Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI-driven CSPM: How GenAI will transform Cloud security posture management

Generative AI (GenAI) is poised to revolutionize the cloud security posture management (CSPM) space, bringing intelligence, automation, and context to increase the effectiveness of managing cloud risk. Maintaining a robust security posture in the cloud can be challenging as the number of deployed cloud services increases across diverse clouds. Soon, AI-driven CSPM will play a critical role in helping security and cloud teams to keep pace with misconfigurations and compliance gaps.

CrowdStrike Research: Securing AI-Generated Code with Multiple Self-Learning AI Agents

Applying robust security measures to automated software development is no longer a luxury but a necessity. CrowdStrike data scientists have developed an AI-driven, multi-agent proof of concept that leverages Red Teaming capabilities to identify vulnerabilities in code developed by AI agents. While it is still in the research stage, our work shows this advanced AI technology has the potential to revolutionize software security.

The Fast Eat the Slow: AI Adoption for Survival in Modern Cybersecurity

John Quinsey (also known as “JQ”) is a regional director at Torq with 25 years in software and SaaS sales, solving business problems with disruptive technologies. He firmly believes AI has the power to revolutionize modern security operations. Just five years ago, the average dwell time for a ransomware attack was seven months. Today, it’s five days and shrinking.

Claude AI BLEW MY MIND! (Board Game Challenge)

In this video, I challenge Claude AI to a head-to-head match in the board game King of Tokyo Duel. I walk the AI through the rules, give it everything it needs to understand how to play, and then we battle it out! Claude picks up the game shockingly fast — its strategy, decision-making, and logic were next-level. I was seriously mind-blown at how intelligent it was… Should we put this to the test with other AI's like ChatGPT?

Netwrix Launches the First MCP Server to Bring LLMs into Data Security!

Netwrix announces first MCP server to harness the power of Netwrix + LLMs for data security. Today, we're open-sourcing our first MCP server – and it’s powering up Netwrix Access Analyzer with conversational AI to help customers assess and remove sensitive data exposures. Netwrix is first to market in the data security security industry with an MCP server, enabling you to bring your favorite Generative AI tool to the critical task of securing your data.

How AI is revolutionizing third-party risk assessments

Enterprises rely heavily on third-party vendors for a vast spectrum of critical services. From IT support and supply chain management to specialized consulting and cybersecurity, the reliance on external partners has increased significantly. With this reliance comes the inherent risk that these vendors may pose to enterprise operations, reputation, and regulatory compliance.

All About Cloudflare's Developer Week 2025 (AI, Vibe Coding, Agents, and More)

This episode is all about our second innovation week of the year: Developer Week. Host João Tomé is joined in person at Cloudflare’s London office by Ricky Robinett, VP of Developer Relations, and Craig Dennis, Developer Educator. There’s a lot to go through — new tools and announcements launched during this April week. The vibe in the developer world, with AI, agents, and code-first energy, is contagious. More people, even non-developers, are now empowered to build their own tools and applications.

Securing the Energy Sector: The Backbone of the UK's AI Ambitions

The UK’s ambition to become a global leader in artificial intelligence (AI) marks a transformative era. However, the foundation of this progress—the energy sector—has emerged as a prime target for cybercriminals. While AI-driven technologies offer greater efficiency and resilience, they also heighten the sector’s vulnerability to cyberattacks. To sustain the nation’s AI advancements, ensuring the security of the energy infrastructure must be a critical priority.