Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Automation Anywhere + Protecto: How Leaders Secure GenAI Data

GenAI data security is now a critical concern for every enterprise. In this insightful episode of AI On The Edge, Dinesh Chandrasekhar, Founder and Chief Analyst at Stratola, sits down with Amar Kanagaraj (CEO, Protecto.ai) and Steve Shah (SVP Products, Automation Anywhere) to explore the future of data privacy, agentic automation, and securing LLMs in enterprise settings. Learn how two of the industry's top innovators are setting AI guardrails, preventing sensitive data leaks, and embedding privacy-by-design into large-scale automation.

Securing AI Applications in the Cloud: Shadow AI, RAG & Real Risks | Mend.io

What does it take to secure AI-based applications in the cloud? In this episode, host Ashish Rajan sits down with Bar-el Tayouri, Head of Mend AI at Mend.io, to dive deep into the evolving world of AI security. From uncovering the hidden dangers of shadow AI to understanding the layers of an AI Bill of Materials (AIBOM), Bar-el breaks down the complexities of securing AI-driven systems. Learn about the risks of malicious models, the importance of red teaming, and how to balance innovation with security in a dynamic AI landscape. What is an AIBOM and why it matters The stages of AI adoption.

Why Security Can Be Stricter: A Zero Trust Approach to AppSec with AI | Mend.io

Is AI making application security easier or harder? We spoke to Amit Chita, Field CTO at Mend.io, the rise of AI agents in the Software Development Lifecycle (SDLC) presents a unique opportunity for security teams to be stricter than ever before. As developers increasingly use AI agents and integrate LLMs into applications, the attack surface is evolving in ways traditional security can't handle. The only way forward is a Zero Trust approach to your own AI models. Join Ashish Rajan and Amit Chita as they discuss the new threats introduced by AI and how to build a resilient security program for this new era.

Beyond Penetration Testing: 10 Cyber Resilience Exercises to Strengthen Your Security Posture

Modern cybersecurity can no longer rely solely on penetration testing. While pen tests remain vital for spotting technical vulnerabilities, they capture only a moment in time. True cyber resilience requires organizations to test how well their people, processes, and technology perform under real-world pressure. At Foresiet, we’ve seen that resilience comes from continuous practice — from crisis simulations to recovery rehearsals — not just from patching systems.

Why Cybersecurity Training for Students Is Essential in Today's Digital World

In a hyperconnected era where everything from classes to finances happens online, students face increasing exposure to cyber risks. From identity theft to ransomware attacks, digital threats are evolving faster than ever. That’s why cybersecurity training for students is no longer optional — it’s essential. Much like learning financial literacy or time management, understanding digital safety is a life skill that protects not just your data, but your future.

Capita Breach Fallout: £14 Million Fine Highlights the True Cost of Cyber Negligence

In one of the UK’s most significant cybersecurity incidents of 2023, Capita, a major outsourcing and professional services provider, was fined £14 million by the Information Commissioner’s Office (ICO). The penalty came after a massive data breach compromised the personal information of 6.6 million individuals, revealing systemic gaps in access control, threat detection, and incident response.

How to Ensure Data Privacy with AI: A Step-by-Step Guide

AI sits in everyday workflows: assistants answering customer questions, copilots helping developers, and RAG apps searching internal knowledge. That means personal and sensitive data flows through prompts, vector stores, and integrations you didn’t have a year ago. Privacy can’t be an end-of-quarter compliance push anymore. It needs to live in your pipelines and apps the way logging and monitoring do.

Critical Intelligence Alert: ED 26-01 - Action Required

On October 15, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued Emergency Directive ED 26-01, ordering federal agencies to mitigate a significant security breach involving F5 BIG-IP products. F5 disclosed that nation-state threat actors maintained long-term unauthorized access to internal systems, exfiltrating: This breach represents a major risk to organizations running F5 devices, especially those with exposed management interfaces or unpatched systems.