Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Safeguard: Using the double-edged sword of AI for good

Examine the function of AI in security tools, and how this double-edged sword can be used for good or ill in the cybersecurity sphere. Plus, see its integration into an identity fabric and get a glimpse into its responsible use – paired with the human element – in One Identity Safeguard.

August Release Rollup: AI-Powered Agents, Egnyte to Egnyte Connector 2-Way Sync, and More

We’re excited to share new updates and enhancements for August, including: For more information on these updates and others, please read the complete list below and follow the links for more detailed articles.

Securing AI and LLMs: A New Security Paradigm

Securing AI and LLMs: A New Security Paradigm When interacting with AI tools like ChatGPT, it's clear that there's a thought process behind their responses. But what happens when an attacker hijacks that process? In this clip from "Securing AI Part 2: What Makes Protecting AI a Unique Challenge?", A10 Networks' security leaders — Jamison Utter, Madhav Aggarwal, and Diptanshu Purwar — discuss this new security paradigm.

How AI Contract Solutions Reduce Risk and Cost

With how businesses operate nowadays, managing contracts is a vital aspect of company operations. Minor errors can cost you a lot of money and land you in legal trouble. Artificial intelligence provides a unique approach to enhancing contract management, reducing risk exposure, and reducing compliance costs.

Optimizing the SOC: Leveraging AI and automation for modern threats

The Security Operations Center (SOC) is the nerve center of an organization's defenses, but its efficiency and effectiveness are often limited by the growing volume and complexity of threats. By leveraging AI-driven threat detection and automated incident response, security leaders can optimize their SOC to respond faster and smarter. For CISOs, this means not only protecting the organization from current threats but also future-proofing defenses against an increasingly sophisticated threat landscape.

Nx npm Malware Explained: AI Agent Hijacking

Nx npm malware (Aug 2025): attackers published malicious Nx packages that weaponized AI coding agents (Claude Code, Gemini CLI, Amazon Q) via a postinstall script to inventory sensitive files and exfiltrate sensitive data to public GitHub repos named “s1ngularity-repository-*.” We break down what happened, affected versions, and how to check + respond (rotate credentials, hunt IoCs, and more). Resources.

7 Cybersecurity Concerns Related to The MCP Protocol

Everyone’s trying to make AI agents do useful things. That’s why the Model Context Protocol (MCP) is gaining momentum with teams operationalizing LLMs across their infrastructure and tooling. Backed by teams like OpenAI and Google, MCP gives a consistent, standardized way to connect LLMs with the rest of your stack. In other words, the MCP Protocol makes connecting AI tools with real business data and workflows easier using structured access instead of janky UI hacks and glued-on custom code.