Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The New Guy (a.k.a. Agentic AI)

AI agents have already caused unintended record updates, broken workflows, and pushed flawed logic into production systems. These misfires often go unnoticed until forecasts stall, pipelines break, or sensitive data is affected. These aren’t hallucinations. They’re executed actions with real consequences. At Rubrik, we’ve spent years helping enterprises recover from ransomware, insider threats, and operational errors. The pattern is always the same: Damage happens fast. The root cause is murky. And visibility is fragmented.

The Unopinionated AI Advantage

Most AI security solutions lock you into their way of doing things. The result? You can't differentiate, you can't innovate, and you can't build the solutions your organization actually needs. LimaCharlie's approach to AI is fundamentally different. Instead of forcing you into rigid workflows, we give you the building blocks to create exactly what your environment demands. Why this matters: The result: Security teams that build custom AI solutions perfectly tailored to their environment, their workflows, and their unique challenges.

Automate Repetitive Work With No-Code AI Agent Builder

Egnyte AI agents are smart, task-specific AI assistants built to automate repetitive, time-consuming work, so that your team can stay focused on high-impact and strategic tasks. From reviewing documents to researching topics or translating content, these agents act like always-on digital coworkers who execute task-specific instructions while securely leveraging information contained in your private documents and on the web.

How Effective Is 'Shift-Left Security' for Protecting APIs?

Your API rollout is on track. Code’s tested, endpoints documented. John from security asks for the third revision of your vulnerability assessment, and your release date slips another two weeks. Sounds familiar? You are not alone. According to a recent report by Salt Security, 99% companies reported at least one API security incident in 2024-25. And here’s the kicker: 95% API attacks come from authenticated sessions, proving that tokens alone don’t cut it anymore.

Securing LLM Superpowers: Navigating the Wild West of MCP

The Model Context Protocol (MCP) is a standardized framework that enables large language models (LLMs) to interact with external tools, APIs, and data sources. While MCP offers powerful integration capabilities across software development, data analysis, automation, and security operations, it also introduces serious security risks. This post provides a technical overview of how MCP works, its architecture, and real-world use cases.

Introducing the Riscosity AI Firewall

AI is moving through enterprises faster than security teams can track. Over the past year, AI privacy incidents have risen 56%, and most of those stem from tools security never knew were in use. 84% of SaaS tools are purchased outside IT, and 62% of CISOs say fewer than a quarter of AI tools in use have been approved through procurement. That means sensitive, regulated, or confidential data is often flowing to AI services invisibly, sometimes across borders, without governance or guardrails.

Your AI Could Hack You #cybersecuritytips

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Preventing the Preventable: Tackling Internal Cloud Security Risks

Once the frontier of innovation, the cloud has become the battleground of operational discipline. As cloud complexity rises, the most common and costly security threats aren't advanced nation-state attacks. They're internal errors. According to the CSA's Top Threats to Cloud Computing Deep Dive 2025, more than half of reported cloud breaches stemmed from preventable issues like misconfigurations, IAM failures, and operational oversights. These are self-inflicted and are happening with alarming frequency.