Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How AI Agents Impact SOC 2 Trust Services Criteria

SOC 2, which stands for Systems and Organization Controls 2, is a framework developed by the American Institute of Certified Public Accountants (AICPA) to evaluate controls for security, availability, processing integrity, confidentiality, and privacy. As agentic AI systems begin acting autonomously, AI and SOC 2 compliance become closely linked. These systems drive new efficiencies, but also introduce new risks.

How Do CNAPP Platforms Help Prevent Misconfigurations Across Multi-Cloud Environments?

Cloud misconfigurations rank among the leading causes of cloud security incidents across AWS, Azure, and Google Cloud Platform. CNAPP platforms deliver cloud security posture management (CSPM) with continuous detecting misconfigurations in multi-cloud environments, automated remediation for cloud misconfiguration, and unified policy enforcement.

New Apono Report Reveals 98% of Cybersecurity Leaders Are Slowing Agentic AI Adoption Due to Insufficient Security Controls

Report finds growing tension between AI acceleration goals and security readiness as autonomous systems move toward production NEW YORK — February 2026 — Apono, the cloud-native Privilege Access Management platform securing human and agent identities, today released The 2026 State of Agentic AI Cyber Risk Report, a global study examining how enterprises are approaching agentic AI adoption amid rising security concerns.

Identity is the foundation of effective visibility and control. #identitysecurity #netwrix

Identity is the foundation of effective visibility and control. In Voices of Cyber Asia, we explore how identity-driven insights improve access management and support compliance. Join Netwrix at the Gartner Security & Risk Management Summit in Sydney. Visit our booth to see how identity-first visibility connects data and identity security to strengthen data security, reduce risk, and simplify compliance.

Falcon for IT: Built-In Response Playbooks for Enterprise-Scale Automation

Adversaries are accelerating their tradecraft, exploiting configuration drift and operational blind spots before teams can respond. Falcon for IT transforms the CrowdStrike Falcon Platform into the unified operational engine of the enterprise, turning visibility into governed, enterprise-scale action.

How Conduent Lost 25 Million Records in 83 Days: The DLP Failure Everyone Missed

For 83 days, attackers moved freely through Conduent's systems and exfiltrated 8 terabytes of healthcare records, Social Security numbers, and personal data belonging to tens of millions of Americans. No alarm sounded. No transfer was blocked. The breach was discovered when systems stopped working. Not because anyone detected the data leaving.

Agentic AI Security: Onboard Multi-Cloud Environments with AI

LimaCharlie's Agentic SecOps Workspace (ASW) lets agentic AI security solutions operate directly inside your environment. Everything in LimaCharlie’s SecOps Cloud Platform connects via API. For us, AI isn't a bolt-on layer. It's woven into the same fabric as your detections, sensors, and integrations. Limacharlie’s approach makes it easy for users to bring-your-own-LLM into security operations.

Securing Human and Non-Human Identities from AI Security Risks

As organizations rely more on Artificial Intelligence (AI) to power critical operations, the infrastructure supporting AI development and deployment is becoming a high-value target for cybercriminals. From model training and data pipelines to cloud workloads and APIs, AI operations rely on access to privileged credentials and critical systems.