Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Secure Homegrown AI Agents with CrowdStrike Falcon AIDR and NVIDIA NeMo Guardrails

The biggest challenge for developers building AI applications is no longer the translation of user intent into action, but rather limiting its scope to stay within stated business goals and prevent abuse. This challenge has moved from theoretical to mission-critical as AI agents transition from experimental projects to mainstream business tools, where a single compromised agent can expose customer data, execute unauthorized transactions, or violate compliance requirements across thousands of interactions.

Apono Launches Agent Privilege Guard, Bringing Runtime Privilege Guardrails to Enterprise AI Agents

NEW YORK – March 18, 2026 – Apono, the agentic-forward cloud-native Privileged Access Management platform, today announced the launch of Agent Privilege Guard, a new product that gives enterprises the ability to deploy AI agents at full velocity without creating security risks they cannot control.

AI Is Building Your Attack Surface. Are You Testing It?

The market is flooded with claims. One vendor tops a leaderboard. Another raises nine figures on a pitch deck. Meanwhile, your developers shipped three AI-generated services before lunch. Here's the conversation the industry isn't having, and the one we've been building toward for years. There's a version of this conversation happening inside every Security team right now. Someone demos an AI coding assistant. The speed is undeniable and the team is in awe. Still cautious, sometimes skeptical.

Thinking in pipelines for AI agents with David Burkett

Join us for this session of Defender Fridays as we explore thinking in agent pipelines with David Burkett, Cloud Security Researcher at Corelight and Founder of Magonia Research. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

Thinking long-term growth in an AI-dominated industry with Stel Valavanis of onShore Networks [302]

Today we're speaking with Stel Valavanis, Founder and Chairman at onShore Networks and Co-Founder at The Gallery Building, about sustaining a security company over three decades of industry changes. We also dive into investing in start ups and how founders can think long term about governance and growth.

Camille Stewart Gloster on how AI systems can help you wade through log data and get more done

AI and machine learning are already being used in cybersecurity to help reduce the "noise of all the indicators" that security teams receive. These systems can serve as a "first line of defense" by setting up potential response actions. However, organizations need to ensure they keep human analysts in the loop because contextual knowledge and human judgment remain critical. Data Security Decoded is available on our YouTube channel!

Why More AI Doesn't Guarantee Better Vulnerability Management Outcomes

AI is everywhere in vulnerability management right now. Technology vendors in all areas are adding new features and making bold claims about revolutionary capabilities. But here's the reality, especially for vulnerability and exposure management: more AI doesn't automatically mean less risk. The gap between AI's promise and its practical impact in enterprise vulnerability management is wider than most organizations realize.

Microsoft Purview Brings AI Readiness, Data Security, and Continuous Compliance

Microsoft Purview is a powerful platform, but power without expertise can lead to underutilization, misconfiguration, and missed opportunities. Across industries, organizations are grappling with a common set of challenges: The stakes are high. A single compliance incident can cost organizations between $100,000 and $5 million in fines and penalties. And that figure doesn't account for the reputational damage, operational disruption, and remediation costs that follow.