
Fintech firm Marquis, which serves over 700 banks, filed a lawsuit against firewall vendor SonicWall after a ransomware breach exposed client data for roughly 780,000 individuals. SonicWall later disclosed that a breach of its own firewall configuration backups affected all of its customers, undermining the defenses Marquis relied on. The complaint, lodged in the Eastern District of Texas, accuses SonicWall of negligence and seeks damages. This case highlights a growing trend of enterprises suing cybersecurity vendors for breach liability.

Enterprises are turning to Non‑Human Identity (NHI) management to close security gaps created by machine‑generated accounts and their secrets. By automating discovery, classification, monitoring and decommissioning, organizations can reduce breach exposure while cutting operational costs. Centralized NHI platforms deliver real‑time...

Non‑Human Identities (NHIs) are machine credentials that protect data in cloud‑first environments. The article outlines a full NHI lifecycle—from discovery to remediation—and stresses that piecemeal tools fall short. It highlights industry‑specific challenges, such as patient data in healthcare and DevOps...

Agentic AI is emerging as a transformative layer for digital security by automating the management of Non‑Human Identities (NHIs) and their secrets. The technology enables proactive threat detection, automated response, and continuous visibility, allowing security teams to shift focus toward...

Non‑human identities (NHIs) such as machine‑generated secrets are becoming a critical attack surface, prompting organizations to adopt comprehensive NHI management across discovery, classification, detection and remediation stages. Effective NHI programs deliver reduced breach risk, regulatory compliance, and operational efficiencies through...
Infotrust has sold its cloud and communications arm Nexgen to Aussie Broadband for up to $50 million, freeing capital to accelerate its sovereign cyber‑security strategy. The proceeds will be redeployed into identity, data‑privacy and broader federal‑government capabilities, as well as potential...

Lion’s group technology and digital transformation director Ram Kalyanasundaram will leave after nearly 15 years, passing the role to current digital and data chief Robb Simpson, who will now also oversee technology. The company said the change creates a single digital‑technology leader...

Techbot unveiled a three‑phase post‑go‑live framework that moves ERP projects from initial stabilization to performance optimization and ongoing governance. The first 30‑90 days focus on system reliability, data integrity and rapid issue resolution to build user confidence. The second phase...
FC Bayern has migrated its core IT landscape to SAP Cloud ERP Private, consolidating over 9.5 million fan and member records and more than 25,000 product master data entries into a single cloud system. The move supports a clean‑core architecture...

AWS Security Hub Extended introduces a bundled plan that lets enterprises procure, deploy, and manage a full‑stack security suite covering endpoints, identity, email, network, data, browsers, cloud, AI, and security operations from a single console. The offering expands protection beyond...
Santander launched Catalyst, a platform‑engineering solution built with AWS, to overhaul its cloud infrastructure. The initiative replaces a 90‑day manual provisioning process with an automated, Kubernetes‑based control plane that leverages Crossplane, ArgoCD, and OPA. By consolidating over 100 pipelines, Catalyst...

By early 2026 data‑center cooling has shifted from a simple air‑vs‑liquid debate to a full‑stack engineering challenge. Breakthroughs such as HRL Laboratories’ Low‑Chill single‑phase liquid cooling promise 40% more heat removal or a ten‑fold reduction in pumping power, while Johnson...
Inetum argues that true digital sovereignty hinges on demonstrable control over data and processes, not merely on owning infrastructure. As EU regulations such as the AI Act, Data Act and DORA embed accountability into system design, enterprises must prove who...

NIST’s Open Security Controls Assessment Language (OSCAL) gives state and local governments a machine‑readable alternative to spreadsheets, Word files, and PDFs for security‑control documentation. By encoding controls, implementations, and assessment results in JSON, XML or YAML, agencies can automate validation,...
Google DeepMind unveiled Nano Banana 2, a Gemini 3.1 Flash Image model that delivers Pro‑level text rendering, subject consistency, and image search at roughly half the cost of the Nano Banana Pro tier. The new offering reduces per‑image pricing to...

Contrast Security’s integration with ServiceNow Application Vulnerability Response (AVR) streams verified, runtime‑backed vulnerabilities directly into ServiceNow tickets, uniting detection and remediation workflows. The bidirectional sync supplies exploitability evidence, code location and environment context, eliminating manual validation steps. This enables security...

Eight of the world’s largest cloud providers will collectively invest about $710 billion in AI servers and data‑center infrastructure in 2026, a spend that eclipses Ireland’s entire GDP. The capex represents a 61 percent year‑over‑year increase, underscoring the rapid scaling of AI...

Salesforce unveiled Agentforce for Communications, a suite of telco‑specific AI agents designed to automate routine tasks and boost customer engagement. The solution targets a telecom sector facing slowing revenue growth—forecast at 2.9% by 2029—and high churn rates up to 40%....

Confluent Intelligence has introduced Streaming Agents, built on Google’s Agent2Agent protocol, to enable AI agents to share real‑time context and collaborate across platforms. The preview feature connects data sources such as BigQuery, Databricks, Snowflake and LangChain to third‑party systems like...

Versa has introduced the world’s first sovereign SASE‑as‑a‑Service, extending its earlier sovereign SASE model to a fully managed, in‑country offering. The service provides local control, management, and storage to satisfy data‑residency regulations such as the U.S. CLOUD Act. Versa reports...
ServiceNow reports that it resolves 90% of its own employee IT requests autonomously, delivering solutions up to 99% faster than human agents. The company unveiled an Autonomous Workforce framework, the EmployeeWorks product, and a "role automation" architecture to extend this...

U.S. diplomats have been instructed to lobby foreign governments to ease data‑sovereignty and data‑localization rules, arguing that strict regulations hinder American cloud and AI firms. Kiteworks’ 2026 Data Sovereignty Report, based on 286 security professionals across Canada, the Middle East...

Revolut’s latest report shows encrypted messaging apps now dominate Authorised Push Payment (APP) fraud, with Telegram accounting for over 58% of job‑related scams. The platform’s share of total APP fraud rose more than 30% year‑over‑year, overtaking WhatsApp in several categories....

Deloitte has introduced Enterprise AI Navigator, an advisory and engineering software suite aimed at moving enterprises from fragmented AI pilots to measurable, organization‑wide value. The platform combines Deloitte’s Ascend project‑management tools with proprietary data to identify suitable processes, model workflow...
Large U.S. corporations are abandoning the term “pilot” for AI projects, signaling a move from small‑scale tests toward deployments that deliver measurable value. A MIT study that found 95% of AI pilots failed to generate financial impact, combined with a...

Enterprise leaders facing 2026 economic uncertainty are turning to AI to boost organizational agility. Personiv’s 2025 Executive Outlook Pulse Survey shows 76% of public firms and 45% of private firms already use AI, especially in finance functions like payroll and...

The surge in AI workloads is prompting data‑center operators to consider retrofitting legacy facilities rather than constructing purpose‑built AI campuses. Retrofitting can accelerate deployment, lower capital outlay, and improve sustainability, but it hinges on upgrading power delivery, cooling capacity, rack...

The AI boom is driving demand for massive compute capacity, prompting operators to consider both new purpose‑built AI data centers and upgrades to existing facilities. Retrofitting legacy data centers can be faster, cheaper, and more sustainable, but only if power,...

Security firm Truffle Security revealed that publicly exposed Google API keys can be upgraded to full‑access Gemini credentials, enabling data exfiltration from any organization using them. A November scan uncovered 2,863 such keys, affecting major banks, security vendors, and even...
IBM has partnered with Deepgram to embed its speech‑to‑text and text‑to‑speech engines into the watsonx Orchestrate generative AI platform. The integration adds real‑time transcription, captioning and multi‑language voice support, letting enterprises build voice‑enabled agents and workflows. Deepgram becomes IBM’s first...

Intellicheck launched an enriched Desktop Application that lets organizations of any size stop identity theft and fraud instantly, without needing system integration. The solution works with existing scanners, incurs minimal cost, and stores transaction history securely in the cloud via...

AMD announced a $250 million strategic partnership with Nutanix, buying $150 million of Nutanix common stock and committing up to $100 million for joint R&D and go‑to‑market efforts. The collaboration will integrate Nutanix’s Cloud and Kubernetes platforms with AMD’s EPYC CPUs, Instinct GPUs,...

Cisco Duo unveiled Delegated Access, a feature that lets Managed Service Provider (MSP) technicians authenticate to client applications using a single Duo user account. The solution centralizes MFA policy, logs, and monitoring on the parent account while granting access to...
Torii’s 2026 SaaS Benchmark Report reveals that large enterprises now run an average of 2,191 applications, with more than 61% of those tools operating without formal IT approval. AI experimentation is intensifying the problem, as employees juggle roughly 40 apps...

Enterprise adoption of large‑language models is moving from pilot projects in 2025 to production in 2026 and full‑scale deployment by 2027, enabling multi‑step, agentic workflows that can cut head‑office labor by up to 30 %. While individual firms gain margin improvements,...

The PCI Security Standards Council published its inaugural 2025 annual report, the first since its 2006 founding, outlining a surge in payment‑system threats and the council’s expanding role. The report highlights accelerated attacks leveraging AI, ransomware incidents such as BridgePay,...

JPMorgan Chase disclosed a $19‑$20 billion annual technology budget, earmarked for AI, cloud infrastructure, and data integration. More than 80% of its applications now run on modern platforms, with over 70% in public or private clouds, enabling real‑time processing and automated...

Vast Data and Nvidia have launched the CNode‑X, a GPU‑powered server that embeds the Vast Data AI Operating System directly onto Nvidia hardware. The integrated solution is optimized for AI pipelines, high‑performance analytics, vector search, retrieval‑augmented generation and agentic workloads....

NASA has issued a request for information (RFI) to find an IBM Platinum Partner that will manage its extensive software portfolio. The agency intends to establish a five‑year blanket purchase agreement covering licenses, subscription support, expert lab services, and remote...
SPS Commerce has launched MAX, an AI‑driven set of capabilities embedded in its supply‑chain network that currently operates in an advisory mode, surfacing anomalies and recommending actions within existing EDI workflows. The system is designed to improve supplier compliance, order...

Georgia Tech researchers have uncovered critical weaknesses in the global threat‑intelligence supply chain, highlighting how inconsistent data quality and limited sharing impede rapid response. Their study, presented at the NDSS Symposium, found that while 67% of vendors sandbox suspicious binaries,...

Praetorian unveiled its AI‑driven CVE Researcher pipeline, automating the end‑to‑end analysis of new vulnerabilities from CISA’s KEV catalog. The system ingests a CVE ID and outputs research reports, technology reconnaissance, asset correlation, and validated Nuclei detection templates within minutes. Reported...

Dennis Venter has stepped down as co‑CEO and board member of JSE‑listed iOCO with immediate effect, citing other business interests. He and fellow co‑CEO Rhys Summerton, appointed in February 2025, led a turnaround that lifted EBITDA 68 % to R516 million and...

Netskope introduced NewEdge AI Fast Path, a suite of network‑optimizing capabilities that route AI traffic through low‑latency, secure paths across public, private and neo‑cloud environments. The service cuts time‑to‑first‑token for conversational models, speeds up multi‑prompt agentic workflows, and enhances retrieval‑augmented...

SentinelOne launched the Singularity Identity portfolio to protect non‑human identities such as AI agents, service accounts, APIs, and workloads. The solution moves beyond static authentication, requiring continuous validation of intent across endpoints, browsers, and AI workflows. By tying identity data...

Veza announced the launch of Veza Access Agents, AI‑driven tools that automate identity and access governance for both human users and autonomous AI agents. The agents, built on AWS Bedrock, provide natural‑language interfaces for risk queries, permission visualizations, and AI‑assisted...

CloudCasa has upgraded its backup and recovery platform to better serve Red Hat OpenShift deployments across core, edge, and hybrid cloud environments. The update adds native SMB protocol support as a backup target, letting customers use existing SMB storage or operator‑deployed...

Atlassian introduced “Agents in Jira,” allowing AI agents to be assigned, tracked, and managed alongside human users within the Jira dashboard. The feature, now in open beta, lets teams assign tickets to AI, set deadlines, and monitor progress with the...

Researchers at StrongestLayer analyzed about 5,000 phishing emails that evaded secure email gateways between December 2025 and early 2026. They found that telephone‑oriented attack delivery (TOAD), which consists solely of a phone number, represented roughly 28 % of all bypasses and...

Scality and WEKA announced that Scality RING will serve as the back‑end object store for WEKA’s NeuralMesh high‑performance AI file system. The partnership leverages NeuralMesh’s SSD‑based front‑end with RING’s cost‑efficient, disk‑based object tier, delivering up to ten times faster performance than...