Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing Homegrown Agents in Runtime: The Value of Zenity + Microsoft Foundry

How the integration works: Zenity integrates with the Foundry control plane to inspect agent behavior and enforce security policies inline at runtime. Over the past year, Microsoft Foundry has emerged as a cornerstone for enterprises building and deploying homegrown agents at scale. Organizations across industries are using Foundry to move beyond experimentation and into production, creating AI agents that can reason, invoke tools, access enterprise data, and automate complex workflows.

Why Marketing Teams Are Rethinking the Way Customer Personas Are Built

How well do marketing teams really understand their customers today? For years, businesses have relied on buyer personas (detailed profiles representing their ideal customers) to guide messaging, campaigns, and product positioning. And the concept has clearly gained traction: studies show that 44% of marketers already use buyer personas, while another 29% plan to adopt them soon.

How Degenerative AI Exposes Deepfakes

Detection tools now use so called degenerative AI to analyse every frame of a video, looking for traces of the models and methods used to generate or edit it. Generative AI produces the fake, degenerative AI hunts for subtle artefacts in pixels, giving investigators a way to flag manipulated content at scale. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

Agent Skills are the New Packages of AI: It's Time to Manage Them Securely

Let’s talk about agent skills. As the AI agent ecosystem matures, we’re seeing a major shift in how users equip agents to run automated workflows. While robust protocols such as MCP exist to handle complex system integrations and authentication, skills have emerged as the go-to, low-friction way to shape an agent’s day-to-day behavior. Skills are extremely easy to adopt. In many cases, they are simply lightweight files that orchestrate scripts and commands.

See through document fraud with Document AI Enhanced Fraud Detection

On April 2, 1796, a full house packed the Drury Lane Theatre in London, eager to witness the first showing of a newly discovered Shakespeare play. The problem was that William Henry Ireland wrote the play, Vortigern, and the entire production was a hoax. Although there was some controversy before opening day, several experts reviewed the manuscript and supporting documents and confirmed that the play was a long-lost Shakespeare original.

Code Review That Learns: Inside Cato R&D's Self-Evolving PR Review Agent

Agentic AI promises to improve work processes in all domains and industries. R&D is no different. Recently, Cato R&D built an internal self-evolving pull request (PR) review agent that keeps reviewers in flow by commenting only on high-impact, high-confidence issues, validating every change against its spec from the PR and Jira, and learning continuously from developer feedback through long-term, episodic memory. What were the results?

How to Evaluate AI Workload Security Tools for Enterprise Teams

You’ve sat through three vendor demos this week. Vendor A showed you an AI-SPM dashboard with a pie chart of misconfigurations. Vendor B showed you a nearly identical dashboard with different branding and a slightly wider set of compliance frameworks. Vendor C showed you posture findings with an “AI workload” tag that wasn’t in their product last quarter.

AI Workload Security on AWS: Evaluating Native Tools vs Third-Party Solutions

Your Bedrock agent running on EKS receives a prompt through your RAG pipeline. CloudTrail logs it as a normal bedrock:InvokeModel event—status 200, authorized IAM role, expected endpoint. But inside the container, the agent’s response triggers a tool call that spawns curl to an external IP, exfiltrating the context window. GuardDuty doesn’t flag it because the connection routes through a permitted VPC endpoint. You open your AWS console and see a healthy API call.

AWS GuardDuty Modules Explained: Features, Coverage, and How Customers Benefit with Coralogix

As organizations continue to scale their AWS environments, security teams face increasing challenges in detecting cloud-native threats such as compromised credentials, misused APIs, container breaches, and malicious workload behavior. Traditional perimeter-based controls and legacy endpoint tools are often insufficient in dynamic, cloud-first architectures. AWS GuardDuty provides native,intelligent threat detection for AWS environments.