Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Evolving Role of AI Governance: Turning Risk into Responsibility

This article is part of a monthly LevelBlue series that explores the evolving world of AI governance, trust, and responsibility. Each month, we look at how organizations can use artificial intelligence safely, thoughtfully, and with lasting impact. Artificial intelligence has moved from being an experiment to becoming an expectation. It now shapes how decisions are made, how customers are supported, and how innovation happens. As AI grows in influence, so does the need to manage it wisely.

How Remote Support Is Shaping Reliable Business Operations in a Changing Digital Environment

Many organizations today rely heavily on technology for communication, customer service, and internal coordination. When daily operations depend on multiple systems, even small technical issues can slow down productivity. This has made Remote I.T. Support Services an important part of maintaining stability in modern workplaces. Instead of waiting for on-site assistance, companies can resolve a wide range of technical issues quickly through remote access, guidance, and routine care.

Multimodal Attacks and Model Drift: The Future of AI Exploitation

Multimodal Attacks and Model Drift: The Future of AI Exploitation A10 security experts Jamison Utter, Diptanshu Purwar, and Madhav Aggarwal discuss the critical vulnerabilities emerging from multimodal AI agents (systems that perceive, decide, and act) and the absolute need for security mechanisms external to the Large Language Model (LLM) itself. The experts dive into why traditional security is failing and what the next evolution of defense must look like.

Proactively Identify and Eliminate Defensive Weaknesses with Cybersecurity Domain-Specific AI

AI is everywhere. I live in San Francisco, and a day doesn’t go by that I don’t see a billboard, an advertisement on the side of a bus, or a tech bro’s hoodie with two big letters on it: AI. It’s no different in cybersecurity marketing – AI terminology is everywhere. But too often, it’s tacked on as a buzzword – a thin layer washed on top of existing security tools, with little real impact. This makes it tricky to decipher what’s real and what’s hype.

Enabling Massive-File Collaboration in the Cloud With Adaptive Block Caching

When it comes to massive files, many organizations still rely on old-fashioned, on-premises file servers and filers. They’re hesitant to work on these projects in the cloud because the inherent network latency makes working with massive files difficult. So they stick to an on-premises approach—even though it typically requires wired access and stable VPN connections, which makes sharing and collaborating especially challenging for people working from home, in the field, or on the road.

Be Prepared: Mobile Phishing Expected to Surge Fourfold During the Holiday Season

Users and organizations should be prepared for a surge in phishing attacks over the next several weeks, as attackers take advantage of the holiday shopping season, according to a new report from Zimperium. The report notes that mobile phishing attacks increase fourfold during the holiday season. Many of these attacks impersonate well-known brands and online retailers, such as Amazon and eBay.

Are we on the path to AI defenders vs. AI attackers?

Swarms of AI bots are now being used to continuously test security perimeters. In this episode, Michael Baker, VP and Global CISO at DXC Technology, discusses the shift to AI-driven security operations. He recently met with startups working on agentic pentesting to find vulnerabilities before bad guys do. The advantage? You control these bots and get immediate feedback. The threat? Adversaries are building the exact same capabilities right now.