Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Zenity Joins the Microsoft Security Store: Securing AI Agents Everywhere, Together

We’re thrilled to share that Zenity is included in the unveiling of the Microsoft Security Store Partner Ecosystem. The Security Store is a new marketplace offering from Microsoft that brings together trusted, curated security solutions and AI agents to help organizations navigate the evolving landscape of cybersecurity in the age of AI. The Microsoft Security Store is a strategic leap forward in how security teams discover, deploy, and operationalize technologies that protect their environments.

Beyond Traditional AppSec: Navigating the New Frontier of AI Security with Mend AI

Hear from Bar-El Tayouri, Head of Mend AI, about the urgent need for a new approach to securing AI-driven applications. From understanding novel AI components and their risks to implementing a comprehensive AppSec program, this episode provides actionable insights for organizations building with AI.

How a Digital Bank Reduced Shadow AI Risk by 80% - Without Blocking Innovation

When a fast-scaling digital bank began seeing widespread employee adoption of generative AI tools like ChatGPT and Gemini, their security team faced a growing dilemma: how do you protect sensitive data without shutting down innovation?

Empowering Safe GenAI Adoption at a 3,600-Employee Fintech - And Stopping 20+ Data Leaks a Day

Despite having modern DLP and CASB tools in place, they lacked the behavioural insights and real-time context needed to guide employee use of GenAI tools. Shadow AI use was growing, and SecOps lacked clear visibility into which incidents required intervention.

AI Meets Edge Device Security: Securing Agentless Devices in Modern Connected Environments

In 2025, the edge has become the new frontier of digital transformation. From industrial robotics and autonomous vehicles to energy grids and smart hospitals, mission-critical operations now depend on distributed, intelligent edge systems. Yet this shift has created a profound security challenge. Many of these connected devices are agentless — they cannot host traditional security software or be managed through standard IT frameworks.

Elastic Security Explained: Transparency, AI, and the Future of Threat Hunting

Elastic’s James Spiteri joins John Hammond to dive deep into the evolution of Elastic Security, from the ELK stack’s early days to today’s full-fledged, unified SIEM, XDR, and cloud security solution powered by agentic AI and automation. They discuss free tools, open detections, and how Elastic is making cybersecurity more accessible and collaborative for everyone.

What is Agent2Agent (A2A) Protocol and How to Adopt it?

Imagine autonomous agents negotiating and acting on your behalf—no manual hand-offs, just an efficient, policy‑driven communication. That’s the promise of Google’s Agent2Agent (A2A) Protocol, unveiled at Google Cloud Next in April 2025. Developed with input from over 50 partners, A2A is now open-sourced under the Apache 2.0 license and governed by the Linux Foundation.

Building Trust in AI: KnowBe4's Journey Toward ISO 42001 Certification

At KnowBe4, everything we do is built on a foundation of innovation and trust. As we bring more artificial intelligence (AI) into our human risk management platform, we believe it’s essential to be transparent and responsible every step of the way. That's why we're proud to announce that we are pursuing ISO 42001 certification, the world's first standard for managing AI systems.

When AI agents become admins: Rethinking privileged access in the age of AI

From resetting passwords and approving workflows to pulling HR data and orchestrating cloud infrastructure, AI agents now perform tasks that previously required a human with privileged access. AI has moved beyond the realm of passive chatbots into autonomous, persistent operations, performing work on behalf of an individual or entity. Like it or not, that makes AI agents a new part of your workforce. They hold credentials, trigger workflows, and make their own decisions.

CrowdStrike's Fall 2025 Release Defines the Agentic SOC and Secures the AI Era

We are living through the fourth industrial revolution: the age of AI. Just as with the steam, electricity, and the digital revolutions that preceded it, this leap forward requires a parallel leap in security. AI is transforming how businesses operate and how adversaries attack. They are moving at machine speed, compressing the defender’s response window from weeks to mere seconds.