#security-automation

[ follow ]
Information security
fromSecurityWeek
1 week ago

Cogent Security Raises $42 Million for AI-Driven Vulnerability Management

Cogent Security raised $42M Series A to build autonomous AI agents that automate vulnerability investigation, prioritization, and remediation across environments.
fromTheregister
1 week ago

HackerOne updates AI policy after researchers raise concerns

HackerOne does not train generative AI models, internally or through third-party providers, on researcher submissions or customer confidential data. Neither, she continued, are researcher submissions used to "train, fine-tune, or otherwise improve generative AI models." And third-party model providers are not permitted to "retain or use researcher or customer data for their own model training." Sprague assured researchers: "You are not inputs to our models... Hai is designed to complement your work, not replace it."
Information security
fromSecurityWeek
2 weeks ago

Nucleus Raises $20 Million for Exposure Management

Integrating security and asset data from over 200 connectors, the platform unifies business context and AI-based intelligence into a single pane, offering visibility and enabling risk prioritization and reduction. Nucleus relies on automation to enhance customers' vulnerability management programs. It correlates flaws with real-world threat data from multiple sources, normalizes it, maps assets to specific teams, and uses workflows for faster remediation. According to Nucleus, its vendor-agnostic approach covers exposure across tools, users, environments, and business units, unifies context, and enables coordinated action.
Venture
Venture
fromAlleywatch
2 months ago

Prime Security Raises $20M to Scale Design-Stage Security Reviews with AI Agents

Agentic Security Architect AI performs planning-stage security design reviews, delivering 100% coverage, reducing manual effort over 60%, and accelerating risk resolution up to 30x.
Artificial intelligence
fromZDNET
3 months ago

Enterprises are not prepared for a world of malicious AI agents

AI agents enlarge enterprise attack surfaces and require robust identity, credential, and visibility controls while AI-driven security automation will be part of the solution.
Information security
fromInfoQ
4 months ago

Slack Security: Inside the New Anomaly Event Response Architecture

Slack's Anomaly Event Response autonomously detects high-confidence threat behaviors and rapidly terminates affected sessions, reducing detection-to-mitigation time from hours to minutes.
Information security
fromThe Hacker News
4 months ago

Architectures, Risks, and Adoption: How to Assess and Choose the Right AI-SOC Platform

Traditional SOC models cannot scale; AI-driven automation and a mindset shift are required to handle overwhelming alert volumes and improve detection and response.
Software development
fromIT Pro
4 months ago

Using AI to code? Watch your security debt

AI accelerates code deployment but security automation lags, causing application security testing to slow development and create mounting security debt.
#cybersecurity
fromHackernoon
2 years ago
Tech industry

GitGuardian Launches MCP Server To Bring Secrets Security Into Developer Workflows | HackerNoon

fromHackernoon
2 years ago
Tech industry

GitGuardian Launches MCP Server To Bring Secrets Security Into Developer Workflows | HackerNoon

Information security
fromHackernoon
11 months ago

AI-Driven Cybersecurity Compliance: A Strategic Imperative | HackerNoon

Investment in security automation and AI can save millions, highlighting the importance of proactive cybersecurity compliance.
Information security
fromDevOps.com
5 months ago

What Makes Vulnerability Scanning Effective in Fast-Moving DevSecOps Pipelines Today? - DevOps.com

Effective vulnerability scanning must be fast, integrated into CI/CD, and prioritize quality to enable secure continuous delivery without blocking developer flow.
Artificial intelligence
fromInfoQ
5 months ago

Agentic AI Expands Into SecOps to Ease Human Workloads

Agentic AI is automating low-value security tasks—triage, reverse-engineering, phishing analysis, and forensic workflows—producing evidence-rich outputs that improve analyst efficiency while prioritizing explainability.
Tech industry
fromTechzine Global
9 months ago

The Techzine Perspective: RSAC 2025 is about AI security, integrated solutions, and the quantum threat

AI integration in security requires human oversight to ensure responsible systems.
Collaboration between tech vendors is critical for effective AI security.
[ Load more ]