Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

7 Cybersecurity Concerns Related to The MCP Protocol

Everyone’s trying to make AI agents do useful things. That’s why the Model Context Protocol (MCP) is gaining momentum with teams operationalizing LLMs across their infrastructure and tooling. Backed by teams like OpenAI and Google, MCP gives a consistent, standardized way to connect LLMs with the rest of your stack. In other words, the MCP Protocol makes connecting AI tools with real business data and workflows easier using structured access instead of janky UI hacks and glued-on custom code.

Fireside Chat | Adapting Security Leadership for the Age of AI

Erika Carrara, VP & Chief Information Security & Infrastructure Officer at The Greenbrier Companies, shares how she’s adapting her security strategy to meet the demands of the AI era by modernising her tech stack, implementing AI governance, and embedding security into business culture. Interested in finding out more about UpGuard?

9 Best GRC Platforms for 2025

If there's one thing 2025 has made clear, it's that Governance, Risk, and Compliance (GRC) is no longer just a regulatory checkbox. It's the nervous system that connects security, operations, and strategy. Whether it's adapting to new laws, keeping an eye on third-party risks, or managing cyber threats before they become headlines, the right GRC platform can make all the difference. The list below focuses on the GRC solutions that are making the biggest impact right now.

GitGuardian MCP Sever - Example Use Cases and Installation

In this video, learn how to set up and use GitGuardian’s new MCP (Model Context Protocol) server to bring secrets security and Non-Human Identity (NHI) governance directly into your AI-powered IDE, like Cursor or Claude Desktop. GitGuardian Developer Advocate Dwayne McDaniel shows how to install the MCP server and run real use cases—like scanning for secrets, listing incidents, and creating honeytokens—all from inside your coding environment. Ready to embed security where code is written?

The Role of AI in Endpoint Security

One can’t discuss the modern state of endpoint security without mentioning a term that has quickly become ubiquitous with security solutions: artificial intelligence (AI). With a constantly evolving threat landscape and many security challenges plaguing organizations (e.g sprawling attack surfaces, monitoring and continuity gaps, alert overload, and limited resources), it’s clear that endpoint security must evolve as well, and the most-promising advancement is AI.