Send us a text Today's explores the impact of agentic AI on security landscapes, particularly concerning identity management. It begins by defining AI agents as digital workers that independently pursue goals, outlining their components like perception, reasoning, and learning, and their multi-layered infrastructure. The discussion then transitions to the new attack surfaces introduced by AI agents, such as identity spoofing, privilege creep, and prompt injection, highlighting how agents’ dyn...
All content for The Cyberman Show is the property of Prashant Mishra and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text Today's explores the impact of agentic AI on security landscapes, particularly concerning identity management. It begins by defining AI agents as digital workers that independently pursue goals, outlining their components like perception, reasoning, and learning, and their multi-layered infrastructure. The discussion then transitions to the new attack surfaces introduced by AI agents, such as identity spoofing, privilege creep, and prompt injection, highlighting how agents’ dyn...
Send us a text Join us in this insightful episode as we delve into the world of Network Detection and Response (NDR). Discover how NDR enhances your network security by detecting threats in real-time, providing deep visibility into network activities, and enabling rapid incident response. Support the show Google Drive link for Podcast content: https://drive.google.com/drive/folders/10vmcQ-oqqFDPojywrfYousPcqhvisnko My Profile on LinkedIn: https://www.linkedin.com/in/prashantmishra11/ Youtube...
The Cyberman Show
Send us a text Today's explores the impact of agentic AI on security landscapes, particularly concerning identity management. It begins by defining AI agents as digital workers that independently pursue goals, outlining their components like perception, reasoning, and learning, and their multi-layered infrastructure. The discussion then transitions to the new attack surfaces introduced by AI agents, such as identity spoofing, privilege creep, and prompt injection, highlighting how agents’ dyn...