Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

EP 3 - Building Trust in AI Agents

In this episode of the Security Matters podcast, host David Puner is joined by Lavi Lazarovitz, Vice President of Cyber Research at CyberArk Labs, to explore the transformative impact of AI agents on cybersecurity and automation. They discuss real-world scenarios where AI agents monitor security logs, flag anomalies, and automate responses, highlighting both the opportunities and risks associated with these advanced technologies.

EP 3 - Building Trust in AI Agents

In this episode of the Security Matters podcast, host David Puner is joined by Lavi Lazarovitz, Vice President of Cyber Research at CyberArk Labs, to explore the transformative impact of AI agents on cybersecurity and automation. They discuss real-world scenarios where AI agents monitor security logs, flag anomalies, and automate responses, highlighting both the opportunities and risks associated with these advanced technologies.

Protect Your iOS Devices: Must-Have MDM Features for Businesses

Managing corporate iOS devices can be tricky. Your employees rely on them to access company data, communicate with clients, and handle sensitive business operations. But with this convenience comes risk—unauthorized access, data leaks, and cyber threats. A Mobile Device Management (MDM) solution helps businesses protect devices, enforce security policies, and prevent unauthorized access.

Unmanaged Endpoints: Your Security Blind Spot

It’s Monday morning and the coffee shop is full of telecommuters, sipping lattes and catching up on emails. The way organizations enable work has changed. With the rise of SaaS applications and cloud-first strategies, employees, contractors and third parties frequently access corporate assets from personal, unmanaged laptops.

The Rise of AI Agents-Collaborative Intelligence

2025 marks a pivotal moment. It’s the year AI agents transition from experimental technology to an essential business objective in enterprise operations that can enable growth and scale. These digital counterparts extend human intelligence, redefine workflows and create a new frontier in automation, cybersecurity and decision-making.

CyberArk Secure Cloud Access Free Trial - Step-by-Step Guide | CyberArk

Confused on how to get started with your CyberArk Secure Cloud Access free trial? No worries. We’ve created a video that walks you through the key steps to set up and explore CyberArk’s zero standing privilege access for multi-cloud environments. Secure your sensitive cloud resources while ensuring compliance with least privilege access.