FutureFive New Zealand - Consumer technology news & reviews from the future

GRC stories - Page 5

Office ownership handover audit cloud regtech workflow meeting

Deloitte offloads Auvenir which rebrands as Streamworks Tech

Last month
#
digital transformation
#
rpa
#
risk & compliance
Deloitte has sold its audit software venture Auvenir to its management in a buyout, with the business rebranding as Streamworks Tech.
Hybrid cloud security control room exposure mapping aws azure ai

XM Cyber adds AI exposure mapping across hybrid cloud

Last month
#
hybrid cloud
#
hyperscale
#
cloud security
XM Cyber rolls out AI exposure mapping to track shadow AI, cloud models and MCP servers across hybrid estates in a single attack graph.
Cinematic unified cloud security shields locks control hub

Native raises USD $42m for cloud security control plane

Last month
#
firewalls
#
hybrid cloud
#
digital transformation
Cloud security startup Native launches from stealth with USD $42m to unify preventive, intent-based controls across major public clouds.
Peter

Secure Code Warrior unveils AI tool to govern code risk

Last month
#
data protection
#
application security
#
devsecops
Secure Code Warrior launches SCW Trust Agent: AI to trace, rate and police AI-generated code risks directly at developers' commit point.
Cinematic it control room ai intent security monitoring night

Proofpoint unveils AI intent security for enterprises

Last month
#
data protection
#
digital transformation
#
cloud security
Proofpoint launches intent-based AI security to govern autonomous agents, promising real-time checks on behaviour across enterprise systems.
Peter barker

Verified trust boosts conversions, cuts fraud losses

Last month
#
digital transformation
#
biometrics
#
socs
Verified trust leaders see 51% higher sign-ups, 43% less fraud and faster onboarding as AI-era identity moves from static gate to dynamic fabric.
Secure cloud fortress identity governance ai humans robots

SailPoint & AWS ally on AI agent identity governance

Last month
#
saas
#
digital transformation
#
hyperscale
SailPoint strikes multi-year AWS deal to govern fast-growing AI agent identities with unified controls across human and machine access.
Ai brain looms over australian nighttime office cyber incident

Custom AI to drive half of cyber incidents by 2028

Last month
#
data protection
#
devops
#
digital transformation
Custom AI apps will drive half of enterprise cyber incident response by 2028, as rushed rollouts outpace security testing and controls.
Kristen pimpini

Workiva appoints Kristen Pimpini to lead APJ growth

Last month
#
uc
#
digital transformation
#
partner programmes
Workiva names Kristen “KP” Pimpini to spearhead APJ sales and operations, backing its AI-powered reporting push across key regional markets.
Secure cloud of locks over servers unified identity for humans ai

SailPoint, AWS forge identity governance pact for AI

Last month
#
digital transformation
#
hyperscale
#
cloud security
SailPoint and AWS strike multi-year deal to build unified identity governance for human and AI agents as cloud workloads grow.
Darren

How Formula 1 turns data & cyber security into speed

Last month
#
firewalls
#
data protection
#
data analytics
At Albert Park, F1 insiders reveal how sharper data use, tighter security and resilience planning combine to unlock race-winning performance.
Global security leaders roundtable ai governance cyber risk

Global CISO Council launched to steer AI governance

Last month
#
data protection
#
advanced persistent threat protection
#
risk & compliance
EC-Council launches the Global CISO Council to unify AI governance, tech risk oversight and regulatory response for senior security leaders.
Shadowy hacker cyber attack on hospital mobile device management

Stryker probes global cyber attack via MDM systems

Last month
#
dr
#
ransomware
#
iot security
Stryker says a cyber attack disrupted internal systems, with investigators examining mobile device tools as experts warn of rising state-linked threats.
Isometric cloud puzzle compartments with locks and security icons

Sweep wins cybersecurity firms for Salesforce control

Last month
#
data protection
#
digital transformation
#
cloud security
Sweep lands SailPoint, Wiz, Vanta and Varonis as security vendors seek tighter control and audit-ready visibility over Salesforce sprawl.
Dino dimarino

Tenable appoints Dino DiMarino to drive AI security growth

Last month
#
network infrastructure
#
digital transformation
#
cloud security
Tenable appoints veteran cybersecurity sales leader Dino DiMarino as chief revenue officer to drive global growth in exposure and AI risk.
Cinematic ai governance control room glowing brain data panels

Chartis names SAS a leader in AI governance solutions

Last month
#
data protection
#
data analytics
#
digital transformation
Chartis names SAS a category leader in AI governance, spotlighting Viya's model controls as demand for robust oversight accelerates.
Modern open office ai agents automation node diagrams security

Gumloop raises USD $50m to scale workplace AI agents

Last month
#
saas
#
uc
#
data protection
Gumloop secures USD $50m Series B to scale workplace AI agents, deepen security tools and court larger enterprise customers.
Dev teams merge around glowing circuit shield ai security focus

OpenAI buys Promptfoo to bolster Frontier AI security

Last month
#
data protection
#
devops
#
application security
OpenAI agrees to buy Promptfoo, aiming to embed automated security testing and red-teaming tools directly into its Frontier AI coworker platform.
Ai robot arm swapping server drives it audit governance risk

AI drives rapid database change, outpacing governance

Last month
#
devops
#
application security
#
devsecops
AI now touches production databases in most firms, but Liquibase warns governance controls lag far behind the velocity of change.
Corporate cyber network with warning nodes and security monitoring

Vicarius unveils vIntelligence for continuous validation

Last month
#
endpoint protection
#
advanced persistent threat protection
#
socs
Vicarius launches vIntelligence to continuously validate real-world exploitability and close the loop between detection, remediation and proof.