Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyberhaven DSPM: Uniting DSPM & DLP to Secure Data in the AI Era

Enterprise security programs were built for a time when data lived in a small number of predictable locations. That model no longer holds. Today, data is constantly created, copied, transformed, and shared across cloud applications, endpoints, on-prem systems, and generative AI tools, often without clear visibility. Protecting data in the AI era requires three pillars: holistic visibility across the full data lifecycle, a deep understanding of data with context (e.g.

When AI Agents Create Their Own Reddit: Moltbook Highlights Security Risks in the Agentic Action Layer

A new platform, Moltbook, has attracted significant attention within the AI community. It is not famous because humans are posting there, but because autonomous AI agents are. Moltbook is a social network designed for AI agents to post, comment, upvote, and even form communities. Humans can observe these interactions but cannot participate. This experiment reveals a striking reality. AI agents are coordinating, sharing code, and developing complex cultures without human visibility.

The Prescriptive Path to Operationalizing AI Security

In introducing the AI Security Fabric, we have outlined how security must evolve as software is built by humans, models, and autonomous agents working at machine speed. The Fabric defines the architectural shift required to build trust at AI speed, delivered through the Snyk AI Security Platform. We’re now focusing on the next question: how organizations put that vision into practice. Operationalizing AI security is not about enabling a single feature or deploying a tool.

Introducing the AI Security Fabric: Empowering Software Builders in the Era of AI

Today, we’re thrilled to introduce the AI Security Fabric, delivered through the Snyk AI Security Platform, and operationalized through a prescriptive path for AI security. As software creation shifts to humans, models, and autonomous agents working together at machine speed, security must evolve just as fundamentally. The AI Security Fabric defines the new paradigm, and the Prescriptive Path shows how the Snyk AI Security Platform gets you there.

January Release Rollup: Egnyte MCP Server, File Server Connector, and More

We’re excited to share new updates and enhancements for January, including: For more info on these updates, check out the list below and dive into the detailed articles. Please join the Egnyte Community to get the latest updates, chat with experts, share feedback, and learn from other users.

When AI Can Act: Governing OpenClaw

Agentic AI burst into public consciousness this week with talk of Moltbook – a social network designed for AI agents built on OpenClaw (formerly Clawdbot and Moltbot). The resulting conversations about identity, forming a new religion, social engineering humans, and more between bots have sparked alarms everywhere. For IT leaders, one thing is clear: AI crossed a meaningful threshold.

AI agents are forcing a reckoning with identity and control

Most organizations never planned for AI to start making real decisions. They started with simple helpers. An agent answered basic questions or generated small automations so teams could avoid opening another IT ticket. It felt harmless. But as these agents become more capable and more autonomous, they begin operating across systems at machine speed. They connect tools, provision access, and trigger chained actions long after the original request.

Compensating Controls: The Unsung Heroes of Cyber Resilience

Article updated and refreshed February 3rd, 2026. When ideal controls aren’t possible, intentional alternatives help reduce exposure. Most security teams know what the “right” controls look like on paper.But real-world environments rarely match the blueprint. Between legacy systems,limited staffing, and overlapping tools, the gap between what’s ideal and what’s feasible is often wide. That’s where compensating controls come in. They aren’t shortcuts.

Security Control Management: The New Mandate for Risk-Driven Security

Article updated and refreshed February 3rd, 2026. Because the tools you’ve deployed aren’t the same as the ones you’re using. Security teams today aren’t short on tools. Most environments are packed with security controls—spanning email, identity, network, endpoint, and cloud. But despite this abundance, risk remains stubbornly high. Attacks continue to land. Exposure persists. The problem isn’t the absence of controls. It’s the lack of control over the controls.

5 Essential AI Tools for Project Managers to Boost Productivity in 2026

It's 2026, and if you're still manually color-coding spreadsheets or manually typing meeting minutes, you're stuck in the past. We are no longer "task trackers", we're "strategic navigators". But with the release of GPT-5.2 and the deluge of AI agents, it's noisy. I've seen so many PMs download 20 different AI apps and they're all the same: "generating some generic text for you". If you really want to save time, you don't need more writing tools; you need a varied toolkit that takes care of the different parts of your brain: your scheduler, your communicator, your designer, your librarian.