Cybersecurity

Zero Trust for Multi-Agent Systems // Surendra Narang | Venkata Gopi Kolla

Zero Trust for Multi-Agent Systems // Surendra Narang | Venkata Gopi Kolla

Explore the security challenges of Multi-Agent Systems (MAS) and learn how to apply Zero Trust principles to mitigate risks like prompt injection, privilege escalation, and data leakage. This summary details a reference architecture and practical strategies for building secure, autonomous systems.

Threat Intelligence: How Anthropic stops AI cybercrime

Threat Intelligence: How Anthropic stops AI cybercrime

Anthropic's Threat Intelligence team discusses their new report on how AI models are being used in sophisticated cybercrime operations. They cover the concept of "vibe hacking," a large-scale employment scam run by North Korea, and Anthropic’s multi-layered strategy to detect and counteract these threats.

Identity Fabric: How AI Enhances IAM & Modern Cybersecurity

Identity Fabric: How AI Enhances IAM & Modern Cybersecurity

Bob Kalka from IBM and Tyler Lynch from HashiCorp discuss the critical disconnect between managing human and non-human identities, which contributes to 80% of all cyberattacks. They introduce the concept of an 'Identity Fabric'—an AI-augmented approach to unify existing tools—and outline six key use cases and a three-phase strategy to address modern identity and access management (IAM) challenges.

ChatGPT study mode, shift from UX to AX and Cost of a Data Breach Report 2025

ChatGPT study mode, shift from UX to AX and Cost of a Data Breach Report 2025

Experts discuss the dual role of AI in education as a 'cognitive gym,' the shift from UX to Agentic Experience (AX) in software design, AI's application in historical research for decoding ancient texts, and the latest findings from the 2025 Cost of a Data Breach Report on AI-driven attacks and defenses.

2025 Cost of a Data Breach: AI Risks, Shadow AI, & Solutions

2025 Cost of a Data Breach: AI Risks, Shadow AI, & Solutions

A breakdown of key findings from the IBM 2025 Cost of a Data Breach Report, focusing on the financial impact of breaches, the dual role of AI in attacks and defense, primary threat vectors, and actionable recommendations for improving security posture.

Why Voice Security Is Your Next Big Problem

Why Voice Security Is Your Next Big Problem

Yishay Carmiel and Roy Zanbel of Apollo Defend explore the state of voice AI, detailing the shift from cascaded models to end-to-end speech-to-speech systems. They break down the imminent security threats, including accessible voice cloning and sophisticated agent-based attacks, and discuss the nascent defense mechanisms and the urgent need for a new layer of voice security for governments, enterprises, and consumers.