Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

When Al Agents go Rogue: What you're Missing in your MCP Security

No Fluff, Just Real-World Threats This isn’t your typical marketing webinar. We cover what Agentic AI actually looks like in production, how MCP servers work to broker instructions, and what kind of new threats are emerging. Agentic AI isn’t coming. It’s already here. Autonomous agents are now operating in production environments, reasoning, remembering, and taking real actions across your systems. They’re not just generating content. They’re triggering workflows, modifying records, and making decisions. And they’re doing it over APIs.

Securing Agentic AI: Visibility and Protection for MCP Servers and A2A Traffic

AI agents aren’t just talking, they’re taking actions. They’re booking transactions, pulling sensitive data, and chaining tools together to get work done. As enterprises embrace these agents, protocols like the Model Context Protocol (MCP) and Agent-to-Agent (A2A) are enabling powerful new capabilities, but also creating invisible ecosystems of API-driven agent activity that traditional security tools can’t see or control.

You Can't Have AI Security Without API Security

For most leadership teams, the question is no longer if they’ll use AI, but how to turn it into measurable business value. Success hinges on the APIs that feed, govern, and scale AI initiatives — and whether your strategy is built for speed, security, and cost efficiency. From accelerating product development to delivering real-time customer experiences, the business case for AI is clear. But without the right API strategy, AI initiatives risk falling short — driving up costs, creating compliance gaps, and limiting ROI.

Secure Your AI Workflows with Protecto's Data Masking API #startup #n8n

AI is evolving fast, but are your workflows truly secure? Most teams rely on DLP or redaction tools that strip sensitive data or block it entirely — but that limits your AI's potential. In this video, learn how Protecto’s SaaS Masking & Unmasking APIs help you process sensitive data (PII, PHI, PCI) securely, while staying compliant with GDPR, HIPAA, DPDP. No more trade-offs between data protection and powerful AI.

AI Browsers Are Here-But Enterprises Aren't Ready. Why Obrela Advises Extreme Caution

The cybersecurity landscape is changing at a pace we haven’t experienced since the dawn of cloud computing. The newest disruptor, the rise of AI browsers such as Perplexity Comet and OpenAI’s ChatGPT Atlas, promises to revolutionize user interaction with the web. But behind the innovation lies a long list of risks that enterprises cannot afford to ignore.

Building Security With Customers, Not For Them - Jay Wilson x Garrett Hamilton | Insurity Case Study

Partnership over Procurement Why true collaboration between vendors and security teams is still rare — not because the intent isn’t there, but because most engagements stop at feature checklists. The alternative is more interesting: build together, solve together, and create solutions that fit how teams actually work rather than how tools assume they work. This mindset drove our work with Insurity — a real example of what happens when a security team engages deeply instead of treating tooling as a finished product.

AI at the inflection point: Reclaiming human creativity and productivity

Artificial intelligence is changing how businesses work and compete. In every corner of the market, organizations expect more productivity. The question facing today’s business leaders is no longer whether to embrace artificial intelligence but how to harness its full potential to drive meaningful and sustainable transformation.

The CISO's Al Dilemma: How Security Leaders Are Making or Breaking Their Company's Future

AI agents are transforming how leading companies operate, delivering 24/7 customer service, processing thousands of transactions, and driving unprecedented operational efficiency. 53% of organizations are already deploying AI agents for customer-facing tasks, with market leaders running hundreds or thousands of agents to gain a competitive advantage. These agents handle sensitive data, trigger transactions, and make autonomous decisions at machine speed. But the APIs that power them are becoming a vast, overlooked attack surface.

The role of credentials in the AI espionage campaign reported by Anthropic

Anthropic recently announced that the company has disrupted the first reported AI-orchestrated cyber espionage campaign. This attack used Claude Code to automate many steps, with AI handling up to 90% of the tasks, including web searches and the autonomous writing of exploit code. The attackers bypassed Claude’s guardrails by breaking each step into small tasks and role-playing as a red team member.

Transforming AI Risk Awareness Into Measurable AI Governance

Only a few years ago, after more than a decade of debate over how cybersecurity incidents affect the financial stability of public companies, the U.S. Securities and Exchange Commission (SEC) finally made cyber risk disclosure a formal requirement. The intent was to bring transparency and accountability to a category of risk that had long been treated as technical rather than financial. Now, albeit voluntarily, AI has entered that same conversation, but the speed of its arrival has been remarkable.