Visibility into access - it's been the bane of many organizations' efforts to understand where and how generative AI is being used throughout the extended enterprise. Jason Georgi of Palo Alto Networks, shared insights into new strategies and tools that overcome the risks of mismanaged access.
It seems inevitable that the worlds of cybersecurity and artificial intelligence (AI) should intersect, collide, and transform each other. Each is rapidly changing due to a combination of significant technical advances and the revolution in how, when, where, and why technology is used—for both better and...
Adopting AI is a transformational journey for every digital enterprise customer and securing it is a tactical and a strategic move. It is essential to recognize that categorizing AI security as a standard security control or adopting a 'one size fits all' approach can pose significant risks.
As 2026 approaches, one thing is certain: Artificial intelligence adoption will continue to accelerate at an extraordinary pace. CISOs will be tasked with maintaining security and control as hybrid cloud environments grow more distributed, automated and interconnected.
Enterprises are rapidly scaling AI initiatives, but many lack the security architecture required to protect LLMs, APIs, and data across modern cloud environments. This session brings together Cloudflare and Accenture to unpack the latest AI threat landscape and outline how organizations can defend mission-critical AI...
Agentic AI is turning large language models into fully autonomous agents that can think, reason and make decisions. Attackers are using adversarial agents to accelerate and scale their own operations. Defenders will be expected to match that speed with equally capable tools and strategies.
Your cloud environment is always changing and AI-powered cloud threats evolve faster than teams can track. The Security Checklist for Cloud Defenders helps you evaluate security posture, validate control maturity and prioritize remediation based on risk. The comprehensive checklist includes assessment prompts,...
Cloud security posture tools are over a decade old, but today’s fast-moving threats and crowded market make it harder than ever to choose the right one. As a leader in cloud posture security, we took insights from thousands of organizations and turned them into a resource that helps you focus on what truly drives...
As cloud and AI adoption rapidly grows, Unit 42® found that 80% of security exposures are in the cloud, and there were 66% more attacks on cloud applications year over year. Dive into our infographic to see how attackers are exploiting misconfigurations, compromised credentials, and exposed vulnerabilities to breach...
This commissioned study, conducted by Forrester Consulting on behalf of Snyk, explores how the Snyk platform helped customers improve productivity, enhance risk posture, and benefit from tool consolidation compared to prior solutions. Download the study for a deep dive into the key findings,* including: 80%...
A Chinese state-linked hacking group relied on the Claude Code model to automate most of a cyberespionage campaign against dozens of organizations, Anthropic said. The AI firm describes the campaign as the first verified case of an AI system handling the bulk of a real-world intrusion.
Tenzai has emerged from stealth with $75 million to develop AI agents capable of performing autonomous penetration tests. Co-founder and CEO Pavel Gurvich says the platform addresses the urgent need for scalable testing as generative AI accelerates code deployment across enterprises.
Understand cloud network visibility and security modernization through this whitepaper. It explores how Network Detection and Response (NDR) enhances threat detection, incident response, and segmentation validation in hybrid and multi-cloud environments. Readers will gain a technical perspective on improving...
Deep network visibility has become central to Zero Trust strategies, and it is reshaping how organizations secure hybrid, multicloud, and OT environments. In this Forrester Wave evaluation, analysts examine the leading Network Analysis and Visibility (NAV) providers and highlight how their capabilities, integrations,...
Enterprises are now facing a new era in cyber risk and threats - one led by agentic AI-initiated attacks that unfold at machine speed. The rise in agentic AI use and deployment of malicious agents is altering what an attack surface can be.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.