Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Build a security investigation agent that responds to detections (agent-as-code)

In this video we demonstrate how to build a custom security investigation agent using LimaCharlie’s agentic SecOps platform. Using the AI Agent Builder and a plain-language prompt, we create an investigation bot called SSH Bot that runs automatically whenever sensitive SSH credential material is accessed on an endpoint. When the detection fires, the agent: The agent is saved as code, allowing it to be triggered by detections, run asynchronously across infrastructure, or executed on a schedule.

Scaling Your Security Program to Match the Speed of Mythos

Anthropic’s Project Glasswing and the Claude Mythos model represents a fundamental change in the physics of cyber defense. With the gap between patch releases and weaponized exploits shrinking to hours, traditional manual security triage is now obsolete. Organizations must adopt AI-driven automated remediation.

Can AI Replace a QSA?

The question circling boardrooms and compliance departments in 2026 is no longer hypothetical: Can AI replace a QSA? After nearly two decades guiding organizations through PCI DSS audits, gap assessments, and remediation programs, the answer is clear — No, AI cannot replace a Qualified Security Assessor in 2026. But it is fundamentally reshaping what being a QSA means, and professionals who ignore that shift do so at their own peril.

CVE-2026-21643: Pre-Authentication SQL Injection in Endpoint Management Server Leading to Remote Code Execution

CVE-2026-21643 is a critical SQL injection vulnerability in the administrative web interface of FortiClient Endpoint Management Server version 7.4.4. It allows unauthenticated remote attackers to execute arbitrary SQL commands through specially crafted HTTP requests, primarily by injecting malicious payloads via the Site HTTP header.

Introducing PCI ASV Scanning: Continuous attack surface compliance in partnership with Clone Systems

Maintaining a secure external attack surface is no longer just about finding vulnerabilities; it’s about proving your resilience to partners, auditors, and regulatory bodies. Today, we are excited to announce Detectify’s PCI ASV Scanning, delivered in partnership with Clone Systems.

Optical Character Recognition (OCR) Explained

Most corporate work still revolves around documents. Invoices, contracts, onboarding forms, compliance records, and reports are used across teams every day. But a large portion of this information still exists as scanned files, PDFs, or even physical paper. And that creates a problem. You can store documents, but you cannot easily search, analyze, or automate them when the data is locked inside images or scanned files. That is where Optical Character Recognition (OCR) can help.

The Hidden Costs of Atlassian Cloud Migration: User Bloat, Sensitive Data, and How to Address Both

The single most common mistake in Atlassian cloud migration projects is treating migration as a straightforward technical exercise, exporting configurations, importing data, and switching environments. In practice, an unprepared migration transfers not just your data, but years of accumulated debt: inactive accounts, overstated license needs, and sensitive information that was never designed to exist in a shared cloud environment.

5 Themes From a Candid Discussion

The Eskenzi IT Security Analyst & CISO Forum wasn’t a typical security event. This forum was a gathering of CISOs, analysts, and security leaders speaking candidly under Chatham House Rule about what’s actually breaking, what’s working, and where things are heading. Here are 5 key themes that came through loud and clear. None of them were surprising. But together, they paint a pretty stark picture of where security and AI are right now.