datasecurity (3)

31142462887?profile=RESIZE_400xWith attackers able to move at AI speed, defenders cannot rely on the techniques and instincts they have come to trust.   "That means putting in place stronger identity controls," said Jack Butler, a senior enterprise solutions engineer at Sumo Logic, a SecOps vendor.  "That means putting in place the more robust logging program and correlation engines to detect all of these in real time and reassess signals of trust. It needs to be reassessed dynamically."[1]

As for what to do about the substan

31135298080?profile=RESIZE_400xThe surge in security vulnerabilities stems primarily from organizations’ increasing adoption of agentic AI applications, particularly those utilizing technologies such as Model Context Protocol (MCP).  This rapid deployment, combined with immature security practices and emerging attack vectors, is creating substantial risk exposure across the enterprise landscape.[1]

Senior Director Analyst at Gartner, Aaron Lord, explained that MCP's design philosophy prioritizes interoperability, ease of use,

13660412470?profile=RESIZE_400xCybersecurity researchers have observed a surge in identity-driven cyberattacks targeting employee login credentials.   According to a new report by eSentire’s Threat Response Unit (TRU), between 2024 and the first quarter of 2025, 19,000 identity-related cyber investigations revealed a 156% increase in such threats compared to 2023.  These incidents now account for 59% of all confirmed threats across eSentire’s customer base of over 2000 organizations.[1]

One of the biggest enablers of this tre