Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Agentic AI Security: Visibility and Control for AI Agents at Work

Security teams have spent years tracking what employees do with data. The harder problem now is tracking what agents do on their behalf. AI agents, whether running in an IDE, installed locally on a laptop, or connected to internal data through a model context protocol (MCP) server, operate with the permissions of the user who deployed them. They read files, query databases, call external APIs, and generate outputs. And in most enterprise environments, security teams have no reliable way to see any of it.

Privacy and Data Residency for AI Agents: What GDPR Requires That Static Controls Can't Show

The residency evidence GDPR and the EU AI Act now expect lives in the runtime trajectory of every AI agent execution, not in the deployment configuration. Your residency compliance dashboard — every workload in eu-west-3, sovereign cloud configured, SCCs signed — cannot produce it. Your AI agent’s last thousand inferences crossed an external border, on average, eight times each. The translation API routed through us-east-1 when the EU endpoint hit capacity.

AI: The hero's journey with Ken Westin

Join us for this week's Defender Fridays as Ken Westin, Senior Solutions Engineer at LimaCharlie, shares his AI journey and what the hero's journey framework reveals about how security professionals can move from hesitation to genuine mastery of AI tools. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

Why Editing IAM Policies Won't Fix Your AI Agent Identity Problem

Editing IAM policies cannot fix the most common architectural mistake in shipping AI agents on Kubernetes. It happens in thirty seconds: a platform engineer reuses an existing ServiceAccount with an IRSA annotation for Bedrock access because creating a new one takes thirty minutes plus a Terraform pull request. The new agent ships under the existing identity.

The New Vanguard: Strategic Leadership in the Age of Autonomous Threats

The threat landscape of 2026 is no longer defined by the singular hacker or the isolated malware strain. We have entered the era of the "Autonomous Adversary"-a period where AI-driven social engineering, automated vulnerability discovery, and polymorphic code are the standard tools of state-sponsored and criminal actors alike. For the security professional, the traditional defensive perimeter has dissolved. To navigate this complexity, the industry is moving away from purely tactical responses toward a model of "Cyber-Resilience and Strategic Governance.".

AI Agent Security Performance: Framework for Evaluating Latency, Throughput, and Observability Overhead

Every AI workload security PoC reaches the same conversation. Platform engineering pushes back: the AI team won’t accept extra latency on inference. The security engineer hunts for benchmarks and finds a contradiction. Langfuse publishes 15% overhead. AgentOps publishes 12%. The security vendor quotes 1–2.5%. None is lying. They measure different layers.

AI Agent Incident Response in Cloud-Native Environments: A Playbook for Modern SOCs

It’s 2 a.m. and the SOC has a Tier 3 page. A customer-service agent on the production cluster has just wired refund payments to seven addresses outside the approved disbursement list. The runbook is unambiguous: isolate the pod, image the disk, image the memory, root-cause within 48 hours.

Turn Busywork Into Real Work With Egnyte's AI

It’s Friday afternoon, and you need a quick team update. Five minutes, tops, right? You ping Slack. A few people reply, a few don’t. So, you schedule a “quick sync” to get everyone on the same page. Two hours later, you’ve spent your afternoon chasing updates instead of doing actual work. And you’ll do it all over again next week. Now picture this. You’re collecting product demo videos for an agency.

AI Is Replacing Security Dashboards (Headless Cloud Security Explained)

AI is changing cloud security—and dashboards might be next to go. In this video, we introduce headless cloud security: a new model where AI agents, not humans, operate security systems. Instead of dashboards and manual triage, security becomes API-driven, automated, and built for autonomous execution. This shift redefines DevSecOps, cloud security, and AI security workflows—moving humans from operators to orchestrators.