Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Real-Time AI Security: Securing Autonomous Agents in 2026

Is your security stack ready for the agentic revolution? As we move into 2026, Real-Time AI Security has become the new frontier for enterprise protection. In this episode of AI on the Edge, Amar (CEO of Protecto) sits down with security veteran and investor Anand Tangiraja to discuss why traditional "shift left" strategies and legacy tools are failing in the face of autonomous agents.

I Tried 5 Prompt Injection Attacks (Here's What Happened)

In this video, we explore the growing security risk of prompt injection in large language model (LLM) applications. As AI becomes embedded in more products, new vulnerabilities emerge, especially through natural language manipulation. We break down how LLMs work, the importance of system prompts, and demonstrate five real-world prompt injection techniques used to extract sensitive information or bypass safeguards. You’ll see live examples using different models and learn why newer models are more resilient, but still not immune.

How GitGuardian and CyberArk MCP Servers Cut Secrets & Vault Sprawl with AI Automation

Watch the teams of GitGuardian and CyberArk for a demo-first session on how MCP (Model Context Protocol) servers can help you tame secrets sprawl and vault sprawl by letting developers use AI to trigger the right actions, with far less cognitive load! What you’ll learn.

How to Check Your iPhone for Viruses and Malware

Your iPhone is one of the most secure devices available, but no phone is completely immune to security threats. While Apple's strict security measures make traditional viruses rare, iPhones can still face risks from phishing attacks, malicious websites, compromised Wi-Fi networks, and suspicious apps. In this video, discover how to spot the warning signs that your iPhone might be infected, including: • Unfamiliar apps you didn't install • Unexpected spikes in data usage • Rapid battery drain • Slower performance than usual • Excessive pop-ups and fake system alerts.

CISOs - Eradicating Security questionnaires | TrustCloud

CISOs struggle with security questionnaires. Make security reviews the quickest part of closing a deal with TrustCloud. TrustCloud offers a Trust portal and AI to complete security questionnaires, rolled into one. Don’t let security reviews slow down sales (or take over your life). TrustShare’s secure, public-facing portal invites prospects to view compliance reports and complete security reviews on their own. If there’s a questionnaire, TrustShare pre-fills up to 85%, using information from prior questionnaires and artifacts in your security program.

CISOs - Transforming risk assessments | TrustCloud

CISOs struggle with risk assessment. Reduce risk and financial liability with TrustCloud. Take your risk register from manual spreadsheets to programmatic, predictive risk assessments. Monitor and forecast your risks in real time, enable IT risk quantification to prove financial impact to the board, and prevent risk instead of managing it.