Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

MITRE ATLAS for AI Agent Attack Detection: A Complete Mapping

MITRE ATLAS catalogs sixteen tactics and eighty-four techniques adversaries use against AI systems, including fourteen agent-focused techniques added through the October 2025 Zenity Labs collaboration. It is the canonical taxonomy a security architect’s CISO, auditor, or RFP will name. It is not a detection plan. ATLAS organizes around adversary objectives.

Prompt Analysis for AI Attack Detection: Four Signal Categories, Three Blind Spots, One Correlation Layer

At 2:47 PM on a Tuesday, a customer support agent receives a routine ticket asking about return policy edge cases. The agent retrieves a section from your internal policy wiki through RAG to formulate the response. Three weeks earlier, an attacker had planted a hidden instruction in that wiki page. Bedrock Guardrails scored the retrieved context at 0.04 — well within benign range.

What Your Board Gets Wrong About AI Security

Editor's note: This article was originally published by Craig Riddell on LinkedIn. It has been republished here with the author's permission. Boards are giving AI security more airtime than ever. What they're not giving is the right framing. A year or two ago, AI was mostly a question of experimentation risk. Today, it's tied directly to revenue, customer experience, operational efficiency, and competitive advantage. The urgency is real, and it's translating into aggressive deployment timelines.

What is shadow AI? And why GenAI usage monitoring matters for MSPs and SMDs

Author: Alexander Ivanyuk, Senior Director, Technology Generative AI is no longer a side experiment inside businesses. It is moving into normal work: writing, summarizing, coding, research, customer support, internal search and repeatable workflows. OpenAI says it now serves more than one million business customers, more than seven million ChatGPT workplace seats, and roughly 8x growth in weekly enterprise messages since November 2024.

Why Traditional PAM Is Failing in the Age of Machine Identities

For years, Privileged Access Management (PAM) was built around a simple assumption: privileged access is primarily a human problem. That assumption is rapidly collapsing. Modern enterprises are no longer driven mainly by administrators logging into servers. They are increasingly powered by APIs, containers, automation pipelines, microservices, cloud workloads, and AI-driven systems communicating continuously at machine speed.

How to Move from Legacy to Customer Accounts in Shopify Without Disrupting Business Workflows

Shopify is deprecating Legacy Customer Accounts, and if your store relies on custom login flows, B2B approvals, or third-party integrations, the impact goes further than a login page redesign. While the platform move is mandatory, the priority for any merchant is maintaining continuity across logins, onboarding, and the connected systems that keep the business running. This guide walks you through the transition in a structured way.

What Is Passwordless Authentication? How It Works, Benefits, and Safety

Passwords have been the foundation of authentication for decades. But they have also become one of the biggest weaknesses in modern security. Users reuse them, attackers steal them, and organizations spend significant time managing them. As systems grow more complex and threats become more advanced, relying on passwords alone is no longer practical. This is where passwordless authentication comes in.

How to Measure the ROI of an Insider Risk Management Program

Security leaders don't struggle to justify the need for insider risk management (IRM). They struggle to justify the budget. When the CFO or board asks why you're spending seven figures on a program to monitor your own employees, "because insider threats are real" isn't enough. Cyberhaven data shows office-based employees are 77% more likely to exfiltrate sensitive data than remote workers, and that risk spikes further during offsite logins and workforce transitions.

What Happens If You Fail a PCI Compliance Audit?

PCI DSS compliance is not something you can be flippant about. The Payment Card Industry Data Security Standard is a high bar, and it’s one that is effectively mandatory for any business that wants to accept credit card payments, no matter how little engagement with the systems you have. Any security standard is only as good as its enforcement. PCI strictly enforces its standards because it’s a core foundation of the trust people have in credit cards.

OpenAI Daybreak and the Future of Secure Software Development

OpenAI recently introduced Daybreak, a cybersecurity initiative designed to apply frontier AI models to vulnerability discovery, secure code analysis, and earlier remediation across the software lifecycle. By combining advanced reasoning and planning capabilities, Daybreak aims to help organizations identify and address weaknesses before they reach production. This is a meaningful step forward, but it is also a continuation of a long-standing approach.