Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Invitation Is All You Need: Invoking Gemini for Workspace Agents with a Simple Google Calendar Invite

Over the last two years, various systems and applications have been integrated with generative artificial intelligence (gen AI) capabilities, turning regular applications into gen-AI powered applications. In addition, retrieval augmented generation (RAG)-which is the process of connecting gen-AI and large language models (LLMs) to external knowledge sources-and other agents have been incorporated into such systems, making them more effective, accurate, and updated.

The life and death of an AI agent: Identity security lessons from the human experience

AI agents are on the rise. They can spin up, act independently, use tools, and make decisions—often without real-time human oversight. They promise incredible productivity but also introduce new risks and challenges that can’t be ignored. As these agents become more autonomous and integrated into enterprise operations, they blur the lines between human and machine responsibilities. This raises critical questions: How do we ensure they act ethically?

Snyk Supercharges API Discovery with New Akamai Integration

Today, Snyk is launching a powerful enhancement to our API discovery capabilities through a strategic partnership with Akamai. This integration is designed to solve one of the most significant challenges in modern application security: the difficulty of providing API schemas for DAST scanning. By directly ingesting API inventories and their corresponding schemas from Akamai, we are transforming a difficult manual process into a seamless, automated workflow within the Snyk platform.

Time for an IoT Audit?

IoT is everywhere, quietly powering everything from smart thermostats in homes to complex systems in industrial networks. While these devices bring incredible convenience and innovation, they also open the door to significant cybersecurity risks, especially in manufacturing and similarly sensitive sectors. The longer devices stay online, the more likely they are to become vulnerable due to outdated software, misconfigurations, or a lack of ongoing security management.

From Clipboard to Cloud: Upgrading Dental Reception Security with AI

Dental reception areas have come a long way. Not too long ago, check-ins involved clipboards, paper forms, and the occasional misplaced file. It was all a bit clunky. While it got the job done, it wasn't exactly secure, and it definitely wasn't efficient. Now, clinics are realising that the front desk is more than just a place to schedule appointments. It's also where patient data starts its journey, which means it has to be secure from the very beginning. That's where artificial intelligence comes in, offering smarter, safer ways to handle sensitive information.