Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Context Engineering Is Security Engineering. RSA 2026 Made the Case.

Cisco polled its major enterprise customers before RSA 2026 and found something astounding. 85% of large enterprises are experimenting with AI agents. Only 5% have moved them into production. That's not a technology gap. The models work. The tools exist. The 80-point spread between experimentation and production is a governance gap. It's also a context gap.

Identity and Access Management: The foundation of security

Organizations put in place firewalls, antivirus, intrusion detection and prevention systems, but the bad guys still get in and wreak havoc – often through the front door. Teams need to put strict controls and governance around all identities with access to resources to defend against insider threats.

How to Prevent Phishing Emails by Reducing Human Risk

Organizations have traditionally treated phishing emails as a technology problem to be solved with spam filters and secure email gateways. But with phishing attacks on the rise, these tactics are no longer enough. KnowBe4’s 2025 Phishing By Industry Benchmarking Report found a 47% increase in phishing attacks that bypass Microsoft’s native defenses and secure email gateways. Why do they succeed? Because they exploit reliable human behavior.

Can an Attack Start Without Malware? 82% of Attacks Do

What looks like a simple coding task can quickly turn into a real cyberattack. In this demo, we show how a modern malware-free attack works step by step. It starts with something that feels completely normal: a job interview and a small coding assignment. No suspicious files. No obvious malware. But once the script is executed, everything changes. You’ll see how adversaries use trusted tools like Git, Notepad, and Python to gain access, establish command and control, and move inside an environment without being detected at first.

OT Cyber Resilience: Strategic Data Protection for IEC 62443 and NIS2 Compliance

OT Data Protection & Resilience is the practice of securing industrial control system data, such as PLC logic, HMI configurations, and historian archives, against loss or cyberattack, while ensuring fast recovery to maintain safety and production continuity. In modern industrial environments, the traditional concept of"security as a barrier" is no longer sufficient.

Acronis Cyber Protect for OT: OT Resilience, Legacy Recovery & OEM Integrations

The first time I helped support a control server recovery at a packaging facility, someone asked "How long will this take?" We did not have a good answer. The backup existed. The process to restore it safely in a live production environment did not. We had carried IT assumptions into an OT problem, and it cost the plant an entire shift. IT/OT convergence created a gap that most backup vendors were not built to close. Production systems need continuous uptime.

Why now is the time to invest in operational technology resilience

As cyberattacks on industrial systems escalate and supply chains grow more complex, cyber resilience for operational technology (OT) isn’t optional — it’s a business imperative. But with budgets under pressure and resources stretched thin, many manufacturers are left pondering a difficult question: How can we strengthen OT defenses without incurring downtime or breaking the bank? Virtual conference OT resilience.

How to Stub LLMs for AI Agent Security Testing and Governance

Note: The core architecture for this pattern was introduced by Isaac Hawley from Tigera. If you are building an AI agent that relies on tool calling, complex routing, or the Model Context Protocol (MCP), you’re not just building a chatbot anymore. You are building an autonomous system with access to your internal APIs. With that power comes a massive security and governance headache, and AI agent security testing is where most teams hit a wall.

Enforcing GitHub Repository Backups with Rubrik and GitHub Actions

Your CI pipeline enforces tests, security scans, and policy checks before code hits production. But your backups? Still running on a schedule, completely disconnected from your deployments. In this video, I'll walk you through how to use Rubrik's powerful APIs to build what I'm calling "Backup as Code": a GitHub Action that triggers an on-demand Rubrik snapshot of your GitHub repository every time code is merged into the main branch. We'll look at the action code, wire it up to a live repo, and watch the whole thing run end to end.

The AI Compliance Gap No One's Talking About (ISO, NIST, EU AI Act)

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.