We’re giving powerful digital identities access without the oversight we’d require for a human employee. And when agentic AI is over-privileged or poorly governed, it quietly introduces the same kind of risk as a trusted insider.
posted on
January 21, 2026
Transcript
Browse More
Security Shorts
Security Shorts
Boom Happens
May 3, 2024
"Boom" is the execution of a cyberattack. While the industry talks about "left of boom" (proactive) and "right of boom" (response), there is no silver bullet on either side. A solid security stance requires a dual approach.
Security Shorts
Security Shorts
From VPNs to ZTNA: Are You Solving the Problem or Just Moving It?
October 8, 2025
Many organizations have embraced ZTNA as a path to Zero Trust, but too often, the underlying trust model remains unchanged. Most ZTNA deployments are just VPN concentrators in the cloud.
Security Shorts
Security Shorts
Find Your Gaps Before Attackers Do
February 23, 2026
Attack surface management is about understanding where you're exposed. If you don’t know where the gaps are, attackers will find them for you.