Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Dawn of Agentic AI in the SOC

Now that six in ten security leaders view AI as a “game changer” across all security functions and 85% of security professionals report increased AI investment and usage in the past year, it’s clear that AI is no longer a fringe technology in security operations. But the AI conversation has evolved recently as a new buzzword has taken over: agentic AI.

Key Updates in the OWASP Top 10 List for LLMs 2025

Last November, the Open Web Application Security Project (OWASP) released its Top Ten List for LLMs and Gen AI Applications 2025, making some significant updates from its 2023 iteration. These updates can tell us a great deal about how the LLM threat and vulnerability landscape is evolving - and what organizations need to do to protect themselves.

The Use Of Artificial Intelligence In Threat Intelligence

Artificial Intelligence (AI) is a double-edged sword in cybersecurity, empowering both defenders and attackers. AI-driven security systems are often used to detect threats in real-time, analysing large datasets for anomalies, and automating responses to cyberattacks. However, cybercriminals are also leveraging AI to create advanced malware, automate phishing attacks, and evade traditional defenses.

UK Cracks Down on AI-Generated Child Abuse Content

As AI tools grow more sophisticated and accessible, sadly exploitation of these tools also increases. Recognising this, the Home Office has made the UK the first country in the world to introduce new legislation that targets predators producing AI-generated child sexual abuse material (CSAM). AI-generated content has severe consequences for victims. CSAMs may be used to manipulate or blackmail children, perpetuate harmful narratives, or retraumatise victims whose likenesses have been altered.

Empowering Data Security in GenAI: Step-by-Step Guide to PII Safeguarding in Bedrock using Protegrity

Generative AI (GenAI) applications, especially through Retrieval-Augmented Generation (RAG) pipelines, are transforming business interactions with data. These pipelines leverage language models and extensive enterprise knowledge bases for real-time queries of large internal datasets. Robust data privacy and security solutions are essential. Amazon Bedrock’s native security guardrails address this need.

Securing Protected Health Information: A Guide to Website Compliance Using Feroot Health DataShield AI

Healthcare organizations managing multiple websites must protect Protected Health Information (PHI) while complying with HIPAA, HHS regulations, state laws, and global privacy requirements. Feroot DataShield AI provides automated monitoring and protection across distributed healthcare web environments.

The Rise of AI-Generated Attacks: Why UEBA is the Best Defense

The cybersecurity industry is facing a new challenge: AI-generated attacks. With the rapid advancement of generative AI, cybercriminals now have access to sophisticated tools that enable them to craft highly targeted attacks with minimal technical expertise. Unlike traditional attack methods that require deep programming knowledge, AI-driven attacks allow even non-technical malicious actors to create malware, exploit scripts, and launch phishing campaigns with ease.

Is Building Customer Trust in Cyber Sales Really That Simple?

Gaining customer trust in cyber sales might seem like a tall order. After all, you're asking people to trust you with their money-or even more tricky, their data-on an often faceless digital platform. But is it really that hard to build trust? Maybe not. With the right approach, some genuine effort, and the use of smart tools, creating strong customer relationships in cyber sales might actually be simpler than you think.