Protecting Against Prompt Injection at the Data Layer, Not the Prompt Layer

Most teams try to fix prompt injection in the prompt itself. They add guardrails. They rewrite system messages. They stack more instructions on top of instructions. It feels productive. It is also fragile. Prompt injection is not just a prompt problem. It is a data problem. And if you treat it like a wording problem instead of a data control problem, you will keep playing defense. Let’s unpack why.

What Is a Deauth Attack? How Thieves Disable Security Cameras

Wi-Fi doorbells such as Ring and Nest have become a staple in home security. They promise peace of mind, showing you live footage of your doorway to deter thieves. Up until now this has been an effective security method, but doorbell footage has started going missing, and deauth devices are responsible.

Autonomous Service Desk: Possible NOW - Tanium Tech Talks #155

Meet the autonomous service desk - powered by live endpoint intelligence. See how ServiceNow NowAssist + Tanium deliver agentic triage, real‑time diagnostics, and guided remediation the moment an incident hits. Agentic triage kicks off instantly when an incident is created Real-time endpoint intelligence beats assumptions every time Confidence‑scored root cause analysis reduces investigation from hours to minutes The power of bounded autonomy (strong guardrails + powerful automation)

AI Data Governance Framework: A Step-by-Step Implementation Guide

AI data governance is the structured framework that ensures sensitive data remains protected when artificial intelligence systems are used. Traditional data governance focuses on data at rest. It manages databases, access controls, storage policies, and compliance documentation. AI fundamentally changes the environment, and hence, understanding AI data and privacy is crucial. When organizations use large language models, AI agents, or retrieval-based systems, data flows dynamically.

How 1Password secures agent architectures

Since 1Password began, we have built security into the places where work actually happens. Security is not treated as an overlay or a separate workflow, we build directly into the browser, command lines, developer tools, and IDEs, where decisions are made and actions take place. We believe that if you want to improve security outcomes, you build where the work happens, making the secure path the simplest one.

Speed, Stealth, and AI: The CrowdStrike 2026 Global Threat Report

It’s that time of year: The CrowdStrike 2026 Global Threat Report is live, and Adam and Cristian are here to break down the key findings. This year’s report spotlights adversaries’ heightened speed, their evolving use of AI, an increase in activity from China and North Korea, and the growth of supply chain attacks, zero-day exploitation, and cloud targeting. For new listeners, the annual Global Threat Report delivers an analysis of the modern threat landscape based on CrowdStrike's frontline observations and real-world threat intelligence from the previous year.

Endpoint AI Agents Don't Ask Permission. For Better or Worse, They Operate Like Employees

The next major security problem enterprises will face won’t originate in the cloud. It will emerge on endpoints, where agentic AI is already operating with autonomy, authority, and access to sensitive data.

The new AI access problem: Why machine identities now drive trust in banking

In my experience working inside banks, identity security can be like plumbing: when it’s working, no one wants to talk about it. When there’s an incident, an audit, or a regulator—suddenly everyone wants to understand how it works. Artificial intelligence (AI) brings the same “no one cares until everyone does” energy, but with face-melting velocity. Today, AI is embedded across large parts of the financial services industry, and it has been around for more than 25 years.