Security Posture stories
Autodesk is among early users as the new controls aim to give security teams runtime visibility into unapproved AI agents and their actions.
It aims to cut alert fatigue by using runtime data to validate threats, prioritise real risks and guide fixes across cloud and AI systems.
The hire signals a sharper focus on resilience and customer trust as buyers demand stronger governance from identity security suppliers.
Enterprises are testing only about 32% of their attack surface, leaving many assets outside regular security checks as threats grow faster.
Security teams may cut backlogs as validated HackerOne flaws are mapped into Wiz, linking exploit evidence to cloud assets for faster prioritisation.
Threat alerts have fallen by 98% for Europe's largest cinema operator after it overhauled security across eight countries.
A widening gap is emerging as firms struggle to meet tighter data rules, with only 29% prioritising sovereign AI in the near term.
The purchase adds browser-based AI controls to Akamai's security portfolio as firms scramble to monitor staff use of generative tools.
Security teams can now spot cloud misconfigurations and compliance gaps in real time as VersaONE adds posture management across major public clouds.
More than nine in ten security incidents now involve anonymising services, leaving many organisations unable to spot malicious traffic in real time.
Shared ownership of security and networking is still rare at large US firms, leaving many exposed to breaches, delays and higher costs.
The findings show many firms still leave internet-facing databases and admin tools open, giving attackers easy routes before flaws are even published.
More than half of North American SMBs lack basic email protections, leaving them more exposed to phishing, impersonation and fraud than UK peers.
The tie-up aims to help large companies run AI agents securely at scale, while keeping data, governance and spending under tighter control.
JupiterOne rolls out AI attack surface and vulnerability tools to help security teams map links, prioritise flaws and cut through alert overload.
Stolen credentials and post-login attacks are pushing security teams to seek unified monitoring across endpoints and identities.
Tighter EU compliance rules are driving demand for access controls as the security supplier expands its regional sales push across Western Europe.
New compliance reporting rules from April 2026 mean New Zealand agencies and firms must prove cyber controls are planned, repeatable and effective.
Vendor lock-in can turn cloud voice upgrades into costly transformation programmes, raising service risk and limiting control over future changes.
Customers get a single cyber and compliance service as WorkNest folds Pentest People and Bulletproof into a new security division.