AI is now part of customer service, product design, operations, and decision making. That reach brings real benefits, and it also surfaces personal and sensitive data in new places. It raises the question: How do we ship useful AI while protecting people and meeting laws? This guide helps you understand AI and data privacy as one practice through core principles, common pitfalls, practical controls, and a step by step plan to build privacy into your AI stack from the start.
Security leaders are well acquainted with Shadow IT; the unsanctioned apps, services, and even devices employees adopt to bypass bureaucracy and accelerate productivity. Think rogue cloud storage, messaging platforms, or unapproved SaaS tools. These all often slip past governance until they trigger a breach, compliance issue, or operational failure. Now, a more complex threat is emerging - Shadow AI.
AI has redrawn the cyber battlefield. Adversaries are already automating every phase of the kill chain to strike faster, scale wider, and overwhelm defenders. Manual workflows and conversational assistants help teams move faster, but still bind them to human speed. Agentic AI changes the equation. It enables security teams to deputize trusted, mission-ready agents that reason, decide, and act on their behalf — at the speed of AI. The promise of agentic AI is clear.
In this episode Bar-El Tayouri, Head of AI Security at Mend.io speaks about the rapidly evolving landscape of application and AI security - especially as multi-agent systems and fuzzy interfaces redefine the attack surface. We talk about.
The Internet of Things (IoT) ecosystem is expanding rapidly, connecting billions of devices across industries. While this connectivity drives efficiency and innovation, it also introduces massive cyber risks. The IoT ecosystem is an interconnected environment of devices, systems, and technologies, making security especially complex. Attackers are increasingly using automation and artificial intelligence (AI) to launch sophisticated attacks at scale.
It seems like Artificial Intelligence (AI) has suddenly appeared in everything, everywhere, all at once. What feels like “five minutes ago”, there was “pre-AI life”, and now we have AI assistants that speak like real people, apps that create images, music, and video from nothing, and AI agents that do work for us.
Protecting humans means protecting the tools humans use. Human risk management (HRM) means reducing human-based risk, or in our particular area, human-based cybersecurity risk. Study after study has shown that, in one way or another, humans are involved in the vast majority of cybersecurity incidents.
We dove into AI in the SOC with Matt Bromiley from Prophet Security! Matt broke down how AI is transforming (and should be transforming) SOC workflows. Whether you're already using AI tools or wondering where to start, this is the conversation you don't want to miss.