Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Inside CyberArk's Journey: What It Really Takes to Run RAG Agents in Production

As part of the DevSecNext AI series, Jit hosted Michael Balber—Principal Software Architect at CyberArk—for an in-depth session on how his team built and evaluated real Retrieval-Augmented Generation (RAG) agents in production. Unlike abstract discussions about LLMs and assistants, Michael shared a grounded view of what it takes to deploy agents that don’t just talk—they act.

Hi My Name Is...the Not So Shady Side of Long-Term Memory in AI

In our last post, we explored how short-term memory enables agentic AI to hold a conversation that doesn’t reset after every message. That form of memory is all about flow—preserving context, user intent, and logic within a single session, even as interactions stretch across multiple turns. The longer the session, the more memory is required to maintain continuity. But not all memory needs to be verbose. Long-term memory serves a different purpose: persistence across sessions.

Top 5 HIPAA Compliance Software

If you're a healthcare organization, you need to be aware of HIPAA compliance software. It helps ensure that companies follow HIPAA (Health Insurance Portability and Accountability Act) to protect patients' sensitive data, avoid fines and reputational damage, and costly litigation with a conventional and practical approach to compliance.

Smart City Security: Protecting Critical Infrastructure with IoT

The transformation of urban environments through Internet of Things (IoT) technology has created unprecedented opportunities for improving city services, enhancing quality of life, and optimizing resource utilization. This process of digital transformation modernizes and integrates city infrastructures, improving efficiency but also introducing new cybersecurity challenges.

Can You Build a Secure Online Store on Your Own - for Free?

It's a question I hear more and more these days - can you really build a secure, professional online store without spending a fortune... or anything at all? And more importantly, can you do it without relying on SaaS platforms like Shopify or Wix? As someone who's been working in the field of web security for years, I've always had my doubts when people say "just go SaaS, it's easier." Sure, it's convenient. But are non-technical users truly stuck with rented storefronts and limited control just because they don't write code?

The buyer's guide to automated compliance for startups

Getting your first SOC 2 or ISO 27001 certification and building your security program used to be a painfully slow and manual process. But thanks to automation, the path to compliance has gotten a lot faster and simpler, lowering the barrier to entry for security-minded startups that want to build and demonstrate trust with customers early on.

The Blind Spots of Multi-Agent Systems: Why AI Collaboration Needs Caution

Multi-agent systems (MAS) are reshaping industries from IT services to innovative city governance by enabling autonomous AI agents to collaborate, compete, and solve complex problems. This powerful transformation comes with a cost. As multi-agent systems grow, their risks also increase, opening the door to adversarial manipulation, emergent vulnerabilities, and distributed attack surfaces.

BPO Industry: Enhancing Productivity and Compliance with User Activity Monitoring (UAM)

The Business Process Outsourcing (BPO) industry is built on efficiency, consistency, and customer trust. However, managing distributed call center agents, support staff, and technical teams, many working remotely, creates visibility gaps that impact performance and increase risk. High turnover, burnout, and growing data compliance obligations have complicated workforce oversight.