AI is everywhere - but where is it in your IT environment? In this episode, we discuss how Tanium Guardian's AI Visibility Dashboard gives you visibility into AI tooling. Learn how we detect MCP servers, local model managers, OpenClaw installations, and local model files Understand the risks associated with AI tools and managing exposure, performance risks, and compliance considerations.
This month, we sit down with Tom Rogers, SVP of Revenue and Growth Marketing, as he shares how he encourages innovation and experimentation amongst his team, some amazing advice for senior leaders, and so much more!
In today's complex business world, staying organized and secure is more important than ever. This video breaks down GRC (Governance, Risk, and Compliance)—an integrated approach that helps organizations manage their goals, threats, and regulatory requirements in one unified way.
Solid policy on your AI agent isn't enough if your infrastructure isn't trusted end-to-end. Here's the attack that proves it — and why identity fragmentation is the real problem.
Hackers can reach your critical systems in just 27 seconds. In 2025, AI-powered cyberattacks surged 89% as adversaries weaponized the same AI tools organizations use every day. From eCrime groups to China-nexus actors, North Korean operatives, and Russian intelligence, AI is accelerating and reshaping global threat activity. In this video, you’ll learn: Adversaries are not just using AI. They are weaponizing your AI against you.
You can ask AI to create a song that sounds like a famous band sang it. But what happens if you use it or share it? Are there legal or other implications? AI tools must be visible and governed. Shadow AI isn’t. Take Cato’s AI in Cybersecurity course to understand the risks of unsanctioned AI tools. It’s free, comes with a downloadable cert, and earns CPE credits. Register now.
June 2025 marked a turning point in cyber warfare. In this episode of The Cyber Resilience Brief, Tova Dvorin and offensive engineer Adrian Cully break down the cyber escalation that followed Operation Rising Lion—what some analysts now describe as Iran’s 12 days of cyber war. As missiles struck Iranian strategic targets, coordinated hacktivist groups like Cyber Avengers and Handala launched psychological operations, mass SMS spoofing campaigns, and attacks targeting operational technology (OT) systems—including Unitronics PLCs used in water and industrial facilities worldwide.
AI is becoming table stakes in vulnerability and exposure management. In this candid webinar conversation, Chris Ray, Field CTO at GigaOm, and Will Gorman, CTO and leader of AI initiatives at Nucleus Security, challenge the assumption that more AI automatically leads to better outcomes.