Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Safe Harbor: An Open Source "Abort Mission" Button for Your AI Agent

AI agents are increasingly connecting to more systems and workflows. They read structured data, follow multi-step instructions, and can reach deep into applications and developer environments. The same capabilities that make them powerful also create new opportunities for attackers. As Zenity Labs continued to study these emerging attack classes, we noticed a pattern starting to appear.

Your Browser is Becoming an Agent. Zenity Keeps It From Becoming a Threat.

Agentic browsers are quickly becoming part of everyday work. Tools like ATLAS, Comet, and Dia can read web content, navigate SaaS tools, interpret instructions, and act on behalf of a user. They promise faster execution and higher productivity but they also introduce new risks that traditional security tools are not designed to see. As these browser-based agents spread across both managed and unmanaged devices, the enterprise attack surface grows in ways that most teams can’t quantify.

SOAR in the AI era: How SAP uses intelligent workflows to build an AI SOC

SOAR was created to help security teams work faster and more consistently by automating and orchestrating core security operations. It has always had to adapt to new and evolving technologies, but our current AI era has brought about a turning point. As cloud environments scale, manual playbooks can’t keep up. Now, it’s not enough to automate. We need systems that can understand the context they’re running in and adapt accordingly.

The New AppSec Reality: AI Anxiety, Silent Flaws, and Supply Chains

We recently published a series of polls across our social channels to get a pulse on some of today’s application security concerns with AI. These recent conversations with our community reveal a clear and urgent shift in the application security landscape. Results show that while established challenges like software supply chain security remain top of mind, the rapid pace of AI has created a new center of gravity for anxiety.

The AI Answering Service Wake Up Call for Modern Businesses

Here is the 4 a.m. question almost no owner says out loud. What actually happens when a real customer calls your business and you do not pick up? You assume it is not that bad and maybe they leave a voicemail. You think maybe they call back or your AI answering service catches it next time. The truth from the inside is uglier and I should know because I helped build the systems that make those calls disappear. I have watched good businesses bleed out through their phone lines while everyone stares at the wrong metrics.

Is AI taking entry-level jobs a good thing? #cybersecurity #ai #podcast

There's growing concern that AI automation is removing the hands-on experience junior analysts need to develop into senior defenders. In this Intel Chat, Matt Bromiley and Chris Luft challenge that assumption. Matt breaks down why the traditional entry-level path of endless log review and alert triage was never the best training ground to begin with. Log detection, alert triage, and drift detection are often cited as how defenders learn the trade. But most analysts never had time to get to drift detection because they were buried in repetitive work.

Stop Gambling on Compliance: Why Near100% Recall Is the Only Standard for AI Data

LLMs, agents and retrieval‑augmented models are increasingly being adopted for product analytics, customer support and decision‑making workflows. With that scale comes exposure: AI privacy and security incidents incidents involving customer PII are more common than ever and becoming a compliance issue. Let’s look at the statistics: These underscore the importance of robust guardrails and why relying on privacy tools with mediocre recall is a gamble.

Fixing Shadow APIs: Why True Remediation is Critical in the Age of AI

Fixing Shadow APIs: Why True Remediation is Critical in the Age of AI Agentic AI is fundamentally changing the security landscape, transforming how we think about API protection. In this insightful discussion, A10 Networks security experts Jamison Utter and Carlo Alpuerto dive deep into the challenges presented by this new wave of automation and API consumers.