Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI Agent Security: Verifying Workflows with AI Firewalls & Guardrails

AI Agent Security: Verifying Workflows with AI Firewalls & Guardrails A10 security experts Jamison Utter, Madhav Aggarwal, and Diptanshu Purwar discuss the importance of context-aware security for AI agents. They emphasize that when automating workflows with AI, it's crucial to ensure that the context fed to the agents and their subsequent actions are verifiable and in line with existing company policies.

Securing AI Part 3: AI Agents - Use Cases and Security

A10 security experts, Jamison Utter, Diptanshu Purwar, and Madhav Aggarwal explore the topic of securing AI agents, which they define as systems that perceive, decide, and act. They discuss: Defining AI Agents: Explaining that agents are not just chatbots, but are the "hands of AI" that can execute actions, call APIs, and automate complex workflows. The Challenge of Security: Discussing how security for AI agents goes beyond traditional model security and includes protecting against prompt injection, malicious instructions, and preventing unsafe actions or data leakage. The Importance of Context and Data.

EP 16 - Sensing the signals: The hidden risks in digital supply chains

Modern digital supply chains are increasingly complex and vulnerable. Professor Levi, a leading expert in cyber resilience and complex systems, explains why traditional prevention isn’t enough and how attackers exploit unseen pathways to infiltrate even the most secure enterprises. The conversation covers the critical need for transparency, continuous monitoring, and rapid detection and recovery in an era where software is built from countless unknown components.

Enhancing the Git Restore Process with Azure DevOps and GitProtect

In this video, we will walk you through the new Git Restore process in GitProtect, highlighting its compatibility with platforms like Azure DevOps, GitHub, GitLab, and Bitbucket. We will explain how we can enhance the restore efficiency by using additional credentials and access tokens, allowing for more API requests. A key feature of Azure DevOps is the ability to restore repositories from the same backup set, ensuring consistency. I encourage you to add these additional credentials to GitProtect for a smoother experience.

Hypervisor Encryption: Shutting Down Recovery

Ransomware isn’t just about locking files anymore; attackers like Scattered Spider can take entire backup systems offline. Joe Hladik explains how hypervisor encryption lets them access virtualization interfaces and encrypt entire ESXi clusters, leaving organizations with no way to recover. Joe lays out why this tactic is so dangerous: it turns a backup, your last line of defense, into another point of failure.