Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The future of identity security Is AI-driven but human-led

Cyber threats continue to move faster, operate smarter and hit harder than ever before. Against this backdrop, one truth has emerged: identity is the new perimeter – your people’s digital identities are the new front line of defense. And that brings identity into focus for every attacker. To truly protect your business, you need an AI-enabled, dynamic, intelligent, unified Identity Fabric to deliver next generation protection and control without impacting productivity.

AI Agents Take DC: Inside Washington's Developing Agentic Security Agenda

AI Agents have become one of the most discussed emerging technologies in enterprise environments, and now, they’ve captured the attention of policymakers in Washington, DC. Over the past several weeks, a series of developments have brought AI Agents into the national spotlight, particularly through the lens of cybersecurity and regulatory preparedness.

Building AI Trust with Snyk Code and Snyk Agent Fix

Many businesses are using AI to innovate and boost productivity. But to truly benefit from AI, you need to trust it. That's where the Snyk AI Trust Platform comes in. As we announced at the 2025 Snyk Launch, the Snyk AI Trust Platform is designed to unleash innovation, reduce business risk, and accelerate software delivery in the age of AI.

Scan your AI-generated code from Cursor using Model Context Protocol (MCP)

We’re happy to announce that Cursor has validated Snyk’s CLI MCP server and added Snyk to their curated set of MCP tools from official providers. At Snyk, we recognized early on that although AI assistants accelerate development, they can inadvertently introduce vulnerable patterns, leverage outdated libraries, or even code with known security flaws. In order to maintain the rapid iteration cycles that AI enables, developers need security to be as agile as AI itself.

Falcon Exposure Management ExPRT.AI: Demo Drill Down

Most vulnerability tools flood teams with static scores and long lists but ExPRT.AI changes the game by predicting what adversaries are most likely to exploit. This demo drill down shows how ExPRT.AI dynamically scores risk across asset types, network exposures, and third-party findings. You’ll see how it re-prioritizes vulnerabilities based on real-world telemetry, attacker behavior, and environmental context including a Tenable example.

Why Hosting LLMs On-Prem Doesn't Eliminate AI Risks [And What to do About It]

As AI steadily percolated into a growing number of use cases, adopting it has been a rollercoaster of confusion, chaos, and conundrums. One of the key concerns around AI adoption are the added risks. Issues like sensitive data leakage, AI hallucinations, inability to implement access control, and data breaches lurk the the cloud where LLMs are deployed.

AI, out-of-the-box!

Elastic's GenAI capabilities are now available by default in Elastic Cloud Elastic AI features in Elastic Security, Observability, and Search are now enabled by default in Elastic Cloud. Getting started with generative AI (GenAI) shouldn’t be a project in itself. Too often teams encounter organizational friction that slows adoption of AI-based features, from third-party contracts and external API keys, to additional terms of service and billing management.

Why OCM Is Integral to AI Governance and Compliance

As organizations race to adopt artificial intelligence, many overlook a key success factor: Organizational Change Management (OCM). While AI governance and compliance frameworks provide the structure—policies, controls, and oversight, OCM addresses the human factors that brings these frameworks to life. AI governance requires more than technical controls; it demands cultural alignment, ethical awareness, and behavioral change across the enterprise. That’s where OCM becomes critical.

Cursor's One-click Install MCP in Action

In this video, I’m checking out the brand new Cursor 1.0 release and testing one of its most exciting new features — the one-click MCP install. Setting up MCP servers has never been this easy! Join me as I walk through the process, share my first impressions, and see how smooth (or not) the setup really is. If you’ve been curious about Cursor or want to simplify your MCP workflows, this one’s for you.

Can AI Prevent Fraud Without Interfering with Your Privacy?

Fraudsters are getting craftier, but fortunately, the technology against them is becoming more intelligent as well. The question on everyone's mind is, how can we apprehend the bad guys without becoming Big Brother? You may be surprised at the answer. The idea of fraud detection has been synonymous with gathering as much information as possible about all people. It was as though there was a security camera in every room just in case. However, AI is turning the tables, and it is, in fact, turning things more private rather than less.