Network Security

From Access to Execution: Securing Identity in the Age of Autonomous Agents

The definition of identity is expanding. Employees are no longer the only actors – or ‘workers’ – inside enterprise environments. Service accounts, APIs, workload identities, and increasingly autonomous AI agents are now executing actions on behalf of humans and systems at machine speed and scale. This is the next generation of identity and its risks. […]

From Access to Execution: Securing Identity in the Age of Autonomous Agents Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 8

The Good | Law Enforcement Arrest Extortionist, Phobos Affiliate & Financial Scammers A Dutch man was arrested this week after he allegedly downloaded confidential documents mistakenly shared with him and tried to extort authorities by refusing to delete them without compensation. The man kept the files, prompting a hacking investigation and a search of his

The Good, the Bad and the Ugly in Cybersecurity – Week 8 Read More »

OneClaw: Discovery and Observability for the Agentic Era

Autonomous agents and personal AI assistants are moving from experimentation to enterprise reality. Tools like OpenClaw (formerly Moltbot and Clawdbot), Nanobot and Picoclaw are being embedded across development environments, cloud workflows, and operational pipelines. They install quickly, evolve dynamically, and often operate with deep system-level access. For CISOs and security leaders, this presents a new

OneClaw: Discovery and Observability for the Agentic Era Read More »

Shadow Agents: How SentinelOne Secures the AI Tools That Act Like Users

AI adoption is accelerating faster than security programs can adapt. Organizations are already experiencing breaches tied directly to unsanctioned AI usage, at significantly higher cost than traditional incidents, while the vast majority still lack meaningful governance controls to manage the risk. Traditional cybersecurity measures are necessary but insufficient. Securing AI requires purpose-built capabilities that span

Shadow Agents: How SentinelOne Secures the AI Tools That Act Like Users Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 7

The Good | Authorities Crack Down on Identity, Romance Baiting & Phishing Schemes Two individuals have been indicted for a years-long scheme that used stolen identities from 3,000 victims to siphon $3 million from sportsbooks. Amitoj Kapoor and Siddharth Lillaney allegedly bought personally identifying information (PII) on dark markets and Telegram, opened thousands of fake

The Good, the Bad and the Ugly in Cybersecurity – Week 7 Read More »

ClawSec: Hardening OpenClaw Agents from the Inside Out

Autonomous agents are moving fast – from experimental side projects to real operational components inside development workflows and cloud environments. While agent capabilities are accelerating though, agent security itself has lagged behind. Most agent frameworks still assume implicit trust: There is trust in downloaded skills, prompts that evolve over time, and trust in agents not

ClawSec: Hardening OpenClaw Agents from the Inside Out Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 6

The Good | Former Google Engineer Steals AI Supercomputing Secrets for China Former Google software engineer Linwei Ding has been found guilty of economic espionage and trade secret theft after stealing sensitive AI supercomputing information and covertly sharing it with Chinese technology interests. Source: LinkedIn Ding was first indicted in March 2024 following an internal

The Good, the Bad and the Ugly in Cybersecurity – Week 6 Read More »

AI Security, From Data to Runtime: A Holistic Defense Approach

As organizations rush to adopt AI, they are discovering that traditional, siloed security tools cannot keep pace. The data is too vast, the infrastructure is too interconnected, and runtime environments are too dynamic. Security leaders are confronting a hard reality: AI cannot be secured with point solutions — it is just too broad. To scale

AI Security, From Data to Runtime: A Holistic Defense Approach Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 5

The Good | U.S. Authorities Charge ATM Hackers, Dismantle Darkmarket, and Seize ‘RAMP’ Forum A U.S. federal grand jury has charged 31 defendants for their roles in an ATM jackpotting operation linked to Venezuela’s Tren de Aragua gang. The indictment details 32 counts tied to the use of Ploutus malware to drain ATMs nationwide. After

The Good, the Bad and the Ugly in Cybersecurity – Week 5 Read More »

The Good, the Bad and the Ugly in Cybersecurity – Week 4

The Good | Authorities Expose RaaS Leaders, Prosecute Identity Hackers & Tighten EU Cybersecurity Rules Law enforcement in Ukraine and Germany have moved to dismantle Black Basta ransomware gang, confirming its leader and placing him on Europol and Interpol wanted lists. Identified as Oleg Evgenievich Nefedov, the Russian national is also known online as kurva,

The Good, the Bad and the Ugly in Cybersecurity – Week 4 Read More »