 Your new post is loading...
|
Scooped by
JC Gaillard
November 5, 1:31 AM
|
The current model of managing corporate identities is unprepared for a wave of AI agents gaining access to privileged resources.
|
Scooped by
JC Gaillard
November 1, 2:08 AM
|
As AI rapidly evolves from a theoretical promise to an operational reality, CISOs and CIOs face a fundamental challenge: how to harness AI's transformative potential while maintaining the human oversight and strategic thinking that security demands.
|
Scooped by
JC Gaillard
October 27, 2:24 AM
|
There are a lot of 'what ifs' surrounding AI browsers right now.
|
Scooped by
JC Gaillard
October 25, 12:46 AM
|
AI is reshaping software development, but security gaps are growing as organizations race to adopt new coding and automation tools.
|
Scooped by
JC Gaillard
October 23, 1:47 AM
|
New surveys from CSO and CrowdStrike reveal growing fears that generative AI is accelerating ransomware attacks while defenders rush to harness the same technology to fight back.
|
Scooped by
JC Gaillard
October 21, 1:51 AM
|
The shared responsibility model of data security is key to agentic AI, but cybersecurity teams and corporate users often struggle with managing that risk.
|
Scooped by
JC Gaillard
October 14, 1:30 AM
|
Teams are finding some success with AI-powered code generation, but many are finding the security risks too great to make the integration worthwhile.
|
Scooped by
JC Gaillard
October 12, 1:15 AM
|
Ransomware has always been more than a technical risk—it’s a business, a weapon, and a psychological warfare tool.
|
Scooped by
JC Gaillard
October 9, 1:48 AM
|
AI agents are automating key parts of the attack chain, threatening to tip the scales completely in favor of cyber attackers unless new models of AI-assisted cyberdefense arise.
|
Scooped by
JC Gaillard
October 6, 1:12 AM
|
Attackers can hide malicious code in shared machine learning models. Learn how to manage machine learning model security and protect systems.
|
Scooped by
JC Gaillard
October 2, 2:20 AM
|
AI use is surging, but cybersecurity training isn't keeping up, a new study finds.
|
Scooped by
JC Gaillard
September 26, 1:52 AM
|
Although capable of reducing trivial mistakes, AI coding copilots leave enterprises at risk of increased insecure coding patterns, exposed secrets, and cloud misconfigurations, research reveals.
|
Scooped by
JC Gaillard
September 17, 1:43 AM
|
Governing AI agents has become a board-level priority. Here are the key risks and mitigation strategies that every Enterprise Architect, CIO, and CISO should understand.
|
|
Scooped by
JC Gaillard
November 2, 1:49 AM
|
As cybercriminals leverage AI to attack enterprise infrastructure, cybersecurity teams need to step up and adapt AI to strengthen defenses.
|
Scooped by
JC Gaillard
October 30, 2:28 AM
|
Agentic AI is revolutionizing the IT world. Yet its greatest benefit may lie in strengthening cybersecurity.
|
Scooped by
JC Gaillard
October 27, 2:08 AM
|
AI agents now act, decide, and access systems on their own — creating new blind spots Zero Trust can't see. Token Security helps organizations govern AI identities so every agent's access, intent, and action are verified and accountable.
|
Scooped by
JC Gaillard
October 24, 1:45 AM
|
As enterprise AI adoption surges, from autonomous email processing to AI-driven workflow automation, security leaders face a new reality: AI agents are now insiders. These agents have access to sensitive data, third-party systems and decision-making authority.
|
Scooped by
JC Gaillard
October 22, 2:03 AM
|
From in-depth conversations with CISOs and security leaders, seven proven strategies emerge for protecting enterprises against imminent agentic AI threats
|
Scooped by
JC Gaillard
October 17, 1:33 AM
|
AI-enabled attacks are among the top concerns for security leaders. In response they are arming their teams with AI-enabled defenses, new research finds.
|
Scooped by
JC Gaillard
October 13, 1:30 AM
|
Attackers use poisoned AI prompts to hijack assistants, leak data, and manipulate actions, exploiting LLMs as new cyberattack vectors.
|
Scooped by
JC Gaillard
October 11, 1:26 AM
|
Intent-based permissions allow AI systems to operate with autonomy, while preventing actions that don’t align with business purposes.
|
Scooped by
JC Gaillard
October 9, 1:26 AM
|
AI security is no longer about firewalls, it’s about defending against cognitive, adaptive, and emergent threats in decision-making systems.
|
Scooped by
JC Gaillard
October 5, 1:31 AM
|
AI security threats and growing security risks are escalating as attackers exploit outdated infrastructures, shadow AI, and weaknesses across AI systems.
|
Scooped by
JC Gaillard
September 29, 1:54 AM
|
In today’s enterprise world, AI no longer just answers questions or writes emails, but it takes action. From copilots booking travel to intelligent agents updating systems and coordinating with other bots, we’re stepping into a world where software can reason, plan, and operate with increasing autonomy.
|
Scooped by
JC Gaillard
September 20, 2:33 AM
|
LLMs in cybersecurity can boost decision accuracy, but uneven benefits and automation bias mean teams must verify outputs.
|