TelcoNews New Zealand - Telecommunications news for ICT decision-makers

Shadow IT stories - Page 4

Isometric cloud ai brain network security governance control

Kong unveils AI Connectivity roadmap for unified control

Last month
#
devops
#
digital transformation
#
physical security
Kong outlines AI Connectivity roadmap to unify governance, routing and cost controls across APIs, models and agent-based AI workloads.
Office worker laptop cloud apps ai icons secure access shield

LastPass unveils browser-based Secure Access Essentials

Last month
#
encryption
#
mfa
#
cloud security
LastPass launches Secure Access Essentials, a browser-focused suite to secure access to workplace apps, SaaS and unsanctioned AI tools.
Global office night cyber attack hacker shadows cracked cloud

Cyber attacks stay near record high as GenAI risks grow

Last month
#
edutech
#
firewalls
#
data protection
Global cyber attacks hover near record highs as unchecked workplace GenAI use exposes sensitive data in one in 31 corporate prompts.
It command center dashboard cloud cost monitoring data security

AvePoint adds Google Cloud to AI AgentPulse control

Last month
#
data protection
#
digital transformation
#
cloud security
AvePoint brings AgentPulse Command Centre to general release, adding Google Cloud support to govern AI agents and rein in multicloud costs.
German it admin remote support security dashboards multiplatform

TeamViewer enhances Microsoft Intune integration

Last month
#
mdm
#
it automation
#
partner programmes
TeamViewer has expanded its integration with Microsoft Intune, adding new remote support capabilities aimed at streamlining IT workflows and strengthening security.
Overhead office ai tools data streams with glowing security shield

Teramind launches AI governance to tackle shadow AI

Last month
#
firewalls
#
digital transformation
#
network security
Teramind has unveiled an AI governance platform to monitor workplace AI tools and shadow agents, aiming to curb hidden data and security risks.
Overwhelmed security analyst shadowy cyber threats night office

AI cyber threats outpace staff readiness, report warns

Last month
#
firewalls
#
data protection
#
digital transformation
Attackers' AI use is surging faster than staff skills, Fortinet warns, leaving firms exposed despite rising security awareness spending.
Anthony woods

Grafana: Turning data chaos into developer efficiency and CFO savings

Last month
#
devops
#
data analytics
#
siem
Grafana leans on AI-powered observability and Adaptive Telemetry to sharpen developer insight while slashing cloud bills by up to 50%.
Ciso overseeing ai security robots in nighttime office scene

Microsoft warns of AI agent risks in Cyber Pulse brief

Last month
#
manufacturing
#
digital transformation
#
physical security
Microsoft's new Cyber Pulse briefing warns ungoverned AI agents and 'double agents' pose rising security and compliance risks for firms.
Split boardroom execs vs stressed engineers ai data leak scene

Manifest flags AI readiness gap between execs & AppSec

Last month
#
digital transformation
#
cloud security
#
application security
Manifest research reveals executives overestimate AI security readiness, as AppSec teams warn of unmanaged tools, blind spots and rising risk.
Michaelalp nutanix anz

AI drives container growth as shadow use raises risks

Last month
#
virtualisation
#
data protection
#
private cloud
AI is turbocharging container adoption in Australia, but shadow AI, data sovereignty fears and siloed teams are amplifying security risks.
Nz open plan office employee hidden ai laptop it manager monitoring

NZ workers keen on AI but turn to risky shadow tools

Last month
#
digital transformation
#
cx
#
martech
New Zealand staff are bullish on AI yet shun employer tools, fuelling risky “shadow AI” use and raising data security concerns.
Peter

The security challenges in AI-assisted software development

Last month
#
digital transformation
#
application security
#
devsecops
As AI tools spread through software teams, rising security flaws and shadow AI use are forcing leaders to tighten guardrails fast.
Story 300075

OpenClaw AI assistant surge sparks major security fears

Fri, 27th Feb 2026
#
malware
#
phishing
#
application security
A rapid surge in OpenClaw AI assistant use has left tens of thousands of exposed systems and a trail of hijacked tools and malicious add-ons.
Corporate it security control room cloud ai governance scene

Island adds browser AI controls to AWS Security Hub

Fri, 27th Feb 2026
#
firewalls
#
data protection
#
digital transformation
Island brings browser-based security and AI governance tools to AWS Security Hub Extended, offering unified buying, billing and support.
Glowing red world map ransomware ai cyber attack broken padlock

GenAI misuse & ransomware drive surge in cyber attacks

Thu, 26th Feb 2026
#
malware
#
edutech
#
uc
Global cyber attacks hit 2,090 a week in January as ransomware surges and risky GenAI use exposes fresh data-leak and intrusion paths.
Ai cloud puzzle shields dark gaps leaking data hidden keys

Tenable warns of widening AI exposure gap in cloud

Mon, 23rd Feb 2026
#
malware
#
digital transformation
#
public cloud
Tenable warns businesses that rapid AI and cloud adoption is creating an invisible exposure gap as identity and supply chain risks surge.
Jon connet

Aeris & Palo Alto link SASE to secure global IoT fleets

Fri, 20th Feb 2026
#
uc
#
firewalls
#
digital transformation
Aeris links its IoT Watchtower with Palo Alto Networks' Prisma SASE 5G to unify zero-trust security and connectivity for global IoT fleets.
Global corporate socs room world map endpoints locks shields

AI & endpoints reshape global information governance

Wed, 18th Feb 2026
#
saas
#
data protection
#
mdm
AI tools and shadow IT push information governance to the endpoint, forcing organisations to align policy with device-level reality.
Ai governance zero trust secure data center corridor shield

Xiid & Cytex link AI governance with zero trust access

Sun, 15th Feb 2026
#
firewalls
#
data protection
#
ransomware
Xiid and Cytex join forces to fuse AI governance with zero trust access, targeting shrinking attack paths and stricter cyber regulation.