Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI-Powered Human Risk Management Shifts the Focus to Adaptive, Behavior-Based Training

Human risk management (HRM) focuses on one of the most persistent cybersecurity vulnerabilities: humans. Social engineering attacks that trick users into taking risky actions are a factor in 98% of cyberattacks not because they are technically complex, but because they manipulate employee behavior. Unlike traditional, one-size-fits-all security awareness training, human risk management focuses on changing employee behavior through monitoring and targeted reinforcement.

Secure What Matters: Scaling Effortless Container Security for the AI Era

In November, we shared our vision for the Future of Snyk Container, outlining a fundamental shift in how teams secure the modern container lifecycle. We promised a future where security doesn’t just “scan” but scales effortlessly with the speed of the AI-driven, agentic world. Today, we are thrilled to announce that we are moving from vision to reality.

The Agentic Identity Crisis: Why Your AI Agents Are Your Biggest Identity Blind Spot in 2026

An intern gets admin access to production for a temporary task, but nobody remembers to revoke it. Imagine that intern works at machine speed, never sleeps, and can chain dozens of actions before you’ve read the Slack ping—and has no instinct for when they’re about to do something irreversible.

IREX Upgrades FireTrack AI for Faster and More Accurate Fire Detection

WASHINGTON, DC - IREX has announced a major update to its FireTrack fire and smoke detection module, introducing significant improvements in speed, accuracy, and operational flexibility across a wide range of environments. According to an article on The Next Web, the updated solution is designed to work seamlessly with existing camera infrastructure, enabling organizations to enhance fire detection capabilities without deploying additional hardware.

Anthropic Claude Mythos Preview: The More Capable AI Becomes, the More Security It Needs

The Claude Mythos Preview matters for every enterprise. Frontier models raise the ceiling for both offense and defense. Our job is to make sure defenders hold the advantage. That is what we have always done. That is what we do today. Today, CrowdStrike is a founding member of Project Glasswing. Anthropic builds the model. CrowdStrike secures AI where it executes. That’s the division of labor the industry needs.

NVIDIA Just Made AI Agents Production-Ready #ai #shorts

AI agents just became production-ready overnight. With NVIDIA’s new NeMo Guardrails / NemoClaw-style agent control systems, AI agents can now operate in controlled environments with policies, sandboxing, and guardrails. Sounds safe… but there’s a catch. Agent safety protects what the AI does. But it doesn’t secure what the AI knows. And that’s where the real enterprise risk appears. In this video we break down the difference between.

Smishing AI

Cybercriminals are evolving—and so are their tactics. Smishing, or SMS phishing, has become one of the fastest-growing mobile threats. With AI, attackers can now create convincing, personalized messages in seconds—removing language barriers and making scams harder than ever to detect. That’s where Lookout Smishing AI comes in. Our advanced AI-powered detection goes beyond scanning for malicious links. It identifies the intent behind every message—stopping social engineering attacks before they reach you. Whether there’s a URL or not, Lookout keeps your mobile workforce protected.

Mobile Threat Report Briefing

In this video, David Richardson, Product CTO at Lookout, provides a strategic overview of the evolving mobile threat landscape based on Q3 2025 global enterprise data. Key Insights: Dominant Attack Vectors: Mobile phishing and social engineering remain the most significant threat categories. Attackers are increasingly using AI-powered tools to craft authentic-looking messages and conduct deep research for highly targeted attacks.

Everyone is Deploying AI Agents. Almost Nobody Knows What They're Doing

AI agents are operating inside your enterprise; querying databases, triggering workflows, and taking action through APIs. As AI agents are adopted, organizations cannot see, track, or control what these agents are actually doing. In this session, Roey Eliyahu, Co-Founder and CEO of Salt Security, challenges the industry’s narrow focus on LLM safety and exposes the much larger, invisible attack surface created by agentic systems.