New York City gets a new mayor on Jan. 1, and while no one knows Zohran Mamdani's plans for using artificial intelligence, the city's AI Action Plan will ensure a strong foundation for innovation, city Chief Technology Officer Matthew Fraser told attendees at The AI Summit in Manhattan on Wednesday.
Threat detection systems have traditionally aggregated telemetry into a single repository, but that model can no longer keep pace with the scale, cost and diversity of enterprise security data, said Eli Rozen, co-founder and CTO at Vega.
BNY is integrating Google Cloud's Gemini Enterprise agentic artificial intelligence platform into its proprietary enterprise AI platform, Eliza. The move represents an evolution from AI as a pilot project to AI as infrastructure for the global financial services organization.
AI-based attacks will come faster and the sequence of activities will be less predictable. Cyber defenders are skilled in network analysis, incident response and cloud or identity management, but in the face of AI-based attacks, they need new skills, tools and defensive tactics.
AI-generated code expands the attack surface as attackers use autonomous agents to find and exploit flaws in hours. Snir Havdala, co-founder and chief product officer at Zafran Security, said attackers build specialized agents that handle reconnaissance, exploitation and rapid adaptation.
With a $36 million investment, Clover Security plans to expand its suite of AI agents that automate security reviews and improve collaboration with developers. The company says this proactive approach helps manage risks introduced by AI-driven software creation.
Accurate data and operational context are essential for security teams to identify root causes and deploy effective fixes in cloud environments, says Gil Geron, co-founder and CEO, Orca Security. He explains how AI-driven insights can bridge longstanding gaps between security and engineering teams.
Google faces a fresh probe into its competitive practices after the European Union said it will investigate the search engine giant's propensity to convert web content into fuel for its artificial intelligence models. The commission said the investigation is a "matter of priority."
Google patched a vulnerability in Gemini Enterprise that allowed attackers to steal corporate data through a shared document, calendar invitation or email without any user action or security alerts. No malware was executed, no credentials were phished and no data left through approved channels.
An alleged smuggling ring illegally sold at least $160 million in advanced Nvidia artificial intelligence chips to China, U.S. federal prosecutors said Monday while announcing charges against found individuals. U.S. President Donald Trump also said that day he approved H200 chip sales to China.
Artificial intelligence agents are poised to take on major roles in security operations centers, but SOC teams can't just layer autonomous agents onto legacy architectures - they need to reimagine the whole program, said Daniel Bernard, chief business officer at CrowdStrike.
AI agents promise faster incident response, but enterprise teams need reliability and accuracy before granting autonomy, says Michael Whetten, senior vice president of product at Datadog. The journey from copilot to autonomous operations requires rigorous evaluation and customer feedback loops.
The cybercrime-as-a-service model has a new product line, with malicious large language models built without ethical guardrails selling on Telegram for $50 monthly or distributed free on GitHub. Others groups are taking the open-source route.
SOC teams face mounting pressure as business and threat landscapes expand. Anvilogic's Michael Monte said structured data, decoupled analytics and AI-driven tuning reduce costs, shrink backlogs and improve alert quality.
Organizations are beginning to reimagine how leadership roles should be structured, aligned and empowered as they grapple with regulatory pressures, the unpredictable nature of AI systems, and the need for operational resilience in an increasingly uncertain business climate.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.