Ep 3. Palo Alto Networks Research and AI Generated Attacks

AI isn’t just changing cyber defense—it’s transforming how attacks happen. In this episode, Tova Dvorin sits down with Tomer Bar and Shelly Zucker from SafeBreach to explore how AI-powered threats are reshaping the battlefield. Hear about: If you’re in cybersecurity, risk, or IT, this is your must-listen guide to preparing for the AI-enabled threat era.

Keeper 101: KeeperAI Threat Detection for Privileged Sessions

In today's threat landscape, a single compromised privileged session can mean the difference between routine administration and a catastrophic breach. Organizations currently have no automated way to monitor user session recordings for security threats. Teams are forced to manually sift through enormous volumes of session data – including keystrokes, commands, and screenshots, which is slow, inefficient and error-prone.

Why Acronis validation for Ignition is critical for OT resilience

Technology failures are inevitable in operational technology (OT) environments. While prevention is essential, the ability to recover quickly is what ultimately protects operations. When OT systems fail, production stops and the costs of reduced production, missed deliveries and possible regulatory problems immediately begin to accumulate. Manufacturers, utilities and industrial operators need to be able to get systems up and running again as rapidly as possible after an incident.

A Deep Dive Into ggshield, The GitGuardian CLI

In this in-depth walkthrough, we will show you how to turn ggshield, the GitGuardian CLI, into a practical guardrail for keeping secrets out of your code and CI pipelines. You’ll see exactly how to install and authenticate ggshield, then use it to scan repositories, local paths, archives, Docker images, PyPI packages, and CI environments for hardcoded credentials. We’ll also walk through configuring Git hooks with ggshield install.

Automating SLAs in Risk-Based Vulnerability Management: Turning Deadlines into Results

Many organizations set remediation SLAs, but static severity-based timelines and manual tracking prevent them from meeting those deadlines in a way that meaningfully reduces risk. This article outlines how automated, risk-based SLAs connect timelines to real exploitability, exposure, and asset value, turning deadlines into reliable, measurable outcomes. Key takeaways from this article.

Delivering Intelligent IT Foundations for Safe AI Usage

JumpCloud CTO Greg Keller explains why traditional, fragmented IT tools create a critical Zero Trust gap for AI agents, bots, and non-human identities (NHIs). The biggest inhibitor to innovation isn't restrictive policy—it's the internal lack of a unified identity foundation. Learn how to address "identity sprawl" and transform IT operations to deliver auditable trust, extend Zero Trust enforcement to machine-to-machine interactions, and build the Intelligent IT foundations required for safe, accelerated AI adoption.

Hackers hijack Google Smart Home #aisecurity #mcpserver

Building AI agents that can think, act, and adapt securely isn't easy. From prompt design to deployment, every stage brings new challenges and new risks. In this session, Bar-El Tayouri, Head of Mend AI at Mend.io, and Yehoshua (Shuki) Cohen, VP of Data and AI Evangelist at AI21 Labs, shared practical strategies for designing and defending agentic systems that actually deliver. Key topics covered: Originally recorded: October 29, 2024.