Overprivileged non-human identities expose enterprises to massive risk. Enforcing least privilege with automation and visibility is critical for security.
At the RSAC Conference this year, it seemed that every cybersecurity company had suddenly become an agentic AI company. According to such vendors, AI agents were the solution to every security problem keeping CISOs up at night. The audience, however, was understandably skeptical. Concerns over vendor promises fell into two camps. The first camp: companies that took whatever AI capabilities they had and slapped the word ‘agentic’ on them (aka ‘agent-washing’). Or even worse.
CrowdStrike has been named a Leader in The Forrester Wave: Managed Detection and Response (MDR) Services in Europe, Q3 2025. In this evaluation, CrowdStrike received the highest possible scores in 16 criteria, including endpoint detection surface, identity detection surface, cloud detection surface, managed response: manual and automated, threat hunting, analyst experience, vision, and innovation.
Initially established in 1968, TransUnion was set up as a holding company for the Union Tank Car organization. It entered the credit reporting industry in 1969, following an acquisition of the Cook County Credit Bureau. Over time, TransUnion developed from solely credit reporting to information and insights on a global scale. The official mission of the company is to help people globally access capital and services, thereby emphasizing its role as a consumer advocate.
In our last post, we introduced the Model Context Protocol (MCP), the "brain" or "mission briefing" that guides an AI agent's actions. Most security teams are just getting familiar with prompt injection, the equivalent of tricking an AI with a single, misleading command. But that's like stopping a pickpocket at the door when a master spy is already inside, rewriting the mission plans. As AI agents become autonomous, the attacks become more profound.
Remember when we thought the application layer was where all the fun happened? Firewalls, WAFs, EDR, dashboards galore — the entire security industrial complex built around watching what apps do. Well, with “agentic AI” running the show, that middle ground is turning into a bypass lane. Instead of clicking through UIs or APIs, your AI buddy is making direct system calls, automating workflows at the OS and hardware level.
Picture this: Unusual card-present transactions, processed through a POS tap terminal that shouldn’t even exist on your network, suddenly light up your fraud-monitoring dashboard. Your heart sinks as you realize you’re dealing with something far more dangerous than a stolen card. It turns out that a rogue terminal has been siphoning funds — and evading detection — for days.
Let’s catch up on the more interesting vulnerability disclosures and cyber security news gathered from articles across the web this week. This is what we have been reading about on our coffee break! If you have Salesforce I hope you are being cautious of any strange requests…
Every week, I hear from firms eager to explore how artificial intelligence can speed up workflows, improve quality, and unlock new ways of working. But here’s the reality: AI is only as good as the data behind it. Without a solid foundation of structured, governed, and secure information, AI’s potential quickly crumbles.
2025 is the year privacy becomes the competitive layer of AI. If you’re rolling out GenAI privacy is no longer a compliance chore; it’s a trust-building strategy that accelerates adoption, partnerships, and revenue. This report distills the most important AI privacy issues, statistics, and trends shaping 2025: what they mean, and how to respond with practical guardrails that protect people and performance.