Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

7 Questions Tech Buyers Should Ask About How Their Vendors Use AI

As AI becomes an increasingly critical component in the digital supply chain, tech buyers are struggling to appropriately measure and manage their AI risk. Keeping tabs on emerging risk from the AI technology they use is hard enough. But often the most crucial AI business functions that organizations depend upon aren’t directly under their control or care, but instead are governed by the tech vendors that embed them into their underlying software.

Guarding open-source AI: Key takeaways from DeepSeek's security breach

In January 2025, within just a week of its global release, DeepSeek faced a wave of sophisticated cyberattacks. Organizations building open-source AI models and platforms are now rethinking their security strategies as they witness the unfolding consequences of DeepSeek’s vulnerabilities. The attack involved well-organized jailbreaking and DDoS assaults, according to security researchers, revealing just how quickly open platforms can be targeted.

The AI Shared Responsibility Model: Who's Job Is It Anyway?

In this episode of Into the Breach, James Purvis and Filip Verloy explore the AI Shared Responsibility Model, a framework introduced by Microsoft. They break down the roles and responsibilities of cloud providers, model providers, and customers in securing AI-powered environments. From understanding the unique challenges of generative AI tools like CoPilot to the importance of proactive data governance, this discussion offers practical insights into navigating AI security today and in the future.

A Phased Approach: Thoughts on EU AI Act Readiness

The European Union’s (EU) AI Act (the Act) represents landmark artificial intelligence (AI) regulation from the EU designed to promote trustworthy AI by focusing on the impacts on people through required mitigation of potential risks to health, safety and fundamental rights. The Act introduces a comprehensive and often complex framework for the development, deployment and use of AI systems, impacting a wide range of businesses across the globe.

Leveraging CloudCasa to Simplify Upgrades and Enhance Backup for Azure Local

As the Kubernetes ecosystem grows and evolves, the need for robust data protection and streamlined management in hybrid and edge environments has never been greater. Microsoft’s Azure Local platform has become a critical solution for deploying and managing Kubernetes, and in particular Azure Kubernetes Service (AKS), in these environments.

Addressing Cloud Security Blind Spots for Better Protection

As businesses increasingly migrate to the cloud, securing these dynamic environments has become more challenging than ever. Traditional security measures struggle to keep pace with the evolving threat landscape, leaving organizations vulnerable to undetected cloud security risks. One of the biggest challenges in cloud security is the presence of blind spots—hidden cloud security vulnerabilities that attackers can exploit.

Importance of Continuous App Store Monitoring | Storeknox

Mobile apps have evolved into integral components of modern enterprises. They power core operations across industries, from financial transactions to managing health data. While over 80% of businesses rely on mobile apps for customer engagement and services, security must extend beyond the initial launch. While organizations invest heavily in pre-release testing and security checks, they often overlook the threats emerging after the app is available.