Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cybersecurity AI Explained: Agentic AI, PQC, and Real-World Security Challenges

At the 2025 RSA Conference, Justin Foster joins Zeus Kerravala to break down where AI in cybersecurity is actually delivering value and where it’s falling short. As security teams deal with growing complexity, many are finding that today’s AI tools create as much friction as they solve. This conversation explores how a shift toward agentic, skills-based AI can help teams move faster, reduce noise, and focus on what really matters.

Navigating the Post-Mythos Landscape with Bitsight

The rise of AI-driven vulnerability discovery using Anthropic's Claude Mythos, as well as similar tools from Google and OpenAI, is completely changing the calculus of cyber risk. The number of vulnerabilities is exploding. The time it takes for exploits to appear is shrinking. The patching cadences and scan intervals, assessments and risk registers that many organizations still rely on are rapidly becoming ineffective.

7 Practical Ways to Shrink Your Digital Footprint in 2026

The average internet user now leaks more personal data in a single day of routine browsing than most people disclosed in a decade two generations ago. Ad networks track page views, data brokers aggregate public records into sellable dossiers, and AI systems ingest everything from social posts to leaked databases to build inferred profiles of individuals. Privacy Rights Clearinghouse has catalogued more than 750 data brokers operating in the United States alone, and industry analysts estimate the broader data-broker economy will grow past half a trillion dollars by the end of the decade.

How to Secure AI Agents Accessing Enterprise Data: A Complete Guide

Artificial intelligence is changing how a business handles its operations, and that too very rapidly. AI agents can easily read, analyze, and act on enterprise data in real time. This ease also brings serious risk. If not managed well, these systems can expose sensitive information, break compliance rules, or even make harmful decisions. Did you know that on average, the overall cost of a data breach reached $4.45 million in 2023?

How to know if your agents are correct with Dylan Williams

Join us for this week's Defender Fridays as we explore AI agent evaluation with Dylan Williams, Co-founder and Chief Research Officer of Spectrum Security. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

OpenAI Revokes macOS Code Signing Cert After Axios Supply Chain Hit [Actions Required]

Something big just happened in the cybersecurity world. And if you’re using OpenAI’s macOS apps… this affects you directly. OpenAI has rotated its macOS code-signing certificates after a supply chain attack quietly slipped into its workflow. No, your data wasn’t stolen. But yes, this is serious enough that every macOS user must update before May 8, 2026.

Beyond patching: Building a Mythos-ready security program

When Anthropic revealed the existence of Mythos, the frontier AI model they deemed too dangerous for public release, the security community was alarmed. And it’s not hard to see why: Mythos is capable of detecting software vulnerabilities at a previously unimaginable scale, and autonomously crafting exploits to weaponize these flaws. According to Anthropic, Mythos created 181 exploits of Firefox in testing, ninety times more than the company’s previous model (Claude Opus 4.6).