Securing Homegrown Agents in Runtime: The Value of Zenity + Microsoft Foundry
Andrew Silberman

Securing Homegrown Agents in Runtime: The Value of Zenity + Microsoft Foundry

Over the past year, Microsoft Foundry has emerged as a cornerstone for enterprises building and deploying homegrown...

Product
Why Soft Guardrails Get Us Hacked: The Case for Hard Boundaries in Agentic AI
Chris Hughes

Why Soft Guardrails Get Us Hacked: The Case for Hard Boundaries in Agentic AI

One recurring theme in my research and writing on agentic AI security has been the distinction between soft guardrails...

Security
AI Agent Governance: The CISO Checklist for the New AI Agent Reality
Cinthia Portugal

AI Agent Governance: The CISO Checklist for the New AI Agent Reality

AI Agent Governance Is Now a CISO-Level Priority AI agents are rapidly becoming embedded in enterprise workflows,...

Security
Securing AI Where It Acts: Why Agents Now Define AI  Risks
Chris Hughes

Securing AI Where It Acts: Why Agents Now Define AI Risks

AI agent security risks are emerging as a critical challenge in enterprise AI adoption. As agents move beyond generating...

Current Events
From Policy Planning to Agentic Action: Providing an Execution Roadmap for the President’s Agentic AI Security Priorities
Taylor Roberts

From Policy Planning to Agentic Action: Providing an Execution Roadmap for the President’s Agentic AI Security Priorities

On March 6, 2026, the White House released its National Cybersecurity Strategy. While the document is relatively...

Current Events
PerplexedBrowser: Accepting a Meeting or Handing Your Local Files to an Attacker?
Greg Zemlin

PerplexedBrowser: Accepting a Meeting or Handing Your Local Files to an Attacker?

Note: This post is part of a coordinated disclosure by Zenity Labs detailing the PleaseFix vulnerability family...

Security
What a Rogue Vacuum Army Teaches Us About Securing AI
Andrew Silberman

What a Rogue Vacuum Army Teaches Us About Securing AI

If you’re like me, you’ve been enthralled with the recent story, expertly written by Sean Hollister at The Verge,...

Current Events
Governing Agentic AI: A Practical Framework for the Enterprise
Chris Hughes

Governing Agentic AI: A Practical Framework for the Enterprise

In my previous piece, "The Agentic AI Governance Blind Spot," I laid out what I believe is one of the most critical...

Security
OpenClaw Security Checklist for CISOs: Securing the New Agent Attack Surface
Cinthia Portugal

OpenClaw Security Checklist for CISOs: Securing the New Agent Attack Surface

OpenClaw exposes a fundamental misalignment between how traditional enterprise security is designed and how AI...

Security
The Agentic AI Governance Blind Spot: Why the Leading Frameworks Are Already Outdated
Chris Hughes

The Agentic AI Governance Blind Spot: Why the Leading Frameworks Are Already Outdated

Approach any security, technology and business leader and they will stress the importance of governance to you....

Security
From IDE to CLI: Securing Agentic Coding Assistants
Ofir Pearl

From IDE to CLI: Securing Agentic Coding Assistants

Today we’re excited to announce that Zenity now protects the most powerful, enterprise-critical coding assistants...

Product
Seeing What AI Touches: Introducing Data Lens
Greg Zemlin

Seeing What AI Touches: Introducing Data Lens

Security teams are entering a new phase of risk driven by the combination of AI agents and broad access to internal...

Product

Secure Your Agents

We’d love to chat with you about how your team can secure and govern AI Agents everywhere.

Get a Demo