Click any tag below to further narrow down your results
Links
This article introduces Opti, an AI-driven identity and access management (IAM) tool designed to enhance security and streamline processes. It emphasizes how Opti analyzes access behavior and automates risk remediation, aiming to reduce manual oversight and improve compliance.
This article explores how new diagnostic codes and AI-driven solutions are reshaping healthcare operations, from billing to patient care. It also discusses the convergence of cyber and physical security in public and private sectors, emphasizing the need for unified systems to enhance safety and efficiency.
This article discusses how AI is changing the code review process for both solo developers and teams. It emphasizes the need for evidence of working code, highlights the risks of relying too heavily on AI, and outlines best practices for integrating AI into code reviews while maintaining human oversight.
GitHub Agentic Workflows automate tasks in your repositories using AI. You can define workflows in markdown, and they integrate with GitHub features like Actions and Issues. The system prioritizes security with sandboxed execution and limited permissions.
This article benchmarks GPT-5.1, Claude Opus 4.5, and Gemini 3 Pro for security operations tasks. GPT-5.1 and Opus 4.5 show improved accuracy and speed, while Gemini 3 Pro lags behind. The findings help teams choose the best AI model for automation in SecOps.
This article introduces Sumo Logic's Dojo AI, a new approach to security operations that emphasizes resilience over reaction. It details how specialized AI agents streamline analyst workflows by summarizing alerts, generating queries, and providing context, allowing analysts to focus on significant threats rather than drowning in noise.
Codacy introduces a hybrid code review engine that enhances Pull Request feedback by identifying logic gaps, security issues, and code complexity. It automates the review process, letting developers ship code faster and with more confidence.
TierZero offers AI production agents that streamline incident management, alerts, and support queries for engineering teams. By automating investigations and providing context-driven insights, it reduces the time engineers spend troubleshooting, allowing them to focus on development. The system aims to enhance efficiency while maintaining security through auditable processes.
Shannon is an AI tool designed to autonomously conduct penetration tests on web applications. It identifies vulnerabilities by executing real exploits, not just alerts, helping teams secure their code continuously rather than waiting for annual tests. This approach closes the security gap that arises from frequent code deployment.
GitHub Agentic Workflows automate repository tasks using AI, allowing users to create workflows in markdown instead of YAML. It integrates with GitHub features for improved efficiency, all while maintaining security through sandboxed execution and controlled permissions. The tool is still in early development, so caution is advised.
This article outlines how Context AI enhances business operations by automating workflows and integrating with existing tools. It emphasizes the platform's ability to learn from users, generate deliverables, and ensure security in deployment options. The deployment process is designed to be quick, taking less than a month from discovery to rollout.
The article discusses Stakpak's efforts to simplify DevOps by addressing the challenges developers face with infrastructure management. CEO George Fahmy highlights the shortcomings of current AI tools in automating tasks that developers dislike and outlines Stakpak's solutions for security, tool fragmentation, and knowledge sharing.
HashiCorp reflects on 2025, highlighting the challenges of cloud complexity faced by organizations across various sectors. Key themes include the need for unified automation, addressing identity sprawl, and leveraging AI to enhance infrastructure management and security.
Slack's Security Engineering team details how they developed AI agents to enhance their investigation process for security alerts. The article outlines their transition from a basic prototype to a structured system that uses defined personas to streamline investigations and improve accuracy.
This article discusses Airia, an enterprise AI platform designed for secure deployment and orchestration of AI agents. It focuses on addressing cybersecurity risks while enabling teams at all skill levels to build and manage AI solutions effectively. The platform aims to streamline AI adoption across various organizational functions.
This article discusses StackAI, a platform that enables businesses to convert processes into AI agents in a matter of minutes. It highlights features like data extraction, knowledge retrieval, and document generation, designed to enhance efficiency across various enterprise functions. The platform supports over 100 integrations and emphasizes enterprise-grade security measures.
This article presents findings from Atlassian's survey of over 500 IT professionals regarding incident management in 2025. It highlights the growing use of AI in managing incidents despite security concerns, revealing key pain points and future trends in IT service management.
The article discusses AI Security Posture Management (SPM) and its importance in enhancing cybersecurity measures for businesses. It highlights how AI-driven tools can help organizations assess and improve their security posture by identifying vulnerabilities and automating responses to threats. Additionally, it outlines the benefits of integrating AI into security strategies for better risk management and compliance.
ZAPISEC WAF CoPilot is an AI-driven security tool designed to automate the process of vulnerability detection and firewall rule generation, significantly reducing the workload for security teams. By integrating with various WAF providers, it streamlines the transition from identifying security issues to implementing solutions, while also offering educational resources for teams to better understand vulnerabilities. The tool supports multiple platforms, ensuring seamless and scalable application protection.
Delve offers AI-driven solutions to streamline compliance processes, saving businesses time and effort while ensuring they meet necessary security standards like SOC 2 and GDPR. Their platform automates evidence collection and provides expert support, helping companies to close deals more effectively by proving their compliance status.
Learn how organizations can quickly achieve compliance and manage security risks through automation and AI integration. Vanta provides solutions tailored for startups, mid-market, and enterprise businesses, ensuring streamlined processes for compliance and risk management.
An AI-powered tool, sqlmap-ai, enhances SQL injection testing by automating processes such as result analysis and providing step-by-step suggestions tailored to specific database management systems. It supports various AI providers and features adaptive testing, making it user-friendly for both experts and newcomers in cybersecurity.
The article discusses the automation of security questionnaires using artificial intelligence, highlighting the efficiency and accuracy improvements AI can bring to the process. It emphasizes the benefits of using AI to streamline the completion of security assessments, reducing manual effort and enhancing data integrity. The piece also explores potential challenges and considerations for implementing AI solutions in security questionnaire workflows.
Delve automates compliance processes through AI agents, helping businesses save time and enhance security while achieving necessary certifications like SOC 2 and GDPR. Their service includes personalized support and resources to streamline compliance efforts, enabling companies to close deals faster and demonstrate trustworthiness to clients.
The Arctic Wolf AI Security Assistant enhances the Aurora Platform by offering customers easy access to security insights, facilitating investigations, and improving alert understanding. It provides instant answers, contextual enrichment, and actionable summaries by leveraging the platform's extensive data lake and Arctic Wolf's global security operations centers.
Repeater Strike is a new AI-powered extension for Burp Suite that automates the detection of IDOR and similar vulnerabilities by analyzing Repeater traffic and generating smart regular expressions. It enhances manual testing by allowing users to uncover a broader set of actionable findings with minimal effort, while also offering tools to create and edit Strike Rules. The extension is currently in an experimental phase and requires users to be on the Early Adopter channel.
Automate your web security documentation with the new "Document My Pentest" Burp Suite extension that captures your testing process in real-time. This open-source tool leverages AI to generate structured reports, reducing repetitive note-taking during penetration tests while highlighting the importance of precise prompt engineering for improved vulnerability analysis.
Model Communication Protocol (MCP) is emerging as a standardized method for integrating AI tools and language models, promising to enhance automation and modularity in enterprise applications. While MCP shows potential for streamlining connections between clients and external services, it still faces challenges in security, governance, and scalability before it can be fully embraced in production environments. Organizations are encouraged to explore MCP's capabilities while prioritizing best practices in security and observability.
Dropzone offers a demo of its AI-powered SOC analyst, which automates the investigation of security alerts to enhance efficiency and reduce alert fatigue for security teams. The demo is browser-based and showcases the autonomous capabilities of Dropzone AI, allowing users to experience its integration with various security tools and its effectiveness in real-world scenarios.
The article discusses the integration of Claude, an AI system developed by Anthropic, to automate security reviews in software development. By leveraging Claude's capabilities, teams can enhance their security processes, reduce manual effort, and improve overall code quality. This innovation aims to streamline security practices in the tech industry.