
Sign up to save your podcasts
Or
Recent studies have shown how AI agents have expanded the attack surface for Federal agencies.
This week at Feds At the Edge, we’ll explore why fundamentals such as visibility, inventory, runtime, and least-permissive access control, are more critical than ever.
Phishing and security training are good starting points, but developers must learn what tools to use to be able to use AI an appropriate manner.
Rob Roser, Ph.D., CISO at Idaho National Laboratory, highlights the surge in APIs—essential for communication but prime targets for attackers. Stephen Ringo, Senior Solutions Engineer at Akamai, outlines four key defenses for AI-driven data: discovery, posture, runtime protection, and continuous testing.
Tune in on your favorite podcast today as our panel underscores the urgency of integrating API security into comprehensive cybersecurity strategies and recommends programs to test and validate APIs before production deployment.
.
5
55 ratings
Recent studies have shown how AI agents have expanded the attack surface for Federal agencies.
This week at Feds At the Edge, we’ll explore why fundamentals such as visibility, inventory, runtime, and least-permissive access control, are more critical than ever.
Phishing and security training are good starting points, but developers must learn what tools to use to be able to use AI an appropriate manner.
Rob Roser, Ph.D., CISO at Idaho National Laboratory, highlights the surge in APIs—essential for communication but prime targets for attackers. Stephen Ringo, Senior Solutions Engineer at Akamai, outlines four key defenses for AI-driven data: discovery, posture, runtime protection, and continuous testing.
Tune in on your favorite podcast today as our panel underscores the urgency of integrating API security into comprehensive cybersecurity strategies and recommends programs to test and validate APIs before production deployment.
.