Overview
Explore
Events
Select a tab
55 results found
AI Security: Practicing Good Model File Security
As organizations continue to incorporate AI solutions into their workflows and user toolset, the requirements for securely creating, acquiring and storing large AI model files have grown significantly. This blog post explores the risks presented by third-party AI model files and best practices to guard against those risks.
Blog
•Sep 3, 2024
Hack the Future: AI Meets Security
World Wide Technology's Ina Poecher and Ashley Schrage recap a hands-on WWT event where young women in tech explored real-world AI security challenges, learned about prompt injection and experienced the impact of collaborative STEM education.
Blog
•Jul 11, 2025
Bridging AI and Cybersecurity: What Check Point MCP Servers Mean for Enterprise Security
Check Point's new MCP Server enables secure, structured integration between AI tools and Check Point's security infrastructure by exposing firewall policies, objects, and logs through a standardized Model Context Protocol interface. This allows large language models like Claude or GPT to query security environments using natural language, dramatically accelerating tasks such as policy analysis, compliance checks, and incident enrichment without requiring scripts or direct API calls. Deployed on-premises for full control and visibility, the MCP Server empowers security teams to automate workflows while maintaining strong governance and auditability.
Blog
•Jul 1, 2025
Onum, Pangea and the Path to the Agentic SOC: Highlights from Fal.Con 2025
AI is revolutionizing cybersecurity, transforming both attackers and defenders. At Fal.Con 2025, CrowdStrike unveiled its vision of an agentic SOC powered by intelligent agents and streaming pipelines. This shift towards AI-native security platforms aims to enhance collaboration, autonomy and governance, heralding a new era of intelligent, proactive security operations.
Blog
•Sep 19, 2025
The Quantum Computing Threat - Part 1
As we become more "any connection from anywhere" the means of secure transactions becomes even more critical.
Blog
•May 1, 2023
How Generative AI Impacts Identity and Access Management
Explore the potential of generative AI to transform the four pillars of Identity and Access Management (IAM): authentication, authorization, administration and auditing.
Blog
•Aug 7, 2023
Leading the AI Revolution: Key Takeaways from the First Ai day
Discover the key insights from WWT's inaugural Ai day event in Dallas, where experts delved into practical AI applications, enterprise data strategies, and the balance of innovation and security in AI deployment.
Blog
•Oct 28, 2024
Cisco Live 2025: Unlocking the Future of Compute & AI
Cisco Live 2025 showcased a transformative AI strategy, emphasizing scalable infrastructure and secure networking. Here are our takeaways and insights from an exciting week in San Diego.
Blog
•Jun 18, 2025
Zenith Live 2025 Unveils Zscaler Agentic AI: Your Digital Kingdom's New Guardians
Zenith Live 2025 unveiled Zscaler's Agentic AI, transforming cybersecurity into a proactive, intelligent defense. With AI heroes like the Rogue, Paladin, Wizard, Cleric and Bard, this strategy combines autonomous systems with human ingenuity to protect digital realms. Which role do you believe is most vital in this AI-driven defense?
Blog
•Jul 8, 2025
Combating Insurance Fraud with AI: Enhancing Detection Capabilities and Mitigating Risks
By analyzing large amounts of data to identify patterns and anomalies indicative of fraud, AI-powered fraud detection systems can improve efficiency and revolutionize customer experiences in the insurance industry.
Blog
•Jun 7, 2024
The Quantum Computing Threat – Part 2
Many advancements have occurred since I last wrote about the Quantum Threat, especially around NIST PQC, IBM, Intel and Q-SENSE. Here, I share my research, what Quantum really means and real guidance for my peers and clients alike.
Blog
•May 6, 2024
Empowering Safe AI Adoption with Palo Alto Networks' AI Access Security
Palo Alto Networks' AI Access Security offers a comprehensive solution for managing and securing generative AI applications. It provides real-time visibility, granular access controls and advanced data protection, enabling organizations to harness AI's potential while minimizing risks of data leakage and unauthorized access. Embrace AI responsibly with AI Access Security.
Blog
•Nov 15, 2024