Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

EP 24 - FOMO, identity, and the realities of AI at scale

In this episode of Security Matters, host David Puner sits down with Ariel Pisetzky, chief information officer at CyberArk, for a candid look at the fast‑evolving intersection of AI, cybersecurity, and IT innovation. As organizations race to adopt AI, the fear of missing out is driving rapid decisions—often without enough consideration for identity, security, or long‑term impact.

AI Infrastructure Needs an Agentic Identity Framework - We're Building It

AI agents are about to cross a threshold. For infrastructure and security leaders, agentic AI is no longer an innovation topic but a production readiness problem. What started as sandboxed applications and tech demos at trade shows (bet you’ve seen a few of those) has morphed into long-running autonomous actors operating directly in production cloud and on-prem infrastructure. They read data, write code, deploy services, access databases, and make decisions continuously across environments.

AI Action > AI Advice

Sr. Technical Content Strategist From Advisory AI to Operational AI in Security Operations The early wave of AI SOC platforms has delivered mixed results. While AI proved its usefulness as a triage assistant and next-step remediation advisor, these benefits came with significant drawbacks. Foremost, the cost of outsourcing an AI SOC is significant. Medium enterprises could expect to pay anywhere from $120,000 – $360,000 a year for the service.

Safe agentic commerce starts with KYA and dynamic IDV

Product, fraud, and trust and safety teams at online merchants and marketplaces have been fighting bots for a long time. While there were occasional disagreements about how “bad” bots were (a purchase is a purchase, some might say), the general consensus often ranged from suspicious to block them all. But not anymore. As AI-powered browsers and agents become more commonplace, online merchants have to prepare for a world where agentic commerce is a standard sales channel.

Why CVEs Alone Don't Explain Risk | Ed Amoroso & Garrett Hamilton on Actionable Security

Vulnerability data isn’t the starting point. Context is. Ed Amoroso and Garrett Hamilton unpack why CVEs on their own don’t explain risk. What matters first: ⇢ What assets actually exist⇢ How controls are deployed and configured⇢ What the live posture looks like, not last month’s report With that context in place, vulnerabilities stop being noise and start becoming decisions. Garrett also makes a critical point near the end: many security tools are excellent at producing findings, but far less effective at helping teams resolve them.

The Strengths and Shortcomings of AI Control Tower

This is why platforms like ServiceNow AI Control Tower are showing up in governance roadmaps. Control Tower helps organizations standardize how AI systems are requested, reviewed, cataloged, and managed across their lifecycle. It can bring order to chaos. But there’s a second, equally important reality: the strongest governance workflow in the world can’t govern what it can’t see.

GLM 4.7 vs. The Giants: Is This the New King of AI Coding?

Can a lesser-known model compete with the likes of OpenAI, Google, and Anthropic? In this video, we put Z.ai’s GLM 4.7 to the ultimate test. We task it with building a production-ready, secure Node.js note-taking application from a single prompt to see if its code quality and security stand up to the big name foundational models.