Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DSPM and Data Discovery: Finding and Classifying Sensitive Data at Scale

Proprietary data is the definitive differentiator in the age of AI. Models can be replicated, infrastructure can be rented, and tools can be replaced. What cannot be easily reproduced is institutional knowledge, customer insight, and strategic intent found in enterprise data. This data must be continuously identified, deeply understood, and actively protected as it changes state, location, and context.

LevelBlue Research: CIOs Recognize the Double-Edged Sword of AI

A Chief Information Officer’s (CIO) life is rarely simple or easy. Many are concerned about threat actors using AI to attack their organization, while at the same time attempting to convince their leadership to invest in AI as a defensive measure. A recent LevelBlue report Persona Spotlight: CIO, found that CIOs understand the threat, but many organizations are still behind the curve when it comes to certain aspects of their cyber defense.

AI red teaming with John V.

Join us for this session of Defender Fridays as we explore AI red teaming with John V., AI risk, safety, and security specialist at the Institute for Security and Technology (IST). At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

Application security in the age of AI with Farshad Abasi

Join us for this session of Defender Fridays as we explore application security in the age of AI with Farshad Abasi, CEO and Co-founder at Eureka DevSecOps. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

How to Strengthen Cyber Resilience in an AI Era with Chris Cochran from SANS Institute [296]

On this episode of The Cybersecurity Defenders Podcast, we speak with Chris Cochran, Field CISO & Vice President of AI Security at SANS Institute, about how to navigate the future of AI risk and security strategy.

Live Webinar- Securing Multi-AI Deployments MCP; Agentic AI & Inter-AI Security

live webinar with Aaron Turner, IANS Faculty, who presents findings from his recent IANS research, 7 Steps to Securing Multi-AI Deployments, and explain how security teams can apply proven principles to modern AI systems.

Securing Human and Non-Human Identities from AI Security Risks

As organizations rely more on Artificial Intelligence (AI) to power critical operations, the infrastructure supporting AI development and deployment is becoming a high-value target for cybercriminals. From model training and data pipelines to cloud workloads and APIs, AI operations rely on access to privileged credentials and critical systems.

Agentic AI Security: Onboard Multi-Cloud Environments with AI

LimaCharlie's Agentic SecOps Workspace (ASW) lets agentic AI security solutions operate directly inside your environment. Everything in LimaCharlie’s SecOps Cloud Platform connects via API. For us, AI isn't a bolt-on layer. It's woven into the same fabric as your detections, sensors, and integrations. Limacharlie’s approach makes it easy for users to bring-your-own-LLM into security operations.

New Apono Report Reveals 98% of Cybersecurity Leaders Are Slowing Agentic AI Adoption Due to Insufficient Security Controls

Report finds growing tension between AI acceleration goals and security readiness as autonomous systems move toward production NEW YORK — February 2026 — Apono, the cloud-native Privilege Access Management platform securing human and agent identities, today released The 2026 State of Agentic AI Cyber Risk Report, a global study examining how enterprises are approaching agentic AI adoption amid rising security concerns.