Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Is AI really new-or just automation with better branding?

“AI is just automation by a different name.” It’s a bold claim—but one that Brandon Heller, CTO and co-founder of Forward Networks, and Howard Holton, CEO of GigaOm, unpack in a way that will make you think. In their recent conversation on Discovering Disruptions in Tech, they make the case that artificial intelligence, especially generative AI, is not delivering brand-new capabilities.

Still Using RBAC in AI? You're Already Behind.

Traditional role-based access control (RBAC) was built for structured systems - not for the messy, unstructured data that powers today’s AI workflows. In this video, we explore real-world healthcare scenarios where RBAC breaks down like mental health notes, lab results, and substance use histories buried in clinical documents. You’ll see how Protecto’s Context-Based Access Control (CBAC) solves this by understanding the user, prompt, and context - and enforcing policies in real time, without breaking AI functionality.

AI, Risk, and Enterprise Security: Highlights from a Discussion with Enrique Salem

Key insights from a fireside chat between Nightfall CEO Rohan Sathe and cybersecurity veteran Enrique Salem, Partner at BCV and Nightfall investor Twenty years ago, enterprise security teams scrambled to address shadow IT as employees brought consumer applications into the workplace. Today, we're witnessing the same phenomenon with AI tools—what we now call shadow AI. The fundamental question remains unchanged: What happens to our data?

LevelBlue Spotlight Report Finds Manufacturers Struggling with the Impact of AI and Supply Chain Risk

LevelBlue’s newly released 2025 Spotlight Report: Cyber Resilience and Business Impact in Manufacturing, uncovered the different ways this sector has increased its understanding of the role cybersecurity must play moving forward, including the need to adopt a more proactive security posture to increase resilience and improve its defense mechanisms to combat AI-powered attacks.

When Attackers Weaponize AI and Defenders Fight Back with Smarter Remediation

Artificial intelligence is transforming cybersecurity, and not always for the better. Attackers are now weaponizing AI to speed up reconnaissance, create exploit code, and bypass traditional defenses. Security teams can’t afford to rely on outdated vulnerability management practices. In this webinar, Scott Kuffer (COO, Nucleus Security) and Corey Brunkow (Director of Federal Operations, Horizon3.ai) break down how AI is changing the threat landscape and what defenders can do to stay ahead.

Persuasion engineering: how to influence humans, LLMs, and AI agents

We’ve spent decades treating persuasion like an art—something you could master if you had charisma, practice, or luck. Lawyers use it to hone arguments. Marketers use it to craft taglines. On the flip side, phishers use persuasive tactics to sharpen lures to razor points. But looking at it as an art form, while intuitive for some, can be messy. Hit-or-miss. Especially when you consider that today’s means of persuasion can run like code: systematic, reproducible, and scalable.

Zenity and Slalom Partner to Accelerate Secure AI Agent Adoption

Zenity, the leader in securing AI agents everywhere, is officially partnering with Slalom, a global business and technology consulting firm, who made the announcement today. This collaboration is designed to help enterprises safely and confidently adopt AI agents by combining Zenity’s robust security and governance platform with Slalom’s deep expertise in digital transformation and AI implementation.

Transform Information Discovery with Egnyte's AI-Powered Search

Modern businesses are drowning in content. Documents, presentations, images, audio recordings, videos, the volume grows exponentially every day. Traditional search tools, built on outdated keyword matching, simply can't keep pace. They only help users find information if they know what to look for and what keywords to use. This inefficiency comes at a cost: delayed decisions, missed opportunities, and frustrated teams spending more time searching than working. The solution?