Dan Petrillo, VP of Product at BlueVoyant As artificial intelligence (AI) becomes more deeply embedded in security ...
Attackers are running paid Facebook ads that look like official Microsoft promotions, then directing users to near-perfect ...
AI agents have moved from novelty to operational reality, acting autonomously across business systems in ways traditional AI ...
Are Non-Human Identities the Key to Unlocking Agentic AI in Data Protection? Organizations across industries are increasingly focusing on the management of Non-Human Identities (NHIs). These machine ...
UTC on January 22, 2026, Nike appeared on WorldLeaks’ Tor-based leak site. The countdown timer showed 48 hours until 1.4 terabytes — 188,347 files — would be dumped onto the dark web for anyone to ...
For today’s CISOs, enterprise cyber risk management is no longer a technical exercise. It’s a leadership mandate that sits at the intersection of security, business risk, regulation, and executive ...
As SaaS platforms expand in complexity, security cannot stop at deployment. Post-launch environments introduce new integrations, user access changes, and configuration updates that significantly ...
In September 2025, Anthropic disclosed a groundbreaking incident—the world’s first autonomous AI-driven cyberattack. This event, documented as the first large-scale cyber offensive primarily executed ...
Agentic AI is transforming cybersecurity by enabling autonomous threat detection, real-time response, and proactive defense across modern infrastructure.
The global vulnerability landscape continues to expand rapidly, with thousands of new CVEs published every year. Thus, allowing hackers to weaponize newly disclosed flaws at an instant. Public ...
CEO and Cofounder at Cyata, the agentic security control plane. He is a tech leader with over a decade in offensive security and product defense. After graduatin ...
Explore lattice-based zero trust identity verification for AI agents. Secure MCP deployments with quantum-resistant encryption and 4D access control.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results