Iam

Android malware that acts like a person and AI agents that act like malware

Android malware that acts like a person and AI agents that act like malware

In this discussion, experts Sridhar Muppidi and Cris Thomas explore the security implications of emerging AI technologies. They analyze new attack vectors using malicious AI agents, the critical gap in AI governance, the evolution of malware to mimic human behavior, and a novel smishing scheme designed to manipulate stock markets. The conversation also covers the current state and future of bug bounty programs in an AI-driven world.

Identity Fabric: How AI Enhances IAM & Modern Cybersecurity

Identity Fabric: How AI Enhances IAM & Modern Cybersecurity

Bob Kalka from IBM and Tyler Lynch from HashiCorp discuss the critical disconnect between managing human and non-human identities, which contributes to 80% of all cyberattacks. They introduce the concept of an 'Identity Fabric'—an AI-augmented approach to unify existing tools—and outline six key use cases and a three-phase strategy to address modern identity and access management (IAM) challenges.

2025 Cost of a Data Breach: AI Risks, Shadow AI, & Solutions

2025 Cost of a Data Breach: AI Risks, Shadow AI, & Solutions

A breakdown of key findings from the IBM 2025 Cost of a Data Breach Report, focusing on the financial impact of breaches, the dual role of AI in attacks and defense, primary threat vectors, and actionable recommendations for improving security posture.