AI isn't creating new cyberattacks. It's making existing ones faster and more scalable. Learn what Anthropic's research really reveals about AI-enabled threats and how organizations can prepare.
Resources
Blog
Greg Anderson
Blogs by Greg Anderson
Learn how Sprocket’s AI Remediation Assistance turns vague vulnerability findings into clear, actionable fixes.
Rotating pentesters every year may sound like getting “fresh eyes,” but it often resets progress and weakens security maturity. Learn why continuity-based penetration testing, anchored in frameworks like MITRE ATT&CK and iterative feedback loops, drives deeper insight, faster remediation, and stronger defenses over time.
Comcast Business Cybersecurity Threat Report analyzed events, revealing how attackers are shifting tactics and accelerating the pace at which exposures become exploitable. We will expand on four of the threats that keep showing up in breach postmortems, how they work in reality, and what organizations should do about them.
Discover the importance of Attack Surface Management (ASM) and what you're overlooking to protect your business from cyber threats.
Discover why Continuous Threat Exposure Management (CTEM) is crucial for security leaders. Learn how moving to real-time threat management can enhance your organization's cybersecurity resilience.