Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing Shadow AI: 6 Principles from Security Leaders Who've Been There

Everyone's racing to use AI right now. But securing AI adoption while maintaining productivity—getting visibility into shadow AI, educating employees without blocking innovation, and building governance that actually works—is harder than it looks. We recently hosted a discussion between Anant Mahajan, Head of Product at Nightfall, and Yunique Demann, VP of Information Security at TPx, to dig into the practical realities of AI governance.

Safeguard: Using the double-edged sword of AI for good

Examine the function of AI in security tools, and how this double-edged sword can be used for good or ill in the cybersecurity sphere. Plus, see its integration into an identity fabric and get a glimpse into its responsible use – paired with the human element – in One Identity Safeguard.

August Release Rollup: AI-Powered Agents, Egnyte to Egnyte Connector 2-Way Sync, and More

We’re excited to share new updates and enhancements for August, including: For more information on these updates and others, please read the complete list below and follow the links for more detailed articles.

Securing AI and LLMs: A New Security Paradigm

Securing AI and LLMs: A New Security Paradigm When interacting with AI tools like ChatGPT, it's clear that there's a thought process behind their responses. But what happens when an attacker hijacks that process? In this clip from "Securing AI Part 2: What Makes Protecting AI a Unique Challenge?", A10 Networks' security leaders — Jamison Utter, Madhav Aggarwal, and Diptanshu Purwar — discuss this new security paradigm.

How AI Contract Solutions Reduce Risk and Cost

With how businesses operate nowadays, managing contracts is a vital aspect of company operations. Minor errors can cost you a lot of money and land you in legal trouble. Artificial intelligence provides a unique approach to enhancing contract management, reducing risk exposure, and reducing compliance costs.

7 Cybersecurity Concerns Related to The MCP Protocol

Everyone’s trying to make AI agents do useful things. That’s why the Model Context Protocol (MCP) is gaining momentum with teams operationalizing LLMs across their infrastructure and tooling. Backed by teams like OpenAI and Google, MCP gives a consistent, standardized way to connect LLMs with the rest of your stack. In other words, the MCP Protocol makes connecting AI tools with real business data and workflows easier using structured access instead of janky UI hacks and glued-on custom code.

Fireside Chat | Adapting Security Leadership for the Age of AI

Erika Carrara, VP & Chief Information Security & Infrastructure Officer at The Greenbrier Companies, shares how she’s adapting her security strategy to meet the demands of the AI era by modernising her tech stack, implementing AI governance, and embedding security into business culture. Interested in finding out more about UpGuard?