Security Unlocked
AI Security May 20, 2026

The Affordability Problem Nobody Talked About at RSA

Vendors at RSA 2026 sold agentic SOC capability as the answer to alert overload. The pricing model underneath, metered tokens against enterprise data volumes, was never on the keynote agenda. The organizations the affordability gap actually threatens are the ones not in the room.

Read Article
Dark Reading CSO Online Help Net Security AI Journal Infosecurity Magazine Unite.AI CTO Club Fortra Streaming Media

Foundry Expert Contributor

Recent Articles

Behavioral Security

The Detection Paradigm Is Broken: Why Behavioral SE Defense Is the Next Frontier

AI-assisted social engineering has eliminated the imperfection signals that detection tooling was built to find. The residual signal lives in behavior, not content. The vendors built for content scanning cannot pivot, and the gap is where the next significant security company gets built.

Threat Intelligence

The Threat Actor Is a Fiction: Why Attribution's Core Unit Is Breaking

M-Trends 2026 shows the median time between initial access and downstream handoff dropped to 22 seconds. That number is not primarily a detection challenge. It is an epistemological one. The 'threat actor' as an analytical unit is becoming structurally incoherent, and attribution methodology has not caught up.

AI Security

Your Name Is on the Final Report

The SANS panel at RSA 2026 named irresponsible AI adoption as one of the five most dangerous new attack techniques. When an agentic security system makes the wrong call, the accountability does not dissolve into the architecture. It migrates to a person. That person is you.

Cyber Strategy

DLP Is Underwater: How the Exfiltration Economy Inverted in Six Weeks

The economic case for DLP rested on a stable ratio between attacker cost per exfiltration event and defender cost per prevented event. Six weeks of pipeline data show that ratio fully inverted. Large language models collapsed attacker cost to a prompt; defender cost has not moved. DLP programs that have not restructured their architecture are now structurally underwater, and five independent exfiltration channels are the evidence.

Behavioral Security

Model Intuition: The SOC Skill Agentic AI Will Demand From Every Analyst

When agents triage 200 alerts and surface five, the analyst's job is no longer processing signals. It is judging whether the system processing them was sound. That judgment, model intuition, is the difference between an output that looks right and one that is structurally right. Without it, agentic SOCs scale the wrong answers as efficiently as the right ones.

AI Security

Invisible by Default: AI Middleware Is the New Soft Target

Three AI middleware vulnerabilities (LiteLLM, LeRobot, Entra Agent ID) hit the same architectural layer in the same week, all pre-auth or unauthenticated, with one being exploited thirty-six hours after disclosure. The seams of the AI stack are shipping faster than security teams can map them, and middleware that earns trust through utility is becoming the next high-value target.

Curated threat intelligence through a behavioral lens

Three Point One

When a vulnerability transmits your database credentials to a third-party endpoint by design and scores CVSS 3.1, the problem is not the vulnerability, it is the triage system that will deprioritize it.

dbt MCP CVSS credential-security AI-toolchain developer-security vulnerability-management CVE-2026-44970 CVE-2026-44968
Read Briefing

The Weekly Brief, free.