Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Grid by LimaCharlie is now in beta: Agentic SecOps for the stack you have

Grid is LimaCharlie's agentic AI layer for security teams that want AI operations running across their existing stack right now. Security providers and SOCs need access to AI capabilities without waiting for a migration window, a contract renewal, or a vendor to ship the features they need. Every major security vendor is offering some version of AI. CrowdStrike has Charlotte AI. SentinelOne has Purple AI. Microsoft has Copilot for Security.

Agents need boundaries with Fotis Chantzis from OpenAI, Zero-Shot Learning

Agents need boundaries | Fotis Chantzis from OpenAI Agents don't fit old identity models. As OpenAI’s Agent Security Lead, Fotis Chantzis has a front-row seat to see how agents push identity systems beyond what they were built to control. That’s where things start to fall apart and where most teams lose control.

Why Patch Management Matters for MSPs: Security, Scalability, and Profitability

For MSPs, patching has evolved beyond a routine maintenance task into a core security service that directly impacts client protection, helping reduce risk, improve operational efficiency, and create scalable recurring revenue opportunities. Unpatched vulnerabilities remain one of the primary exposure vectors for organizations today.

Why Legacy DLP Fails Against Agentic AI

Security teams that deployed legacy DLP years ago built something real. The rules fire. The alerts go out. Compliance boxes get checked. The problem is not that those programs stopped working. It is that the threat moved, and the architecture did not. Agentic AI has introduced a class of data movement that legacy DLP was never designed to govern: autonomous, continuous, multi-step, and operating at machine speed across systems that static rules cannot enumerate in advance.

WantToCry ransomware remotely encrypts files

SophosLabs analysts investigated WantToCry ransomware attacks that involved the threat actors abusing the Server Message Block (SMB) service for initial access and then exfiltrating files to attacker-controlled infrastructure for remote encryption. The detection surface is significantly reduced because WantToCry operates without local malware execution, and there is no post-compromise activity beyond exfiltrating files and rewriting them to disk.

AI-Driven Cyber Warfare Reshapes Global Defense Readiness

This article was originally published in TechRadar Pro. The Iran conflict is serving as an AI testbed for the next era of cyber conflict. Most organizations are watching the tactics and impact unfold with cybersecurity defenses that are simply not prepared for this level of sophistication. Meanwhile, technology leaders are seeing AI as both their biggest opportunity and a major new attack vector.

What 500+ Industry Experts Told Us About Securing Autonomous AI: A Policy Roadmap

When the US Center for AI Standards and Innovation (CAISI) asked for public input on securing agentic AI systems, the response was massive: over 500 detailed submissions from Fortune 500 companies, defense contractors, AI startups, and cybersecurity firms. The result is substantial insight into how industry views the regulatory challenges of autonomous AI agents and what they think policymakers should do about it.

What Is MCP Security? 9 Things Every CISO Needs to Know

Your AI agents had a productive day. Nobody can tell you what data they touched. A developer opens Cursor and connects it to a GitHub MCP server and a Postgres MCP server. The agent reads the repo to understand a schema change, finds an AWS access key in a config file, and uses it to run a migration against staging. The key now lives in the agent's context, in the Postgres query log, in the chat history, and in whatever artifact the developer copies out. No alert fired. No policy triggered.