Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Automation Anywhere + Protecto: How Leaders Secure GenAI Data

GenAI data security is now a critical concern for every enterprise. In this insightful episode of AI On The Edge, Dinesh Chandrasekhar, Founder and Chief Analyst at Stratola, sits down with Amar Kanagaraj (CEO, Protecto.ai) and Steve Shah (SVP Products, Automation Anywhere) to explore the future of data privacy, agentic automation, and securing LLMs in enterprise settings. Learn how two of the industry's top innovators are setting AI guardrails, preventing sensitive data leaks, and embedding privacy-by-design into large-scale automation.

Securing AI Applications in the Cloud: Shadow AI, RAG & Real Risks | Mend.io

What does it take to secure AI-based applications in the cloud? In this episode, host Ashish Rajan sits down with Bar-el Tayouri, Head of Mend AI at Mend.io, to dive deep into the evolving world of AI security. From uncovering the hidden dangers of shadow AI to understanding the layers of an AI Bill of Materials (AIBOM), Bar-el breaks down the complexities of securing AI-driven systems. Learn about the risks of malicious models, the importance of red teaming, and how to balance innovation with security in a dynamic AI landscape. What is an AIBOM and why it matters The stages of AI adoption.

Why Security Can Be Stricter: A Zero Trust Approach to AppSec with AI | Mend.io

Is AI making application security easier or harder? We spoke to Amit Chita, Field CTO at Mend.io, the rise of AI agents in the Software Development Lifecycle (SDLC) presents a unique opportunity for security teams to be stricter than ever before. As developers increasingly use AI agents and integrate LLMs into applications, the attack surface is evolving in ways traditional security can't handle. The only way forward is a Zero Trust approach to your own AI models. Join Ashish Rajan and Amit Chita as they discuss the new threats introduced by AI and how to build a resilient security program for this new era.

Cyber Resilience In A Digital World - Special Edition - Tanium Tech Talk

In this special edition Tech Talk you will meet a Tanium expert working in the US Federal space as he demonstrates Tanium's Autonomous Endpoint Management experience and how it helps security teams be proactive in securing their environment. Real-time data with actionable insights at speed and scale Extensible and adaptable platform, acting as a force multiplier Advanced intelligence capabilities with generative and agentic AI Alerting on environment security drift “Left of bang” – fixing problems before they are exploited by adversaries.

GITEX Insights: Fighting Next-Gen Attacks with Teramind #productivity #business #security

Face and voice biometrics aren't enough to stop deepfakes! At, our VP of Marketing, Leeron Walter, explains how we're fighting back. Our tech goes beyond the surface, using behavioral analytics to spot a deepfake in action—giving managers "God Mode" visibility to protect their business FAST!

Read receipt | #CybersecurityAwarenessMonth

We often acknowledge email read receipts from unknown senders just to keep our inbox clean. But that can get us into trouble. Watch episode 7 of the Little lessons in cybersecurity series as we walk you through the consequences of the same. Head to the link here for some more interesting takes on casual habits that invite cyberthreats.