Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Seeing What AI Touches: Introducing Data Lens

Security teams are entering a new phase of risk driven by the combination of AI agents and broad access to internal and external data. Agents are no longer limited to responding to prompts. They read files, pull documents from shared repositories, query external sources, and move information across systems on behalf of users. This shift brings real business value. Knowledge becomes easier to access, workflows move faster, and information that once required deliberate effort can be surfaced instantly.

AI-Assisted Social Engineering is a Growing Concern

A survey by the World Economic Forum (WEF) found that 47% of organizations cite the advancement of adversarial capabilities as their top concern surrounding generative AI. These capabilities include phishing, malware development, and deepfakes, all of which are increasingly accessible due to AI tools. Additionally, 42% of organizations experienced a successful social engineering attack last year, and the researchers expect this number to rise as AI-assisted social engineering grows more advanced.

2026 SIA Megatrends - AI is Eating Software

Like many in our industry, we wrapped up 2025 by digging into the Security Industry Association’s (SIA) annual megatrends report. Rather than just another predictions list, the 2026 SIA Security Megatrends report offers a strategic roadmap from industry trailblazers who have mapped out the specific shifts in physical security trends we can expect in 2026. As we enter the early days of a fresh year, we sat down with Brivo Founder and President Steve Van Till, who had a hand in shaping this year's topics, to get his insider take on the findings.

Why AI SOC Is Becoming Standard for MSP Security Operations in 2026

Managed service providers (MSPs) manage multiple client environments at the same time. It’s not an easy task, as threats move quickly and alerts never stop. It poses a big challenge for human-only SOC teams to handle such huge volumes of alerts and threats. This is where AI SOC changes how security operations are conducted for MSPs. An AI SOC uses artificial intelligence to monitor activity and identify threats in real-time.

Understanding the LLM Mobile Landscape in Enterprise Technology

Mobile security has always been complex, but LLM technology has added a whole new dimension to the field. Behind every popular generative AI (genAI) tool is a comprehensive large language model (LLM) that provides data and parses queries in natural language. When used responsibly, LLMs can be useful tools for ideation and content generation. In the wrong hands, though, LLMs can help threat actors supercharge their social engineering scams.

Why Measuring Security ROI Matters

Security investment only matters if it can be measured. In this roundtable, Josh Jones makes a straightforward point: security leaders need a way to quantify whether their investments are actually producing outcomes that can be explained to executives and boards. That challenge isn’t about buying more tools. It’s about answering basic questions: What are our tools actually doing? Where are controls misaligned or underused?

Cyberhaven Product Launch: Uniting DSPM & DLP to Secure Data in the AI Era

AI is rewriting data risk. On Feb 3, see how to fight back. Every week, AI makes your team faster—and your data more exposed. Files jump between new tools, models train on sensitive inputs, and traditional DLP is blind to the context that matters most. On February 3 at 11:00 AM PST, we’re pulling back the curtain on Cyberhaven’s unified DSPM & DLP platform—and showing how a single, AI‑native platform can finally keep up with how data actually moves.

How AI is boosting Automation Processes

Artificial intelligence seemingly came out of nowhere a couple of years ago, and now most of us use it in some capacity, especially if we are business owners, but the fact is, AI did not really come out of nowhere - it was years in the development and the next natural step to technology and automation processes that were already in place.