ChannelLife UK - Industry insider news for technology resellers

Infosec stories - Page 19

Cloud identity recovery security glowing shield canada us growth

Cayosoft posts 76% ARR surge on identity recovery boom

Fri, 20th Feb 2026
#
saas
#
dr
#
hybrid cloud
Cayosoft posts 76% ARR jump for 2025 as identity recovery demand soars and it wins major public sector and enterprise customers.
Cinematic data center night firewall crack ransomware attack icon

Barracuda links 2025 ransomware wave to firewall flaws

Fri, 20th Feb 2026
#
firewalls
#
data protection
#
ransomware
Barracuda warns that unpatched firewalls and weak accounts drove 90% of 2025 ransomware attacks, as threats spread in mere hours.
Cynthia lee x adam perks x chris waynforth

Delinea boosts EMEA, APAC growth with senior hires

Fri, 20th Feb 2026
#
data protection
#
siem
#
digital transformation
Delinea has named three senior leaders across EMEA and APAC to accelerate regional sales, channel growth and AI-driven identity security.
Secure cloud platform shields locks customer experience data iso

CrowdStrike, Qualtrics link up to secure AI-driven data

Fri, 20th Feb 2026
#
data protection
#
digital transformation
#
cloud security
CrowdStrike links Falcon Shield with Qualtrics XM to extend SaaS security, monitoring and automated policy enforcement across experience data.
Spanish it ops room hybrid cloud security city skyline

AlgoSec posts record 2025 growth on hybrid cloud demand

Fri, 20th Feb 2026
#
firewalls
#
hybrid cloud
#
digital transformation
AlgoSec posts record 2025 as hybrid cloud surge drives 37% new business growth, strong ARR gains and rapid uptake of its Horizon platform.
Global supply chain network london central secure hub glowing paths

Risk Ledger unveils zero-friction supply chain programme

Thu, 19th Feb 2026
#
cloud security
#
partner programmes
#
supply chain
Risk Ledger launches a zero-friction partner programme to streamline channel collaboration on active, continuous supply chain security.
Uk high street office dusk security key mfa glowing padlock scene

UK campaign targets small firms' growing cyber risk

Thu, 19th Feb 2026
#
ransomware
#
mfa
#
phishing
UK urges small firms to 'lock the door' on cyber crime as attacks cost businesses GBP £14.7 billion a year and basic defences lag.
Enterprise cloud security procurement modern corporate it

CrowdStrike Falcon now available via Microsoft Marketplace

Thu, 19th Feb 2026
#
endpoint protection
#
digital transformation
#
hyperscale
CrowdStrike's Falcon platform is now sold via Microsoft Marketplace, letting customers spend existing Azure commitments on security tools.
Dev

Rubrik launches Agent Cloud to govern enterprise AI

Thu, 19th Feb 2026
#
data protection
#
dr
#
devops
Rubrik unveils Agent Cloud, promising real-time oversight, guardrails and rollback for risky AI agents embedded in enterprise systems.
Dim server room admin workstation security shield network nodes

12Port unveils AI session intelligence for PAM security

Thu, 19th Feb 2026
#
data protection
#
pam
#
mfa
12Port adds AI-powered session intelligence to its agentless PAM platform, promising real-time detection and disruption of risky admin activity.
Untitled design  68

DryRun Security adds Andrew Peterson to drive AI shift

Thu, 19th Feb 2026
#
firewalls
#
application security
#
devsecops
DryRun Security appoints Signal Sciences Co-founder Andrew Peterson to its board to steer its AI-native code security push.
Office worker ai phishing notifications shadowy hands illustration

AI-driven phishing surge dominates 2025 cyberattacks

Thu, 19th Feb 2026
#
malware
#
ransomware
#
digital transformation
AI-powered phishing drives a sharp 2025 surge in email and chat attacks, as Acronis warns of a new era of automated cybercrime at scale.
Office ai security dashboard gateway with locks and shields

Tailscale unveils Aperture to govern workplace AI use

Thu, 19th Feb 2026
#
firewalls
#
data protection
#
siem
Tailscale launches Aperture in open alpha, adding an identity-based gateway to log, govern and standardise workplace AI and agent use.
Small business office ransomware attack refusing to pay secure safe

Ransomware victims refuse to pay as data extortion soars

Wed, 18th Feb 2026
#
firewalls
#
data protection
#
dr
Most ransomware-hit firms now refuse to pay, as Arctic Wolf reports an 11-fold surge in data-only extortion and booming remote access abuse.
Moody office building chained padlock ransomware gangs night scene

Record ransomware surge as 7,458 victims named in 2025

Wed, 18th Feb 2026
#
malware
#
ransomware
#
encryption
Ransomware hits record 7,458 named victims in 2025 as 124 gangs crowd dark web leak sites and new “supergroup” alliances emerge.
Dim corporate server room mixed os racks chained ransomware lock

LockBit 5.0 ransomware targets Windows, Linux, ESXi

Wed, 18th Feb 2026
#
malware
#
virtualisation
#
data protection
New LockBit 5.0 ransomware hits Windows, Linux and ESXi in single campaigns, widening blast radius across mixed and virtualised environments.
Modern cybersecurity war room ai brain shield team collab

CompTIA launches SecAI+ to tackle AI security skills

Wed, 18th Feb 2026
#
malware
#
data protection
#
devops
CompTIA unveils SecAI+ certification to equip cybersecurity professionals with AI security, risk management and governance skills.
Ai cybersecurity global network cloud shield enterprise partners

Proofpoint revamps global partner network for AI era

Wed, 18th Feb 2026
#
digital transformation
#
hyperscale
#
cloud security
Proofpoint overhauls its partner network with richer incentives, tighter protections and AI-focused services to fuel recurring security revenue.
Fake olympic website

Fake Olympics shop ads on Meta target fans' wallets

Wed, 18th Feb 2026
#
phishing
#
martech
#
physical security
Fake Olympics shop ads on Meta push fans to cloned sites mimicking Milano Cortina 2026 store to steal card and personal details.
Dark office night remote access shadowy hacker silent data theft

Data-only extortion surges as remote access abused

Wed, 18th Feb 2026
#
data protection
#
dr
#
vpns
Data-only extortion soars 11-fold as attackers 'log in instead of break in', abusing remote access tools for faster, stealthier raids.