Send us a text Today's explores the impact of agentic AI on security landscapes, particularly concerning identity management. It begins by defining AI agents as digital workers that independently pursue goals, outlining their components like perception, reasoning, and learning, and their multi-layered infrastructure. The discussion then transitions to the new attack surfaces introduced by AI agents, such as identity spoofing, privilege creep, and prompt injection, highlighting how agents’ dyn...
All content for The Cyberman Show is the property of Prashant Mishra and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text Today's explores the impact of agentic AI on security landscapes, particularly concerning identity management. It begins by defining AI agents as digital workers that independently pursue goals, outlining their components like perception, reasoning, and learning, and their multi-layered infrastructure. The discussion then transitions to the new attack surfaces introduced by AI agents, such as identity spoofing, privilege creep, and prompt injection, highlighting how agents’ dyn...
Forrester Wave Security Analytics Report: Leaders, Trends & What It Means For YOU! #99
The Cyberman Show
18 minutes
3 months ago
Forrester Wave Security Analytics Report: Leaders, Trends & What It Means For YOU! #99
Send us a text Today's episode provides a comprehensive overview of a Forest Wave security analytics platform report, acting as a guide for understanding the evolving landscape of security solutions. The discussion centers on evaluating various platforms, including Security Information and Event Management (SIEM) and Extended Detection and Response (XDR) products, based on product features and strategic approaches. It highlights key evaluation parameters like analytics, user behavior analysis...
The Cyberman Show
Send us a text Today's explores the impact of agentic AI on security landscapes, particularly concerning identity management. It begins by defining AI agents as digital workers that independently pursue goals, outlining their components like perception, reasoning, and learning, and their multi-layered infrastructure. The discussion then transitions to the new attack surfaces introduced by AI agents, such as identity spoofing, privilege creep, and prompt injection, highlighting how agents’ dyn...