Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How AI is transforming Elastic's Security team

Spending hours creating threat intelligence reports is a thing of the past with our InfoSec AI Assistant, built on Elastic’s Search AI Platform. Mandy Andress, our CISO, shares how the AI Assistant has transformed the way our security team gathers, documents, and reports on threats — cutting report-building time by over 75%. Learn how we’re using generative AI to build threat intelligence reports quickly, assess relevance and risk faster, and shift from reactive defenses to proactive security strategies.

The Security Paradox of AI Video Generation: Why ChatGPT's Sora2 Access Demands New Digital Verification Standards

The launch of OpenAI's Sora2 model has fundamentally transformed the landscape of AI-generated video content. As the successor to the groundbreaking Sora, this advanced text-to-video AI system can now produce photorealistic video sequences up to 20 seconds long from simple text descriptions.

Exabeam Nova: The First Autonomous Multi-Agent AI for Cybersecurity

Security teams are in an AI arms race — facing massive data volumes, insider threats, and adversaries using AI to find vulnerabilities and launch faster, smarter attacks. Exabeam changes the game with Exabeam Nova, the first autonomous multi-agent AI purpose-built for security operations. Fully embedded within the New-Scale Security Operations Platform, Exabeam Nova delivers measurable outcomes across threat detection, investigation, and response.

9 AI risks that could impact your organization-and how to mitigate them

As AI becomes more user-friendly and performance-focused, organizations are increasingly adopting it into their systems to streamline elaborate workflows. However, the rapid pace of adoption means that teams often implement AI models before fully mapping the security and compliance implications that they bring. ‍ According to Vanta’s State of Trust Report, more than 50% of organizations view AI risks as a growing concern today.

Top 5 Problems You Can Solve with REST API Authentication for Jira and Confluence

In the Atlassian ecosystem, REST APIs offered by Jira, Confluence, and other tools quietly power automation, integrations, and data exchange across the ecosystem. These APIs enable seamless communication between Atlassian products and external applications, making workflows smoother and more efficient.

Mobile App Security Assessment: Identifying Risks Before Attackers Do

Misconfigurations in storage and encryption settings can put your mobile apps at risk, but so can social engineering attacks. Mobile devices are powerful productivity tools, enabling your staff to work from almost anywhere. They can also be security risks, sharing sensitive data outside of a tightly controlled office environment. If smartphones and tablets are integral to your organization’s day-to-day workflows, a mobile application security assessment should be part of your cybersecurity strategy.

Best Practices for Protecting Data Privacy in AI Deployment in 2025

AI is no longer a side project. It now powers support desks, analytics, knowledge search, decision support, and developer tooling. That reach makes data privacy a daily engineering task, not an annual policy exercise. Teams that succeed treat privacy like performance or reliability: they design for it, measure it, and improve it with each release. This guide captures Best Practices for Protecting Data Privacy in AI Deployment that work across industries.