Attending RSA? Reserve your spot at Anzenna’s mixer on April 29—request your invite now.
Attending RSA? Reserve your spot at Anzenna’s mixer on April 29—request your invite now.

AI Security 101: What You Need to Know to Take Action

Artificial Intelligence (AI) has introduced both new challenges and new opportunities to cyber security. On the one hand, cyber criminals leverage AI capabilities to create attacks that are more advanced and with wider scale than anything before. This is possible, since AI is a huge force multiplier for these hackers. We’re covering that aspect of […]

What is Generative AI in Cybersecurity

Generative AI is a field within artificial intelligence. GenAI digests enormous amounts of data, and later creates new content, such as text, images, videos or music, based on what it learned from the data it digested. While the roots of generative AI go back to the 1950s and 1960s, it’s only in the last decade that GenAI leaped forward and gained wide adoption. The most famous leap, and public recognition, occurred in late 2022, when OpenAI launched its ChatGPT. This launch has shaken the business world in ways we don’t yet fully understand.

What is Cyber Security? The Different Types of Cybersecurity

You lock the doors and they come down the vents. You patch the system and they phish your senior copywriter. You upgrade your firewall and someone shares a sensitive link in Slack.
Cybersecurity plays out across cloud platforms, remote teams, legacy infrastructure, and a revolving door of unknown adversaries. It’s not only about protecting your data — it’s about managing risk, optimizing operations, reinforcing resilience, and defending trust and as much about strategy as it is software. And it never, ever stands still.

What is Insider Risk and How to Manage It

When most people think about cybersecurity they picture hackers breaking into networks from some far-off location. But what if the real risk is much closer to home? In fact, some of the biggest security threats companies face today come from inside. Not necessarily from people with bad intentions, but often from simple mistakes, negligence, or small oversights that spiral into big problems.

What Is Data Exfiltration | Detection & Prevention Techniques?

When they go to work on any given Tuesday morning, bank employees are not usually expecting a robbery. But, just in case, banks are prepared with multiple layers of security.
Their security would be incomplete if they just focused on keeping bad guys out; they also need systems in place to make it harder for anyone (even their own employees!) to steal the money.

Anzenna + Jamf: Uncover and Remediate Hidden Risks with AI-Powered Insights

Modern businesses face threats from all angles – and some of the most dangerous risks come from within. Misconfigured devices, shadow applications, and users operating outside security policy can fly under the radar – until it’s too late. That’s why Anzenna and Jamf teamed up. Anzenna is now a Jamf Solution partner and is listed […]

Insider Security Risk: A Growing Pandemic in Cybersecurity

As a former CISO with over 25 years of experience, I’ve witnessed some of the most damaging security breaches—most of which were caused by Insiders. Insiders refers to employees, contractors, and anyone with legitimate access to an organization’s environment. Whether intentional or accidental, insider actions remain a primary vector for cyber threats. Common Insider Risks […]

Anzenna Launches First-of-Its-Kind Agentic AI security solution

Anzenna’s agentic AI security platform takes cybersecurity beyond detection—automating real-time threat remediation to stop insider risks, IP exfiltration, rogue apps and compliance violations instantly. By seamlessly integrating with existing security tools, Anzenna eliminates manual effort, enforces security policies at scale, and ensures organizations stay protected without added complexity. [San Francisco, CA] – Anzenna, the pioneer […]

Announcing the Anzenna Browser Extension

Anzenna’s new browser extension offers a lightweight, privacy-focused solution to address key concerns like data exfiltration, shadow IT, and unsafe password usage.