Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI Security Posture Management (AI-SPM): The Complete Guide to Securing AI Workloads

Every cloud security vendor now has an AI-SPM dashboard. Strip away the branding, though, and most of these dashboards are doing the same thing: checking IAM configurations, scanning for misconfigured network access, inventorying AI models across cloud accounts, and flagging compliance gaps. It’s cloud security posture management with an AI label applied. That’s a problem, because AI workloads don’t behave like other cloud workloads.

AI Can Scan Your Code. It Can't Secure Your Organization.

When Anthropic announced Claude Code Security on February 20th—a tool that scans codebases for vulnerabilities and suggests patches for human review—the reaction from markets was swift and brutal. Major cybersecurity names watched their stock prices fall by double digits within days. The implied thesis behind the selling: AI can now do what these companies do, so why pay for them? It's a compelling fear and an inaccurate conclusion at the same time. The DLP space is a clear example of why.

Rare Not Random: Using Token Efficiency for Secrets Scanning

In Regex is (almost) All You Need, we learned that using a combination of regular expression patterns, entropy, and rule-based filters are an effective way to detect candidate secrets. Regex is used for casting a wide net to identify candidates. Entropy is used as a primary filter on the captured candidates and additional filters like presence of commonly used english words, or filtering on known “safe” files like go.sum are applied last.

The Next Market Disruption: Agentic SOC

Predicting a market disruption is difficult, but the vast rewards of being correct make it worthwhile. Unfortunately, prediction becomes tougher when marketing teams start labelling everything as a "market disruptor". Much like the stock market, if something is being sold to you as “the investment of a lifetime”, it almost certainly is not. Yet market disruptors do exist, and the organizations that identify them enjoy generational success.

Agentic AI Security: Spin Up a Fully Configured Tenant in Minutes

LimaCharlie built a SecOps Cloud Platform that connects every component, including agentic AI, via API. This architectural approach unlocks the full potential of AI, allowing it to do more than advise. We call it the Agentic SecOps Workspace. With LimaCharlie, AI can provision tenants, deploy rulesets, configure integrations, and manage infrastructure directly. Our bring-your-own-LLM approach makes AI a native part of your security stack, not a layer on top of it.

Who's Winning the AI Arms Race: Threat Actors or Cybersecurity Defenders?

The modern threat landscape is an ever-evolving battlefield of innovation and escalation. Thanks to the rapid adoption of artificial intelligence, both attackers and defenders now have powerful new tools at their disposal. But who has the edge when it comes to the artificial intelligence (AI) arms race? Unsurprisingly, the answer is complicated.

The Case for Behavioral AI in Legal Email Security

For legal organizations, the integrity of communication isn't just a business requirement, it’s a foundational pillar of the profession. Whether it’s a sensitive case strategy, a confidential merger agreement, or personal client data, the information contained within firm emails represents an immense amount of trust and significant liability. However, as law firms increasingly migrate to cloud environments like Microsoft 365, they face a double-edged sword.

CrowdStrike Falcon AI Detection and Response

Cyber threats are evolving faster than ever — and security teams need AI that doesn’t just detect threats, but understands and responds to them in real time. In this video, we explore CrowdStrike Falcon AI Detection and Response (AIDR) and how it transforms modern security operations. Powered by the CrowdStrike Falcon platform, AIDR leverages advanced artificial intelligence to automatically identify, categorize, and prioritize threats with speed and precision — helping SOC teams cut through alert noise and focus on what truly matters.

AI on the Radar: Securing AI Driven Development

Join Vandana and Rob in this insightful webinar exploring the rapidly evolving landscape of AI security. As we shift from simple query-response models to complex autonomous agents that can plan, execute code, and access sensitive APIs, the traditional security "locks" are no longer sufficient. This session dives deep into the OWASP AI Exchange, a community-driven initiative providing practical guidance and technical controls for securing AI systems.