Threat detection systems have traditionally aggregated telemetry into a single repository, but that model can no longer keep pace with the scale, cost and diversity of enterprise security data, said Eli Rozen, co-founder and CTO at Vega.
AI-generated code expands the attack surface as attackers use autonomous agents to find and exploit flaws in hours. Snir Havdala, co-founder and chief product officer at Zafran Security, said attackers build specialized agents that handle reconnaissance, exploitation and rapid adaptation.
Cybercriminals are using AI to craft tailored email-based attacks that bypass traditional defenses. This shift to targeted email compromise and rising volumes of sophisticated tactics have placed new pressure on organizations, says Neal Bradbury, chief product officer at Barracuda.
Accurate data and operational context are essential for security teams to identify root causes and deploy effective fixes in cloud environments, says Gil Geron, co-founder and CEO, Orca Security. He explains how AI-driven insights can bridge longstanding gaps between security and engineering teams.
Over the last 25 years, Fortinet has risen from a small engineering startup to one of the world's largest cybersecurity companies on offer – all by remaining rooted in innovation and maintaining a customer-first mindset.
Fraudsters are exploiting weak state controls to create synthetic businesses for less than $150, with potential payouts of more than $100,000 for each fake identity. Synthetic entity fraud has rapidly shifted from a niche threat to a mainstream risk, said Dun & Bradstreet's Andrew La Marca.
Small and mid-sized businesses can turn compliance from a burden into a business advantage through automation, ownership and continuous readiness, said Sean D. Mack, managing director of CXO Advisor practice at ISMG.
API security is evolving fast as AI, new architectures and distributed teams reshape how developers build and secure modern systems, says Postman Head of Security Sam Chehab. Secrets management and AI-driven controls now play a pivotal role in keeping data secure at scale.
Artificial intelligence agents are poised to take on major roles in security operations centers, but SOC teams can't just layer autonomous agents onto legacy architectures - they need to reimagine the whole program, said Daniel Bernard, chief business officer at CrowdStrike.
AI agents promise faster incident response, but enterprise teams need reliability and accuracy before granting autonomy, says Michael Whetten, senior vice president of product at Datadog. The journey from copilot to autonomous operations requires rigorous evaluation and customer feedback loops.
SOC teams face mounting pressure as business and threat landscapes expand. Anvilogic's Michael Monte said structured data, decoupled analytics and AI-driven tuning reduce costs, shrink backlogs and improve alert quality.
Passwordless authentication has evolved but still needs to mature. Financial firms must improve customer education, user experience and recovery processes to advance. Josh Cigna of Yubico outlines steps to ensure secure, scalable deployment.
In this week's panel, four ISMG editors discussed the latest shifts in ransomware tactics, a major development in the Texas challenge to the HIPAA Privacy Rule related to reproductive rights, and how SMBs navigating AI are facing very different challenges than large enterprises.
AI adoption accelerated as enterprises sought tools that strengthened human productivity. Sherry Martin and John Whittaker of EY outline why AI operates as an assistant - not a replacement - and why organizations need to recalibrate workforce strategies to ensure confidence, trust and adoption.
AI lets advertisers test hundreds of ad variations in minutes, accelerating feedback loops, improving emotional resonance and enabling creative refinement at scale, said Jari Koister, CTO of Insights at Kantar.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.