Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Redesigning Security Culture for the Agentic Age

The launch of platforms like Moltbook, OpenClaw, and RentAHuman in early 2026 has provided an unsettling glimpse into the future. We are entering a phase of the digital workplace where AI agents no longer just assist us, they interact with one another, act autonomously in the physical world, and even hire humans for manual labor. In this environment, the traditional lines of control and agency are being redrawn.

The AI attack surface: What MSSPs and SecOps teams need to watch

AI tools are moving faster than the security controls meant to govern them.In this episode of Defender Fridays, Cisco's Cybersecurity Technical Solutions Architect Katherine McNamara walks through changes in the threat landscape as organizations rush to integrate AI without applying basic security discipline. When Katherine meets with customers to discuss AI security, the conversation almost always starts and ends in the same place: data leakage. Someone might upload sensitive files to a public LLM.

AI Agent Attack Detection: The Complete Framework for Security Teams

It usually starts the same way. The CISO comes back from a board meeting having signed off on agentic AI for production. The SOC lead is told, in roughly that many words, to build detection for the agents. And the security stack she has — CNAPP for posture, EDR on the nodes, container runtime sensors, a SIEM ingesting everything — was architected before AI agents existed as a workload class.

OpenAI Daybreak and the Future of Secure Software Development

OpenAI recently introduced Daybreak, a cybersecurity initiative designed to apply frontier AI models to vulnerability discovery, secure code analysis, and earlier remediation across the software lifecycle. By combining advanced reasoning and planning capabilities, Daybreak aims to help organizations identify and address weaknesses before they reach production. This is a meaningful step forward, but it is also a continuation of a long-standing approach.

Salt Agentic Security Platform

Most enterprise AI security investment is focused on the model layer—guardrails, output filtering, LLM governance. That's necessary. It's not sufficient. AI agents take actions: they call APIs, invoke MCP servers, access databases, and trigger downstream workflows. The Salt Security Agentic Security Platform was built to secure that action layer (the infrastructure your agents actually operate across).

Device Trust MCP Server: Natural language queries for your entire fleet

Today we're releasing the 1Password Device Trust MCP Server, an open-source server that connects your Device Trust data directly to the AI tools your team already uses, like Claude or ChatGPT. It's available now for all customers on Device Trust Connect.

The 10 Best Enterprise AI Data Loss Prevention Tools

AI usage is invisible to most security tools. Network monitoring sees HTTPS traffic. Endpoint detection sees browser activity. CASB platforms see cloud application access. None of them sees what employees type into AI prompts or upload to AI services through web forms. This invisibility creates a problem. Organizations can’t prove they didn’t expose customer data through AI because they can’t see the data that employees shared.

AI Agent Security Risks: What Enterprises Need to Know in 2026

AI agents are already inside most enterprise environments. They complete tasks, connect to live systems, and make decisions that used to require a human. Gartner projects that 40% of enterprise applications will include task-specific AI agents by the end of 2026, up from less than 5% today. What was an experiment two years ago is now a core part of how work gets done. If your organization is adopting AI agents or planning to, security is not something you can figure out later.

Fighting AI-Assisted Ransomware Threats

This Anti-Ransomware Day, it's important to recognize the ever-changing landscape of cyber threats and how organizations can fortify their defenses. The evolution from traditional ransomware to cyber extortion over the last few years reflects a professionalized, decentralized ecosystem. To arm your organization against this danger, understanding the current landscape and implementing robust defense strategies is essential.