Send us a text Today's explores the impact of agentic AI on security landscapes, particularly concerning identity management. It begins by defining AI agents as digital workers that independently pursue goals, outlining their components like perception, reasoning, and learning, and their multi-layered infrastructure. The discussion then transitions to the new attack surfaces introduced by AI agents, such as identity spoofing, privilege creep, and prompt injection, highlighting how agents’ dyn...
All content for The Cyberman Show is the property of Prashant Mishra and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text Today's explores the impact of agentic AI on security landscapes, particularly concerning identity management. It begins by defining AI agents as digital workers that independently pursue goals, outlining their components like perception, reasoning, and learning, and their multi-layered infrastructure. The discussion then transitions to the new attack surfaces introduced by AI agents, such as identity spoofing, privilege creep, and prompt injection, highlighting how agents’ dyn...
Send us a text The recap contains activity in cybersecurity industry including - Mergers and Acquisitions - Breaches from various industries like healthcare, media, IT, Retail etc - Interesting reports and articles that I recommend for reading. - Gartner MQ for SIEM for 2024 Link to the blog that has links https://thecyberman.substack.com/ Support the show Google Drive link for Podcast content: https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnko My Profile on LinkedIn: ...
The Cyberman Show
Send us a text Today's explores the impact of agentic AI on security landscapes, particularly concerning identity management. It begins by defining AI agents as digital workers that independently pursue goals, outlining their components like perception, reasoning, and learning, and their multi-layered infrastructure. The discussion then transitions to the new attack surfaces introduced by AI agents, such as identity spoofing, privilege creep, and prompt injection, highlighting how agents’ dyn...