Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

EU AI Act Compliance Checklist - A Practical Guide for Businesses

An EU AI Act compliance checklist is a structured framework that helps organisations systematically identify, classify, and govern all AI systems within scope of Regulation (EU) 2024/1689. It covers AI system inventory, risk classification (unacceptable, high-risk, limited, and minimal), conformity assessment requirements, technical documentation (Annex IV), human oversight obligations, GPAI model obligations, and post-market monitoring.

Navigating the Cybersecurity Landscape in India Empowering Human and AI Agents

The Asia-Pacific and Japan (APJ) region, with its dynamic economic growth and technological advancements, presents unique challenges and opportunities in the realm of human risk management and agentic risk management, particularly within the financial services sector. As financial institutions strive to protect themselves from increasing cyber threats, they must align their security practices with the regulations set forth by central banks across the countries.

The Rise of Cyber Threats and AI in the Philippines: A New Era Beyond Legacy Security

The Philippines, like many other nations, is witnessing a dramatic increase in cyber threats, fueled by the rapid adoption of digital technologies and the proliferation of sophisticated cybercriminals. This article examines the evolution of cyber threats in the Philippines, with a focus on phishing, email security and the risks posed by agentic AI.

Six MCP Security Incidents Every Security Leader Should Know

In July 2025, an AI agent reviewed a support ticket, queried a production database, and leaked integration tokens directly to the attacker watching the thread. Months earlier, another AI followed "hidden instructions" in a public repository, exfiltrating private code into a visible pull request. In both cases, the AI wasn't broken; it simply obeyed the attacker instead of the developer.

Your AI Agents Are Already Acting. The Question Is Whether You Can See What They're Doing.

In conversations with CISOs about their agentic environments, the question I ask first is not whether they have agents deployed. Most do. It is not whether those agents are creating value. Most are. The question I ask is whether they have mapped their Agentic Security Graph. Almost none of them have. And that gap, between the agentic infrastructure that exists inside their organizations and the visibility they have into it, is where the most serious AI security risk in the enterprise lives right now.

Workshop: Analyzing Real Malware with Claude Code and LimaCharlie

In this hands-on workshop we will analyze an unknown binary, quickly extract indicators, and determine the binary’s core functionality. We'll give Claude the LCRE (LimaCharlie Reverse Engineering) tool to accelerate analysis and interpretation by identifying configuration details, key behaviors, and any additional indicators useful for rule building. We'll use this information to craft detection rules for this sample.

Does the rise of AI mean human-led SOCs are obsolete? With Dr. Adeel Shaikh Muhammad [322]

Dr. Adeel Shaikh Muhammad, a cybersecurity strategist and global speaker with over 16 years of experience across information security, networks, and systems. Adeel brings a practical perspective on how organizations can adapt to evolving cyber threats and the growing role of AI in cybersecurity.

Shadow IT vs Shadow AI: What's the Difference?

Imagine a customer service representative at your organization uploads sensitive customer data into an AI tool to draft emails more quickly. When an employee uses an AI tool without IT approval, it is known as shadow AI, and such scenarios are becoming increasingly common. Among employees who use AI at work, 78% report using tools that have not been formally approved by their organization, according to Microsoft’s 2024 Work Trend Index.

Dokie AI Review: GPT Image 2 Makes AI-Generated PPTs Look More Professional

Many AI presentation makers can create slides quickly, but the final result often feels unfinished. The slide structure may be usable, but the visuals can look generic, random, or disconnected from the topic. This is where Dokie AI stands out. Dokie AI is an AI presentation maker built for creating PPT-style decks. It helps users generate structured presentations from prompts, notes, documents, or existing content. With the new support for GPT Image 2, Dokie AI has improved one of the most important parts of presentation quality: the images.