Runtime Observability for LangChain and AutoGPT on Kubernetes

A platform team at a mid-size SaaS company runs three LangChain agents and one AutoGPT-derived planner on EKS. LangSmith is wired in. OpenTelemetry traces flow into their observability stack. Falco runs on every node. The setup is what most security teams would consider thorough. A pip dependency in one of the agents’ tool packages ships a malicious update.

Accelerating AI Discovery & Governance with the Falcon Platform

As AI adoption accelerates, so does shadow AI. Without a complete inventory of AI tools, agents, and activity, organizations are exposed to unapproved usage and data risk. In this video, you will see how the Falcon platform helps teams: Discover AI tools, models, and services in seconds Identify unapproved and risky usage See where AI is running and what it can access across endpoints Take action and enforce governance at scale.

Step-by-Step: How to Set Up a Homelab for Penetration Testing at Home

Cybersecurity is more important than ever. One of the key components of cybersecurity is penetration testing, which involves intentionally attempting to exploit a system to identify vulnerabilities. It is commonly known as ‘ethical hacking’. Penetration testing, or pen testing, requires strong hands-on skills. Setting up a homelab is an effective way to gain practical experience in a safe, controlled environment.

AI Inference Server Observability in Kubernetes: The Four Signals MLOps Tools Don't Capture

In August 2025, a vulnerability chain in NVIDIA Triton Inference Server was found that allowed an unauthenticated remote attacker to send a single crafted inference request, leak the name of an internal shared memory region, register that region for subsequent requests, gain read-write primitives into the Triton Python backend’s private memory, and achieve full remote code execution. The exploit chain ran entirely through Triton’s standard inference API. No anomalous traffic volume.

What Is the Best Free Antivirus Software to Protect Your Device?

A lot of times, people only worry about the best antivirus software before it’s too late; they may have accidentally downloaded or opened a file containing malware, causing file corruption, data loss, or even encrypting their device. There are many free antivirus software options, and the best antivirus products out there also offer additional features to help further protect your device.

Runtime Observability for MCP Servers: A Security Guide

Your security team sees an MCP tool server throw an error. Your APM dashboard shows a latency spike. Your logs capture the JSON-RPC request with its method name and parameters. But none of that tells you whether the tool just read a harmless config file or dumped credentials to an external IP. Traditional observability tools—the APM platforms, the OpenTelemetry traces, the centralized logging pipelines—track performance across your Model Context Protocol deployments.

Ep 40: What to expect when you are expecting an audit

On this episode of Masters of Data, we brought back GRC expert Cassandra Mooseburger to pull back the curtain on audits, and spoiler: it is far less scary than the IRS knocking on your door. We break down what actually separates a certification from an attestation from a report, how to run a prep process that does not send your engineering team running for the hills, and why the social capital you build across the business is just as important as the evidence you collect. If you have ever wondered how compliance work translates into closed deals and customer trust, this one connects those dots.

How a Hacker Used Standard AI to Dismantle a Government

The real shock is not a restricted model with scary branding, it is what standard public AI tools already make possible. A prolonged attack against government systems, tax records and voter data shows the threat comes from scale and persistence, not only from the newest frontier release.