Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Put AI to work where workflows work best

In this guest post, Jason English, Director and Principal Analyst at Intellyx explores how GenAI is moving beyond chat to orchestrate real action for SOC teams. As my colleague Eric Newcomer mentioned in the previous chapter of this series, GenAI changes the security automation game, with multi-system discovery, documentation, and task execution capabilities that can reduce cognitive load and toil for security analysts.

Agentic AI Security Isn't Just A Technical Problem - It's a Strategic One

If you’ve started exploring how to secure AI agents in your environment (or even just reading about it), you likely already know that it’s not as straightforward as applying traditional AppSec practices. AI agents aren’t just another workload or API to monitor, they’re dynamic, semi-autonomous entities operating at the intersection of user intent, agent behavior, and enterprise systems. And not all AI agents are created equal or secure.

Unmasking EncryptHub: Help from ChatGPT & OPSEC blunders

This is the second part of Outpost24’s KrakenLabs investigation into EncryptHub, an up-and-coming cybercriminal who has been gaining popularity in recent months and is heavily expanding and evolving operations at the time of writing. We’ve already published one article explaining EncryptHub’s campaigns and TPPs, infrastructure, infection methods, and targets.

How Drones Are Revolutionizing Construction Site Management

Discover the method to save time and money while protecting workers on construction sites? Recent years have seen drones bring about complete transformation to construction site management practices. Construction drones perform tasks which include land surveying, project monitoring and ensuring worker safety. Construction companies have traditionally resisted adopting modern technological advancements. But drones? The construction sector has accepted drones with the enthusiasm of someone savoring a refreshing cold beverage when it's sweltering outside.

AI's Content Gold Rush: Who's Getting Paid, Who's Getting Scraped, and How Businesses Can Turn Content into Revenue

The AI boom is creating a new content economy – one where savvy content owners are striking multi-million-dollar licensing deals, while others are being automatically scraped by bots to train AI models for free. It’s impossible not to have noticed the biggest names in AI, including OpenAI, Google, Anthropic, Perplexity and more, at the center of an argument about ethical content scraping.

The League Assembled: Highlights from the AI Agent Security Summit 2025

The AI Agent Security Summit 2025 brought together a vibrant community of security leaders, consultants, professionals, thought leaders, and vendors to discuss the unique security risks, obstacles, and solutions facing today's enterprises. The Summit was marked by an amazing turnout and engagement from the audience, presentations that centered around attack pathways, practitioner insights, and actionable solutions, and enlightening conversations that left attendees inspired and informed.

Securing AI Against Evolving Threats

Arctic Wolf is an AI-powered security operations provider, which gives our organization advanced insights into the emerging threats inherent in being an early adopter of the more recent techniques. However, Arctic Wolf is not the only one turning to AI. A third of technology leaders reported that AI was already fully integrated into their products and services. This statistic will grow as major tech companies like Microsoft and Google invest billions of dollars into AI infrastructure..

Exabeam Launches the First Fully Integrated, Multi-Agent AI for Security Operations

Imagine a world-class chess grandmaster playing multiple opponents at once—anticipating moves, spotting patterns, and staying steps ahead of every competitor. Now, imagine if that grandmaster had an AI-powered assistant, constantly analyzing past games, predicting threats, and offering guidance in real time. That is what Exabeam is bringing to security operations.