Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Conquering the Chaos of Vulnerability and Exposure Management at RSAC Conference 2025

Recently, industry analyst Jon Oltsik outlined a critical shift underway in cybersecurity: the move toward a threat-informed defense. As Oltsik describes, organizations are beginning to strengthen the intersection of vulnerability scanning and threat intelligence, using AI to bolster asset classification and risk scoring. This evolution is essential as enterprises seek to move beyond fragmented security practices and build a more cohesive exposure management strategy.

Where AI meets action: How The Trade Desk enhances security ops with Tines Workbench

While AI represents a fundamental turning point for organizations, many teams are still struggling to realize its full potential. They’re looking for AI to do more, while maintaining crucial security and privacy guardrails. That’s where Tines Workbench comes in, a universal AI copilot. Workbench empowers you to incorporate data from across your stack and take action within a single, secure architecture.

GhostGPT, the new malicious chatbot and its impact on cybersecurity

At this juncture, it is no surprise that cybercriminals are leveraging the potential of generative artificial intelligence to strengthen their attacks. However, the emergence of new models specifically designed to generate threats quickly has made this task even easier for bad actors. At the end of 2024, researchers discovered a new AI chatbot created for cybercriminal purposes.

Understanding AI Maturity: Where Are You Today, and Where Do You Want to Be?

By rating your present AI Maturity level and your desired future state, you can create a focused action plan to move forward confidently and securely. AI adoption doesn’t have to be overwhelming, it just requires a clear, intentional approach.

How to Use MCP Servers with Claude Desktop | Real-Time AI Integration

In this video, I walk you through the basics of getting started with MCP servers using Claude Desktop as the client. Whether you're new to MCP servers or just looking for a smooth way to connect and explore, this step-by-step guide will help you get up and running in no time!

How We Support Enterprise Adoption of MCP, A2A, and AI Integrations

We’ve been hearing (and using) a lot of acronyms lately. MCP, A2A, ACP… it’s easy to fall behind. Fortunately for our customers, all of these new standards are API based! Since Riscosity is built to discover, monitor, and govern all HTTP-based data flows, it requires no extra integration or setup to handle MCP, A2A, or ACP traffic.