Explains why Zero Trust must start at the session layer, via NHP, to hide endpoints and reduce AI-driven attack surfaces.
AI agents expand the attack surface at machine speed. This article covers the Replit incident, consent fatigue, and runtime policy-based authorization.
Explore how AI accelerates token sprawl, why legacy IAM struggles, and practical steps to shrink non-human identity risk.
Explains how CSA STAR guides cloud-first organizations to manage identity risk, govern access, and continuously assure cloud ...
Explores LPCI, a new security vulnerability in agentic AI, its lifecycle, attack methods, and proposed defenses.
Explains why traditional IGA fails for non-human identities and outlines continuous, context-driven governance for AI agents ...
Retrieval augmented generation (RAG) is an effective technique used by AI engineers to develop large language model (LLM) powered applications. However, the lack of security controls in RAG-based LLM ...
Software-as-a-Service (SaaS) applications have become foundational to modern business operations. However, organizations are also facing a rising tide of security challenges, including visibility gaps ...
Tenable® is the Exposure Management company. Approximately 43,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its ...