top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


AI Is Supercharging Work...and Your Attack Surface
This guest blog was contributed by Ben Henry, Field CTO at Komprise AI is now embedded in day-to-day work. Individuals and teams are using the technology to summarize reports, write emails, analyze data and accelerate the efficiency and automation of nearly every task. In the corporate world, productivity is rising, but so is risk. The AI tools themselves admittedly make mistakes, skewing results and sometimes delivering incorrect information and hallucinations. There is als
Dec 15, 2025


The AI-Assisted Coding Paradox: Balancing Productivity Gains Against Elevated Security Risks
This guest blog was contributed by Donald Fischer, Vice President at Sonar . AI-assisted coding is rapidly transforming enterprise software development, promising unprecedented speed and efficiency. But this transformation is not without risk. A recent report from Sonar, " The Coding Personalities of Leading LLMs ," delivered a stark finding: while a model like Claude Sonnet 4 provides significant performance gains, it also introduces a staggering 93% more vulnerabilities con
Oct 27, 2025


AI Has Joined the Attack. Are Your Defenses Ready?
This guest blog was contributed by Brad Gerlach, aProduct Manager at 11:11 Systems Cybersecurity has always been a high-stakes game of cat and mouse. Defenders build taller walls, and attackers find longer ladders. But with the rapid rise of AI, the very nature of this conflict is changing. AI is no longer just a tool for defenders; it’s being weaponized by cybercriminals to automate and scale attacks with unprecedented speed and sophistication. For IT security professionals,
Oct 24, 2025


The Workforce of the Future: Human Ingenuity and AI Intelligence
This guest blog was contributed by Tom Findling , CEO and Co-Founder, Conifers.ai Artificial intelligence is reshaping the landscape, giving attackers new speed and scale while forcing defenders to rethink their operating methods. At the same time, the ongoing global shortage of skilled analysts has left security teams stretched thin and struggling to keep pace. Security leaders can’t hire enough people to tackle the problem. And they’ve invested a great deal in tools that s
Oct 24, 2025


How to Prevent Attackers from Stealing Data in Plain Sight
This guest blog was contributed by Dr. Süleyman Özarslan , co-founder of Picus Security and VP of Picus Labs Data exfiltration remains the easiest part of the attack chain, with organizations blocking 3% of attempts . That weakness gives attackers an almost unfettered path to stealing sensitive data. Ransomware groups no longer need to rely on file encryption. Their ability to quietly steal data and threaten its exposure powers most ransomware operations. They understand th
Oct 21, 2025
bottom of page