Cybersecurity

Securing AI Agents with Zero Trust

Securing AI Agents with Zero Trust

This post explores how to secure modern agentic AI systems by applying the core principles of Zero Trust. It details the unique attack surfaces of AI agents, such as prompt injection and model poisoning, and outlines a comprehensive security architecture including non-human identity management, AI firewalls, and the critical role of human oversight.

What cybersecurity pros need to know about OpenClaw and Moltbook

What cybersecurity pros need to know about OpenClaw and Moltbook

This podcast explores the security implications of emerging AI technologies, focusing on locally run AI agents like OpenClaw as a new attack surface. Panelists discuss the dangers of misconfigured agents, the challenge of AI-generated 'slop' overwhelming bug bounty programs, major changes to NIST's National Vulnerability Database (NVD), and the rise of imperfect, 'vibe-coded' malware.

Securing AI for the Quantum Era: A CISOs Cyber Security Guide

Securing AI for the Quantum Era: A CISOs Cyber Security Guide

Explore the significant security risks posed by Agentic AI and quantum computing, from data breaches of sensitive information to the breakdown of modern cryptography. Learn proactive strategies for governing AI and preparing for a quantum-safe future.

Securing AI Agents

Securing AI Agents

Jason Martin of Permiso Security discusses the exponential rise of AI agents in enterprises and the urgent security challenges they present. He covers the concept of Non-Human Identity (NHI), applying Zero Trust principles to ephemeral and over-permissioned agents, and outlines key attack vectors like prompt injection and data poisoning, while also exploring the potential of defensive AI to enhance security operations.

The newest AI malware vs. 40 years of hacker culture

The newest AI malware vs. 40 years of hacker culture

A discussion on the diverging priorities of CEOs and CISOs, the emergence of AI-generated malware like VoidLink, the critical balance between data protection and service resilience, strategies for disrupting cybercrime supply chains, and a reflection on the 40-year-old "Hacker Manifesto".

Most cybersecurity training doesn’t work. Can we change that?

Most cybersecurity training doesn’t work. Can we change that?

In an era where AI accelerates the speed, scale, and polish of cyberattacks like phishing and deepfakes, the human element remains the most critical variable. This discussion explores why traditional 'checkbox' training fails and how immersive, stress-inducing simulations like the cyber range are essential for building the muscle memory, confidence, and decision-making skills needed for effective incident response.