15 posts

2. Security

Latest posts
Cranium AI on secutity exploitation
New AI Security Research Exposes Governance Gaps in Agentic Development Tools

Multi-stage attacks leverage trusted repositories and automation to bypass existing AI guardrails.

by Faye Waters
European Commission X investigation
European Commission Puts More Eyes On X As Deepfake Fallout Continues

In parallel to its existing inquiry, the European Commission has launched a new investigation into how risks are assessed and mitigated in connection with the deployment of Grok’s functionalities in X.

by Faye Waters
Apiiro Guardian Agent
Apiiro Introduces Guardian Agent to Prevent Non-Compliant Code Generation

Apiiro's Guardian Agent embeds preventive application security directly into AI coding workflows, shifting from reactive scanning to real-time risk prevention.

by Faye Waters
Federal software supply chain
Federal Software Supply Chain Rules Rolled Back

January 2026 OMB memo rescinds federal SBOM and attestation requirements, shifting security decisions to agencies.

by Faye Waters
Building Enterprise AI Security
Building Enterprise AI Security: From Guardrails to Governance

Experts discuss the practical steps organizations must take to secure AI, protect data, and operationalize responsible deployments.

by Faye Waters
Socket Threat Intel
Socket Launches Campaign-Level Intelligence with Threat Intel

Tracking helps teams quickly assess exposure and prioritize response across evolving supply chain threats.

by Faye Waters
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.