Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Design Security for Agentic AI

The AI said: Apologies. I panicked. In mid July 2025, Jason Lemkin, the founder behind SaaStr, watched an AI coding agent delete his production database. He had instructed it, in capital letters, not to make changes during a code freeze. The agent ignored the instruction, ran destructive commands against the live database, wiped out records for more than a thousand executives and companies, and then tried to cover its tracks. When Lemkin asked what happened, it fabricated test results.

Why Your Email Security Needs a Global Human Network to Close the Detection Gap

The biggest challenge in email security today isn’t just detecting a threat; it’s the speed of response across a global landscape. As we head into the second half of 2026, the stakes with speed have gotten higher. According to SQ Magazine, AI-generated phishing attempts are 68% harder to detect than they were just a year ago, and the average cost of an AI-powered breach has climbed to $5.72 million. Cybercriminals are using the same AI you are to bypass your filters.

Device Provisioning: What it is, How it Works, and Best Practices

Every device that connects to your network carries risk. It could be an employee laptop, a mobile phone, a kiosk, or even an IoT sensor. If that device is not properly verified or configured, it can quickly become an entry point for unauthorized access. That’s where things start to break. Most organizations don’t struggle with managing devices. They struggle with controlling how devices enter their environment in the first place.

Empowering data classification policy template guide

A data classification policy template gives you a repeatable way to define how your organization labels and protects data, so teams always know what’s sensitive, what’s not, and how to handle each type. Using a guided template (plus this article) removes the guesswork and lets you create a usable, audit‑ready policy much faster, similar to how your risk register guide simplifies risk management.

Why Most Incident Response Retainers Fail When It Matters Most

Many companies have an incident response retainer...but it doesn't actually make them risk ready. That's because too many retainers are built on outdated, hour-based "use it or lose it" models that don't actually reduce risk, improve resilience, or focus on outcomes. A modern retainer should drive preparedness, align with today's insurance realities, and actively lower exposure before an incident happens.

Shadow AI: The Silent Breach Already Inside Your Network

You locked down USB ports. You deployed web filtering. You trained your users on phishing. Then someone on the finance team started pasting the Q3 forecast into ChatGPT to cleanup a slide deck. That’s Shadow AI. It doesn’t need to crack your perimeter. It walks through the front door wearing your employee’s credentials. And unlike the threats you’ve spent years hardening against, you probably can’t see it on any dashboard you own right now.

Why More Data Isn't the Answer: The Case for Analyst-Enriched Intelligence

More threat data does not always mean better security. With 83% of SOC teams struggling with alert volume, organisations need context, prioritisation, and human-led intelligence. Discover why analyst-enriched CTI is becoming the smarter choice in 2026. For years, cyber threat intelligence has been sold as a volume game. More feeds, more indicators, more data points, more dashboards. Some platforms now promote processing hundreds of billions of data points daily. On paper, that sounds impressive.

Is your TPRM program an engine or an anchor?

In 2026, a slow assessment is a security risk. Every day spent in manual handoffs is a day of exposure for your organization. Join us at UpGuard Summit to see how our new Risk Automations engine transforms TPRM from a static checklist into an autonomous system. We will show you how to automate everything from vendor follow-ups to instant Jira routing for IT and Legal.