Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

RSA and DC Dispatches: Agentic AI Security Is the Story, Government Policy Needs to Catch Up

Fresh off two weeks of back-to-back meetings in Washington, DC, and on the floor/in the wings of the RSA Conference, one theme echoed through nearly every conversation I had with senior government officials and public policy leaders from global technology companies: agentic AI security is the defining emerging security challenge of this moment — and policy is not keeping pace.

Our ongoing commitment to privacy for the 1.1.1.1 public DNS resolver

Exactly 8 years ago today, we launched the 1.1.1.1 public DNS resolver, with the intention to build the world’s fastest resolver — and the most private one. We knew that trust is everything for a service that handles the "phonebook of the Internet." That’s why, at launch, we made a unique commitment to publicly confirm that we are doing what we said we would do with personal data.

What is an AI-BOM? Why Static Manifests Fall Short

Your AI-BOM shows every model, tool, and data source you deployed. But when your SOC investigates an alert about unusual agent behavior, that inventory tells them nothing about what actually happened at runtime. Static AI-BOMs document what you intended to run. Attackers exploit what your AI workloads actually do in production: which APIs they call, what data they touch, and how they use approved tools in unapproved ways.

Detecting Rogue AI Agents: Tool Misuse and API Abuse at Runtime

When your CNAPP flags a suspicious dependency in an AI agent container, your WAF logs an unusual API spike, and your SIEM shows a burst of cloud storage calls—are those three separate incidents or one rogue agent attack? Most security teams treat them as three tickets in three queues, investigated by three people who may never connect the dots. By the time someone pieces together that a single compromised agent drove all three signals, the attacker has already moved laterally and exfiltrated data.

Best data access governance (DAG) tools in 2026

Compare the top data access governance tools for 2026. Learn what to look for, and which platforms fit mid-market security teams. TL;DR: Data access governance tools map effective permissions to sensitive data, surface overexposed entitlements, and operationalize access reviews across hybrid environments. Without them, organizations cannot answer who can reach regulated data, enforce least privilege, or complete certifications without manual effort.

The Real Competitive Advantage in the Age of Frontier AI

The recent leak related to Claude Mythos has offered a rare and revealing look inside the real capabilities of frontier AI models. The details of the leak underscore a reality that cybersecurity leaders need to understand clearly: Advances in model capability do not automatically translate into advances in cybersecurity, nor do they translate into better security outcomes without the right platform to apply them.

Why This AWS Move Matters

Over the past year, I have spent a lot of time with security leaders who are trying to navigate the same tension. They know their operations need to move faster. They know the volume, speed, and complexity of what lands in the SOC are not going to ease up. But they are also trying to make smart decisions in environments where trust matters, governance matters, and the cost of getting it wrong is real.

Why Affordable Web Hosting Providers Are Enhancing Built-In Security Features

Affordable web hosting used to mean basic service. The assumption was straightforward. Paying less meant fewer protections and more site security responsibilities. That view is growing inaccurate. Even cheap hosting companies realize that tiny websites, startups, bloggers, and rising online retailers need protection.

How Medical Records Shape Your VA Disability Claim And How to Use Them to Your Advantage

Medical records aren't bureaucratic filler. They're the entire case. Every rating decision, every approval, every frustrating denial, it all traces back to documentation. If you're filing a VA disability claim and your records aren't telling the right story, you're already fighting uphill. Veterans who treat VA disability claim medical records as a strategic tool, not just a checkbox, consistently see better claim outcomes. The numbers back this up.

SOC 2 Type 1 vs Type 2: What Security Leaders Need to Know About Audit Readiness

Security and compliance teams don't spend much time debating definitions. They focus on whether controls actually work in practice. That's why understanding the difference between SOC 2 Type 1 and Type 2 matters. The choice affects how controls are designed, how they are tested, and how customers evaluate your security posture. At a high level, Type 1 evaluates whether controls are properly designed at a specific point in time. Type 2 evaluates whether those controls operate effectively over a defined period, typically three to twelve months.