The New Enterprise Attack Surface: AI Agents, Browsers, and Invisible Data Flows
For decades, enterprise security strategies have been built around a relatively stable understanding of risk. Users logged in from managed devices, applications lived in known environments, and access patterns followed predictable paths. Even as cloud adoption grew, security teams could still reason about traffic flows, trust boundaries, and enforcement points with a fair degree of confidence. However, that clarity is now slipping away. The rapid adoption of AI across enterprises has fundamentally altered how work gets done. Employees increasingly rely on AI-powered tools to write, analyze, code, summarize, and automate tasks. AI is no longer limited to experimental labs or…
Getting Organized Around Operational Resilience
Senior leadership is incorporating operational resilience discussions and assessments into their core business conversations with the board and across the...
READ MORE >
Colonial Pipeline Attack Puts Spotlight on Third Party Management and Operational Resilience
When the cyber-attack on the Colonial Pipeline hit the news, it was another sterling example that preparedness and backup plans...
READ MORE >
Using AI-Driven Defense to Counter Unicode Exploits
Using AI-Driven Defense to Counter Unicode Exploits
AI-assisted alert triage and investigation can close the gap – without replacing email security A class of threats has recently...
READ MORE >
Data Mobility Emerging as a Must-Have Backup Software Feature
Data Mobility Emerging as a Must-Have Backup Software Feature
Organizations may view their historic struggles with backup, recovery, and perhaps even disaster recovery as over. Better backup software, disk-...
READ MORE >