Why Financial Firms are Outgrowing Traditional Email Security

In the financial services industry, a "security incident" is rarely just an IT ticket. It is a regulatory event. Whether you are a bank, a global investment firm, or a fintech startup, your email environment is the most targeted entry point for attackers and the most common exit point for sensitive data.

Why Your AI Workflow Should Never Depend on a Single Model

Network engineers have long understood redundancy. Redundant power, redundant links, redundant clusters. The reasoning is simple: any single component that can fail, will. But AI introduces a category of failure that most infrastructure teams have not yet built defenses against. Unlike hardware, AI models can become unavailable for reasons entirely outside your organization's control.

Scammers Abuse Calendar Invites to Plant Phony Subscription Notices

Malwarebytes warns that a phishing campaign is using Google Calendar invites to send phony renewal notices for Malwarebytes subscriptions. The calendar invites contain a phone number that will connect the user with a scammer. “The amounts in these fake invites are large and attention-grabbing, usually several hundred dollars for multiple years of service,” Malwarebytes says.

AI Agent Data Leakage: Hidden Risks and How to Prevent Them

AI or artificial intelligence has significantly altered how we work. From customer support bots to internal copilots, they help teams move faster and smarter. But there is a growing concern that many companies are still not ready for. It is data leakage in AI. When an AI agent accidentally or unknowingly shares private information with the wrong person or another system, it is called a data leak. When AI systems handle sensitive data, even a small mistake can expose private information.

Episode 11 - The AI Maturity Journey: Data, Agents, and the Shift from Craft to Art

Richard Bejtlich talks with Vijit Nair, VP of Product at Corelight, about the evolving "AI Maturity Journey" for modern security teams. Vijit outlines a three-level spectrum of AI adoption, moving from basic human-driven assistance to automated swarms of agents, and eventually toward fully autonomous systems. They discuss why high-quality, unopinionated data remains the essential foundation for building trust in AI and how technologies like the Model Context Protocol (MCP) are turning human language into the primary interface for tool integration.

The AI SOC explained: Intelligent security for modern threats

The SOC was originally designed for a threat landscape that no longer exists. Today, the sheer number and speed of modern threats make it tough for even the best analysts to keep up. Manually sorting through huge amounts of data, dealing with alert fatigue, and relying on fixed rules make it harder to understand the full story behind each threat. The AI SOC addresses this problem, but not in the way most vendors describe. It’s not just a simple product or feature.

Why builders win with Andrew Cook

Join us for this week's Defender Fridays as we explore the builder mindset in cybersecurity with Andrew Cook, CTO at Recon InfoSec. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.