Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

5 AI Myths Exposing the Governance Gap

AI adoption isn’t slowing down. It’s accelerating, quietly, unevenly, and often outside formal control. To separate assumption from reality, CultureAI commissioned an independent research study of 300 senior technology, security, and risk leaders across North America and Europe. Respondents included CISOs, CIOs, CTOs, Data Protection Officers, and senior IT and security leaders across finance, healthcare, technology, legal, and professional services.

LevelBlue Research: CIOs Recognize the Double-Edged Sword of AI

A Chief Information Officer’s (CIO) life is rarely simple or easy. Many are concerned about threat actors using AI to attack their organization, while at the same time attempting to convince their leadership to invest in AI as a defensive measure. A recent LevelBlue report Persona Spotlight: CIO, found that CIOs understand the threat, but many organizations are still behind the curve when it comes to certain aspects of their cyber defense.

What You Need to Know about the CarGurus Data Breach

CarGurus is a major online automotive marketplace founded in 2006 and publicly traded on NASDAQ under the ticker symbol CARG. Headquartered in Cambridge, Massachusetts, the company operates one of the largest car shopping platforms in the United States, connecting millions of car buyers and sellers including both private individuals and dealerships.

What You Need to Know about the Vikor Scientific Data Breach

Vikor Scientific is a molecular diagnostics company based in Charleston, South Carolina, that now operates under the brand name Vanta Diagnostics. The company owns KorGene, a molecular testing laboratory, and partners with KorPath, an anatomical pathology laboratory based in Tampa, Florida. These diagnostic facilities process sensitive medical testing for thousands of patients across the United States.

Securing Human and Non-Human Identities from AI Security Risks

As organizations rely more on Artificial Intelligence (AI) to power critical operations, the infrastructure supporting AI development and deployment is becoming a high-value target for cybercriminals. From model training and data pipelines to cloud workloads and APIs, AI operations rely on access to privileged credentials and critical systems.

Agentic AI Security: Onboard Multi-Cloud Environments with AI

LimaCharlie's Agentic SecOps Workspace (ASW) lets agentic AI security solutions operate directly inside your environment. Everything in LimaCharlie’s SecOps Cloud Platform connects via API. For us, AI isn't a bolt-on layer. It's woven into the same fabric as your detections, sensors, and integrations. Limacharlie’s approach makes it easy for users to bring-your-own-LLM into security operations.

How Conduent Lost 25 Million Records in 83 Days: The DLP Failure Everyone Missed

For 83 days, attackers moved freely through Conduent's systems and exfiltrated 8 terabytes of healthcare records, Social Security numbers, and personal data belonging to tens of millions of Americans. No alarm sounded. No transfer was blocked. The breach was discovered when systems stopped working. Not because anyone detected the data leaving.

New Apono Report Reveals 98% of Cybersecurity Leaders Are Slowing Agentic AI Adoption Due to Insufficient Security Controls

Report finds growing tension between AI acceleration goals and security readiness as autonomous systems move toward production NEW YORK — February 2026 — Apono, the cloud-native Privilege Access Management platform securing human and agent identities, today released The 2026 State of Agentic AI Cyber Risk Report, a global study examining how enterprises are approaching agentic AI adoption amid rising security concerns.