workloads. The collaboration focuses on processing billions of parameters—track layouts, weather, fuel and aerodynamic regulations—to optimize car design and race...
"Multicloud chaos is fundamentally a data problem, and genAI's edge is building a unified semantic layer over configs, logs, schemas, and lineage." #SRE #Cloud #CIO https://t.co/vBzM21vM14

The AI Operating Model Overlay Playbook introduces a plug‑in framework that adds AI‑specific decision points, controls, and evidence requirements to an enterprise’s existing IT operating model. It defines tiered delivery pathways, standard artifact sets, and post‑go‑live monitoring to make AI...