Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Inside CyberArk's Journey: What It Really Takes to Run RAG Agents in Production

As part of the DevSecNext AI series, Jit hosted Michael Balber—Principal Software Architect at CyberArk—for an in-depth session on how his team built and evaluated real Retrieval-Augmented Generation (RAG) agents in production. Unlike abstract discussions about LLMs and assistants, Michael shared a grounded view of what it takes to deploy agents that don’t just talk—they act.

Hi My Name Is...the Not So Shady Side of Long-Term Memory in AI

In our last post, we explored how short-term memory enables agentic AI to hold a conversation that doesn’t reset after every message. That form of memory is all about flow—preserving context, user intent, and logic within a single session, even as interactions stretch across multiple turns. The longer the session, the more memory is required to maintain continuity. But not all memory needs to be verbose. Long-term memory serves a different purpose: persistence across sessions.

How To Run a Successful Phishing Campaign Test

Phishing attacks are growing more difficult to identify, which is why your organization must prepare by conducting phishing tests. Watch this video to learn how to prepare your employees, design realistic phishing simulations and strengthen your organization’s defense against phishing attempts.

Top 5 HIPAA Compliance Software

If you're a healthcare organization, you need to be aware of HIPAA compliance software. It helps ensure that companies follow HIPAA (Health Insurance Portability and Accountability Act) to protect patients' sensitive data, avoid fines and reputational damage, and costly litigation with a conventional and practical approach to compliance.

Smart City Security: Protecting Critical Infrastructure with IoT

The transformation of urban environments through Internet of Things (IoT) technology has created unprecedented opportunities for improving city services, enhancing quality of life, and optimizing resource utilization. This process of digital transformation modernizes and integrates city infrastructures, improving efficiency but also introducing new cybersecurity challenges.