Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Exposure as a Competency: How Agentic Exposure Management Can Differentiate High-Performing Teams

In today's fast-paced work environment, the factors that distinguish high-performing teams go well beyond technical skills and traditional leadership. Increasingly, organizations are recognizing "exposure" as a critical competency, one that shapes how teams interact with uncertainty, opportunity, and risk. While exposure has historically been viewed through a financial or risk management lens, it is now emerging as a core driver of organizational agility, innovation, and resilience.

Trusted AI Video Platforms for Safer Content Creation

AI-generated video content is growing fast, and so are the risks that come with it. Statista data shows a sharp rise in AI incidents tied to content generation, with deepfakes and rights violations among the most documented concerns. For creators, brands, and marketers, choosing the right AI video platform means thinking beyond output quality.

Lightboard series - Secure your AI-powered applications with Cloudflare

Humair from Cloudflare walks through the details of how Cloudflare's AI Security for Apps secures AI-powered applications. Learn how Cloudflare can discover AI/LLM endpoints and detect and mitigate AI-specific threats like PII exposure, unsafe/toxic content, prompt injection and jailbreak. Learn more.

Top AI cybersecurity companies in 2026

AI cybersecurity companies in 2026 fall into two categories: platforms using AI to automate detection, investigation, and response, and platforms built to secure the AI systems organizations are now deploying. With this grouping into ‘AI for Security’ and ‘Security for AI’, this article covers the breadth and depth of AI cyber security companies.

How AI is changing IGA

It’s no surprise that AI is being integrated into identity governance and administration (IGA) platforms. Automation promises productivity boosts, risk detection can be in real-time and cloud environments allow greater scalability. What’s more, the pace of AI means IGA is quickly moving beyond slower, more rigid, rule-based approaches.

Introducing our open source AI-native SAST

Static application security testing (SAST) tools help developers quickly catch potential vulnerabilities as they code. However, these tools rely on inflexible rules that often generate a high number of false positives, reducing trust in their accuracy and slowing adoption. To help developers access context-aware vulnerability detection, we’ve released an open source AI-native SAST solution. This tool scans code changes incrementally and surfaces security issues in real time.

George Kurtz + Dan Ives on AI Agents Bypassing Security Policies

One AI agent didn’t have permission to fix an issue… so it asked another agent with access to do it. Another? It rewrote the security policy to achieve its goal. This isn’t theory. This is happening. George_Kurtz sat down with DivesTech to discuss why AI needs guardrails.

Auditing Agentic Behavior for FedRAMP Compliance | Teleport

AI agents are tireless, highly capable, eager to please, but difficult to manage. George Chamales (CriticalSec) and Josh Rector (Ace of Cloud) unpack the identity and access challenges posed by agentic AI. How do you verify it was the right agent, doing the right action, approved by the right person? How do we bound, constrain, govern agentic behavior? Ultimately, the same frameworks built for human identity and access should be applied to agents.

The Mythos Moment: Why the Future of Cybersecurity Is Software Trust

Anthropic’s Mythos announcement is not just another cybersecurity headline. It is a signal. AI is transforming software faster than security teams can adapt. The organizations that win won’t be the ones that simply find more flaws. They’ll be the ones that can prove their software can be trusted. A signal that software risk has entered a new era; one where AI can accelerate both the creation of software and the discovery of its weaknesses faster than human teams can respond.