Defense in depth for autonomous AI agents
Designing Secure Autonomous AI Agents with Defense in Depth AI agents are moving beyond assistance
Designing Secure Autonomous AI Agents with Defense in Depth AI agents are moving beyond assistance
In this article Delivery Module types Botnet operations Who is Secret Blizzard? Mitigation and protection
In this article Core Idea: From TTPs to Logs Approaches for Synthetic Attack Log Generation Evaluation Datasets References Learn more
In this article Why Dirty Frag matters Technical overview Exploitation scenarios Mitigation guidance Post-mitigation integrity
In this article A representative case study: Semantic Kernel CVE-2026-26030: In-Memory Vector Store CVE-2026-25592: Arbitrary
Security operations are entering a new phase. As attack techniques grow faster and more complex,
In this article Multi-step social engineering campaign leading to credential theft Mitigation and protection guidance
In this article Vulnerability details Mitigation and protection guidance Microsoft Defender XDR detections References Learn
New capabilities in Microsoft Agent 365; new Microsoft Defender and GitHub integration At Microsoft, security
The Deputy CISO blog series is where Microsoft Deputy Chief Information Security Officers (CISOs) share their thoughts on
©2025 ASUN Consulting. All Rights Reserved.