Monday, March 30, 2026
  • Login
  • Register
Technology Tutorials & Latest News | ByteBlock
  • Home
  • Tech News
  • Tech Tutorials
    • Networking
    • Computers
    • Mobile Devices & Tablets
    • Apps & Software
    • Cloud & Servers
    • IT Careers
    • AI
  • Reviews
  • Shop
    • Electronics & Gadgets
    • Apps & Software
    • Online Courses
    • Lifetime Subscription
No Result
View All Result
Tech Insight: Tutorials, Reviews & Latest News
No Result
View All Result
Home News Google

Cloud CISO Perspectives: RSAC: AI, security, and the workforce of the future

March 30, 2026
in Google
0 0
0

We’ve also seen how good intentions can go awry. With remarkable speed, OpenClaw has rapidly become a new supply-chain attack surface. Attackers have used it to distribute droppers, backdoors, infostealers and remote access tools, with many incidents so far this year. (We’re actually partnering with OpenClaw through VirusTotal scanning to detect malicious skills.)

Supply chain security is even more important in the AI era. Threat actors in the second half of 2025 exploited software-based vulnerabilities (44.5%) more frequently than weak credentials (27.2%), a significant increase from the start of 2025.

Identity is once again the new perimeter, so it’s vitally important as part of a robust AI strategy to manage shadow AI and govern agentic identities. In addition to focusing on identity as the key to securing agents, we advocate for treating data as the new perimeter and prompts as code, as part of a holistic approach as we’ve advocated through our Secure AI Framework and industry collaborations.

How AI is changing offense

We’ve seen three key ways that adversaries have been using AI to accomplish their goals:

  • New, less-skilled threat actors empowered by AI
  • New and existing groups using new AI techniques
  • A new level of speed, sophistication, and scale to attacks

AI has been lowering barriers to entry for less technically skilled actors, especially by allowing them to give instructions to a model. AI has also made it easier to discover zero-day vulnerabilities, conduct phishing attacks (especially voice phishing,) and develop malware.

AI agents are upending the previous commonly-held wisdom about the techniques that threat actors use. Cybercriminals, nation-state actors, and hacktivist groups use agents to automate spear-phishing attacks, develop sophisticated malware, and conduct disruptive campaigns.

There’s more to AI-enhanced attacks than just agents. There are new classes of attacks on AI systems, including autonomous attacks, prompt injection, distillation attacks, AI-enabled malware that can evade signature-based detection, and even attacks against agentic ecosystems by exploiting their supply chains.

Adversaries are using autonomous attacks to scale their operations — and the impact they have against targeted systems. One example of this is Hexstrike AI, which represents a paradigm shift from manual hacking to AI-orchestrated warfare.

With a standardized interface for more than 150 offensive security tools, Hexstrike AI allows an agent to hand off tasks from one tool to another without human intervention. It’s also openly available and already in use by nation-state aligned threat actors, and gaining significant attention in underground conversations.

AI, particularly agents, will accelerate intrusions and have already begun to outpace human-driven controls. We’ve seen AI-automated scanning used by threat actors to sift through stolen data for hard-coded keys and access tokens to help them expand their attacks to other organizations. Simultaneously, hand-off times between threat groups collapsed from eight hours in 2022 to 22 seconds last year.

How AI is changing defense

Despite all the benefits that adversaries are seeing from AI, it’s also boosting defenders in three critical ways:

  • We’re using AI to fight AI.
  • We’re orchestrating defense at a new pace and volume, beyond human scale.
  • We have a secret weapon: Context is the defender’s advantage.

AI-led defense is shifting from attack detection to pre-calculating and neutralizing the attack surface before the adversary arrives. Comprehensive identity management is key, with true Zero Trust access a necessary goal.

Organizations should turn to reputation-based risk modeling, agent observability, and identity to sanitize prompts. Also important is AI red teaming as part of a holistic approach to isolating agents at machine speed when anomalies are detected.

It’s impossible to defend the ever-growing volume of surfaces and alerts without AI. We’ve seen early adopters use the new Triage and Investigation agent to collapse the time-to-investigate for complex alerts from two hours down to just 15 to 30 minutes. We’ve also seen additional benefits from our AI-enhanced defense, such as using our Big Sleep agent to uncover and fix vulnerabilities before they can be exploited.

Context has become the defender’s advantage. When you understand your network and user behavior, you can better detect anomalies and prioritize risks based on business impact — and harden systems accordingly.

We need to move from agents with a human in the loop to human over the loop. Some of these gains will come from the agentic SOC, where security operations powered by AI agents can automate SOC workflows, and operate at speed and scale that was not possible before.

These changes can help reduce remediation from hours to seconds. We predict that by 2026 AI will autonomously resolve or escalate more than 90% of Tier 1 alerts, covering enrichment, categorization, and initial triage. The average enterprise analyst spends 30 minutes triaging a single alert: An agent can cut that down to five minutes, potentially saving $2.7 million annually.

A big part of AI security posture management will be the continuous discovery and inventory of AI assets and vulnerabilities at scale across multicloud environments.

All our news from RSA Conference

In addition to discussing all things AI, we made several key announcements last week:

  • Wiz news: We’ve completed our acquisition of Wiz, and revealed the AI-Application Protection Platform (AI-APP) and red, blue, and green security agents.
  • M-Trends: New research from Mandiant’s M-Trends 2026 and special report on AI risk and resilience can help organizations better understand the current threat landscape and how to keep defenses current.
  • Threat intelligence: Google Threat Intelligence Group (GTIG) officially debuted its Disruption Unit in our keynote from Sandra Joyce, vice-president, Google Threat Intelligence, as we collectively evaluate what we can do within existing authorities and regulatory frameworks to make it more difficult for malicious actors to succeed in their efforts.
  • Agentic SOC: We’re introducing new agents in the agentic SOC to help defenders focus on what matters most.
  • Check out our new security innovations in Chrome Enterprise, Security Command Center, network management, and more.

You can check out everything we announced at RSA Conference here.

ShareTweetShare
Previous Post

ID.me Scales and Fights AI Fraud with AlloyDB

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

You might also like

Cloud CISO Perspectives: RSAC: AI, security, and the workforce of the future

March 30, 2026

ID.me Scales and Fights AI Fraud with AlloyDB

March 30, 2026

Best WiFi Router For A Large Home | 2024

June 25, 2024

How to Set Up a Wireless Router as an Access Point

June 25, 2024
The LG MyView branding, which is making its debut in 2024, communicates the personalized user experience delivered by the company’s premium smart monitors.

LG MyView Smart Monitor Review

June 24, 2024
monotone logo block byte

Stay ahead in the tech world with Tech Insight. Explore in-depth tutorials, unbiased reviews, and the latest news on gadgets, software, and innovations. Join our community of tech enthusiasts today!

Stay Connected

  • Home
  • Tech News
  • Tech Tutorials
  • Reviews
  • Shop
  • About Us
  • Privacy Policy
  • Terms & Conditions

© 2024 Byte Block - Tech Insight: Tutorials, Reviews & Latest News. Made By Huwa.

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
  • Login
  • Sign Up
  • Cart
No Result
View All Result
  • Home
  • Tech News
  • Tech Tutorials
    • Networking
    • Computers
    • Mobile Devices & Tablets
    • Apps & Software
    • Cloud & Servers
    • IT Careers
    • AI
  • Reviews
  • Shop
    • Electronics & Gadgets
    • Apps & Software
    • Online Courses
    • Lifetime Subscription

© 2024 Byte Block - Tech Insight: Tutorials, Reviews & Latest News. Made By Huwa.

Login