Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI Is Writing the Code - Can Security Keep Up? | How to Secure Agentic IDEs from Dev to CI/CD | Mend

AI coding agents are exploding in use—but are they quietly shipping exploitable code? In this webinar, we break down real data, real incidents, and a practical blueprint for securing AI-accelerated development.

AI Data Privacy Trends and Future Outlook 2025

AI is now woven into everyday work. Customer teams rely on chat assistants, developers use copilots, and analysts ask models to sift through knowledge bases. The biggest shift in 2025 is not a single law or headline. It is the move from occasional audits to continuous, technical controls that run wherever data flows.

LevelBlue Spotlight Report Finds Manufacturers Struggling with the Impact of AI and Supply Chain Risk

LevelBlue’s newly released 2025 Spotlight Report: Cyber Resilience and Business Impact in Manufacturing, uncovered the different ways this sector has increased its understanding of the role cybersecurity must play moving forward, including the need to adopt a more proactive security posture to increase resilience and improve its defense mechanisms to combat AI-powered attacks.

When Attackers Weaponize AI and Defenders Fight Back with Smarter Remediation

Artificial intelligence is transforming cybersecurity, and not always for the better. Attackers are now weaponizing AI to speed up reconnaissance, create exploit code, and bypass traditional defenses. Security teams can’t afford to rely on outdated vulnerability management practices. In this webinar, Scott Kuffer (COO, Nucleus Security) and Corey Brunkow (Director of Federal Operations, Horizon3.ai) break down how AI is changing the threat landscape and what defenders can do to stay ahead.

AI, Risk, and Enterprise Security: Highlights from a Discussion with Enrique Salem

Key insights from a fireside chat between Nightfall CEO Rohan Sathe and cybersecurity veteran Enrique Salem, Partner at BCV and Nightfall investor Twenty years ago, enterprise security teams scrambled to address shadow IT as employees brought consumer applications into the workplace. Today, we're witnessing the same phenomenon with AI tools—what we now call shadow AI. The fundamental question remains unchanged: What happens to our data?

Persuasion engineering: how to influence humans, LLMs, and AI agents

We’ve spent decades treating persuasion like an art—something you could master if you had charisma, practice, or luck. Lawyers use it to hone arguments. Marketers use it to craft taglines. On the flip side, phishers use persuasive tactics to sharpen lures to razor points. But looking at it as an art form, while intuitive for some, can be messy. Hit-or-miss. Especially when you consider that today’s means of persuasion can run like code: systematic, reproducible, and scalable.

Zenity and Slalom Partner to Accelerate Secure AI Agent Adoption

Zenity, the leader in securing AI agents everywhere, is officially partnering with Slalom, a global business and technology consulting firm, who made the announcement today. This collaboration is designed to help enterprises safely and confidently adopt AI agents by combining Zenity’s robust security and governance platform with Slalom’s deep expertise in digital transformation and AI implementation.

Transform Information Discovery with Egnyte's AI-Powered Search

Modern businesses are drowning in content. Documents, presentations, images, audio recordings, videos, the volume grows exponentially every day. Traditional search tools, built on outdated keyword matching, simply can't keep pace. They only help users find information if they know what to look for and what keywords to use. This inefficiency comes at a cost: delayed decisions, missed opportunities, and frustrated teams spending more time searching than working. The solution?