top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


The AI-Assisted Coding Paradox: Balancing Productivity Gains Against Elevated Security Risks
This guest blog was contributed by Donald Fischer, Vice President at Sonar . AI-assisted coding is rapidly transforming enterprise software development, promising unprecedented speed and efficiency. But this transformation is not without risk. A recent report from Sonar, " The Coding Personalities of Leading LLMs ," delivered a stark finding: while a model like Claude Sonnet 4 provides significant performance gains, it also introduces a staggering 93% more vulnerabilities con
Oct 27


AI Has Joined the Attack. Are Your Defenses Ready?
This guest blog was contributed by Brad Gerlach, aProduct Manager at 11:11 Systems Cybersecurity has always been a high-stakes game of cat and mouse. Defenders build taller walls, and attackers find longer ladders. But with the rapid rise of AI, the very nature of this conflict is changing. AI is no longer just a tool for defenders; it’s being weaponized by cybercriminals to automate and scale attacks with unprecedented speed and sophistication. For IT security professionals,
Oct 24


The Workforce of the Future: Human Ingenuity and AI Intelligence
This guest blog was contributed by Tom Findling , CEO and Co-Founder, Conifers.ai Artificial intelligence is reshaping the landscape, giving attackers new speed and scale while forcing defenders to rethink their operating methods. At the same time, the ongoing global shortage of skilled analysts has left security teams stretched thin and struggling to keep pace. Security leaders can’t hire enough people to tackle the problem. And they’ve invested a great deal in tools that s
Oct 24


How to Prevent Attackers from Stealing Data in Plain Sight
This guest blog was contributed by Dr. Süleyman Özarslan , co-founder of Picus Security and VP of Picus Labs Data exfiltration remains the easiest part of the attack chain, with organizations blocking 3% of attempts . That weakness gives attackers an almost unfettered path to stealing sensitive data. Ransomware groups no longer need to rely on file encryption. Their ability to quietly steal data and threaten its exposure powers most ransomware operations. They understand th
Oct 21


Balancing Speed and Security in the Age of AI-Generated Code
This guest blog was contributed by Mark Lambert, Chief Product Officer at ArmorCode . Within 90 days, your developers will generate more code than they produced all last year. Most of it will be written by AI, not humans. And unless your security strategy has fundamentally changed in the past six months, you're already losing control. The numbers are staggering. Microsoft and Google each report that  more than 30% of their code is now AI-generated . At ArmorCode, we're seeing
Oct 20
bottom of page