<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Security Expert</title>
    <description>The latest articles on DEV Community by Security Expert (@securityleader).</description>
    <link>https://dev.to/securityleader</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3827143%2Fe71c428a-ab40-40dc-b4a2-df15f8d42b28.png</url>
      <title>DEV Community: Security Expert</title>
      <link>https://dev.to/securityleader</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/securityleader"/>
    <language>en</language>
    <item>
      <title>I think the AI vs AI cybersecurity debate is missing the real risk</title>
      <dc:creator>Security Expert</dc:creator>
      <pubDate>Thu, 02 Apr 2026 12:15:00 +0000</pubDate>
      <link>https://dev.to/securityleader/i-think-the-ai-vs-ai-cybersecurity-debate-is-missing-the-real-risk-517i</link>
      <guid>https://dev.to/securityleader/i-think-the-ai-vs-ai-cybersecurity-debate-is-missing-the-real-risk-517i</guid>
      <description>&lt;p&gt;Everyone’s talking about attackers using AI vs defenders using AI.&lt;/p&gt;

&lt;p&gt;But after working closely with teams at Periscope Technologies Inc, I’m starting to feel like that’s not where things are breaking.&lt;/p&gt;

&lt;p&gt;What we’re seeing more often:&lt;/p&gt;

&lt;p&gt;AI inside companies already has:&lt;/p&gt;

&lt;p&gt;• Access to sensitive data&lt;br&gt;
• Ability to trigger workflows&lt;br&gt;
• Decision-making power&lt;/p&gt;

&lt;p&gt;But very little verification around:&lt;/p&gt;

&lt;p&gt;👉 What it’s doing&lt;br&gt;
👉 Why it’s doing it&lt;br&gt;
👉 Whether it should be doing it&lt;/p&gt;

&lt;p&gt;Traditional security made sense when:&lt;/p&gt;

&lt;p&gt;• Users were human&lt;br&gt;
• Behavior was predictable&lt;br&gt;
• Access was controlled&lt;/p&gt;

&lt;p&gt;AI doesn’t fit that model at all.&lt;/p&gt;

&lt;p&gt;Feels like we’re focusing heavily on external AI threats…&lt;/p&gt;

&lt;p&gt;While ignoring a new category of risk:&lt;/p&gt;

&lt;p&gt;Unverified AI execution inside systems&lt;/p&gt;

&lt;p&gt;Curious if others here are seeing this?&lt;/p&gt;

&lt;p&gt;Or is the focus still mostly on external threats?&lt;/p&gt;


&lt;div class="crayons-card c-embed text-styles text-styles--secondary"&gt;
    &lt;div class="c-embed__content"&gt;
      &lt;div class="c-embed__body flex items-center justify-between"&gt;
        &lt;a href="https://periscope-tech.com/periscope-secure-access-platform" rel="noopener noreferrer" class="c-link fw-bold flex items-center"&gt;
          &lt;span class="mr-2"&gt;periscope-tech.com&lt;/span&gt;
          

        &lt;/a&gt;
      &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;


</description>
      <category>security</category>
      <category>ai</category>
      <category>development</category>
      <category>news</category>
    </item>
    <item>
      <title>$14.5B wiped out in a day after an AI shock overreaction or real signal?</title>
      <dc:creator>Security Expert</dc:creator>
      <pubDate>Mon, 30 Mar 2026 10:47:32 +0000</pubDate>
      <link>https://dev.to/securityleader/145b-wiped-out-in-a-day-after-an-ai-shock-overreaction-or-real-signal-4lmf</link>
      <guid>https://dev.to/securityleader/145b-wiped-out-in-a-day-after-an-ai-shock-overreaction-or-real-signal-4lmf</guid>
      <description>&lt;p&gt;A $14.5B drop in cybersecurity stocks triggered by an AI-related event is being called market volatility.&lt;/p&gt;

&lt;p&gt;Not sure I agree.&lt;br&gt;
Feels more like a signal.&lt;/p&gt;

&lt;p&gt;AI is moving faster than security can keep up.&lt;/p&gt;

&lt;p&gt;And most companies are already using AI internally for:&lt;/p&gt;

&lt;p&gt;• Data access&lt;br&gt;
• Decision-making&lt;br&gt;
• Workflow automation&lt;/p&gt;

&lt;p&gt;But very few have real control or visibility into:&lt;/p&gt;

&lt;p&gt;👉 What it’s doing&lt;br&gt;
👉 What data it’s touching&lt;br&gt;
👉 What decisions it’s making&lt;/p&gt;

&lt;p&gt;Working with teams at Periscope, this gap shows up a lot.&lt;/p&gt;

&lt;p&gt;Not in adoption.&lt;/p&gt;

&lt;p&gt;In control.&lt;br&gt;
Curious how others see this:&lt;/p&gt;

&lt;p&gt;Is this just hype…&lt;br&gt;
or an early warning?&lt;/p&gt;

&lt;p&gt;&lt;a href="https://periscope-tech.com/periscope-secure-access-platform" rel="noopener noreferrer"&gt;https://periscope-tech.com/periscope-secure-access-platform&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>news</category>
      <category>ai</category>
      <category>microsoft</category>
    </item>
    <item>
      <title>What basic security checks do you actually follow every week?</title>
      <dc:creator>Security Expert</dc:creator>
      <pubDate>Fri, 27 Mar 2026 10:58:16 +0000</pubDate>
      <link>https://dev.to/securityleader/what-basic-security-checks-do-you-actually-follow-every-week-54e1</link>
      <guid>https://dev.to/securityleader/what-basic-security-checks-do-you-actually-follow-every-week-54e1</guid>
      <description>&lt;p&gt;In many setups I’ve seen, the real issues aren’t complex — it’s small things getting missed:&lt;/p&gt;

&lt;p&gt;Old user/vendor access still active&lt;br&gt;
Backups assumed to be working&lt;br&gt;
Critical updates delayed&lt;br&gt;
Alerts no one checks&lt;br&gt;
No clear owner if something breaks&lt;/p&gt;

&lt;p&gt;Individually, these don’t feel urgent.&lt;br&gt;
But that’s usually where problems start.&lt;/p&gt;

&lt;p&gt;Do you follow a weekly checklist for this?&lt;br&gt;
Or is it more reactive in your environment?&lt;/p&gt;

&lt;p&gt;&lt;a href="https://periscope-tech.com/periscope-secure-access-platform" rel="noopener noreferrer"&gt;https://periscope-tech.com/periscope-secure-access-platform&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>ai</category>
      <category>cybersecurity</category>
      <category>discuss</category>
    </item>
    <item>
      <title>Deploying Agentic AI Safely: Lessons from This Week in AI</title>
      <dc:creator>Security Expert</dc:creator>
      <pubDate>Mon, 23 Mar 2026 11:24:45 +0000</pubDate>
      <link>https://dev.to/securityleader/deploying-agentic-ai-safely-lessons-from-this-week-in-ai-dc7</link>
      <guid>https://dev.to/securityleader/deploying-agentic-ai-safely-lessons-from-this-week-in-ai-dc7</guid>
      <description>&lt;p&gt;This week, agentic AI made headlines:&lt;/p&gt;

&lt;p&gt;Kill-switches being implemented&lt;br&gt;
Agents treated like employees with identities&lt;br&gt;
Legal challenges emerging&lt;br&gt;
Dedicated infrastructure for execution&lt;/p&gt;

&lt;p&gt;Most deployments fail because control and monitoring aren’t built-in.&lt;/p&gt;

&lt;p&gt;At Periscope, we deploy secure, production-ready agentic workflows. Try 1 workflow risk-free for 2 weeks, with monitoring, guardrails, and permissions baked in. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://periscope-tech.com/agentic-factory" rel="noopener noreferrer"&gt;https://periscope-tech.com/agentic-factory&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Why Replacing Hospital Systems Fails (And What Actually Works)</title>
      <dc:creator>Security Expert</dc:creator>
      <pubDate>Fri, 20 Mar 2026 11:00:55 +0000</pubDate>
      <link>https://dev.to/securityleader/why-replacing-hospital-systems-fails-and-what-actually-works-3nil</link>
      <guid>https://dev.to/securityleader/why-replacing-hospital-systems-fails-and-what-actually-works-3nil</guid>
      <description>&lt;p&gt;Most hospitals already have the systems they need.&lt;/p&gt;

&lt;p&gt;EHR. CRM. RCM. Contact center.&lt;/p&gt;

&lt;p&gt;The real problem?&lt;br&gt;
They don’t work well together.&lt;/p&gt;

&lt;p&gt;That’s where most “AI transformations” go wrong —&lt;br&gt;
they try to replace instead of optimize.&lt;/p&gt;

&lt;p&gt;A more practical approach:&lt;/p&gt;

&lt;p&gt;Embed AI into existing workflows across&lt;br&gt;
intake → scheduling → care → billing.&lt;/p&gt;

&lt;p&gt;Instead of adding complexity, it removes friction.&lt;/p&gt;

&lt;p&gt;What changes:&lt;/p&gt;

&lt;p&gt;Intake becomes faster&lt;/p&gt;

&lt;p&gt;Admin workload drops&lt;/p&gt;

&lt;p&gt;Revenue leakage is reduced&lt;/p&gt;

&lt;p&gt;No rip-and-replace.&lt;br&gt;
No operational disruption.&lt;/p&gt;

&lt;p&gt;Start with one workflow. Measure impact. Expand from there.&lt;/p&gt;

&lt;p&gt;Full approach:&lt;br&gt;
&lt;a href="https://periscope-tech.com/agentic-factory" rel="noopener noreferrer"&gt;https://periscope-tech.com/agentic-factory&lt;/a&gt;&lt;/p&gt;

</description>
      <category>healthcare</category>
      <category>ai</category>
      <category>agentaichallenge</category>
      <category>security</category>
    </item>
    <item>
      <title>SaaS is quietly being replaced by Agent-as-a-Service (AaaS) — are we ready for this?</title>
      <dc:creator>Security Expert</dc:creator>
      <pubDate>Tue, 17 Mar 2026 16:26:33 +0000</pubDate>
      <link>https://dev.to/securityleader/saas-is-quietly-being-replaced-by-agent-as-a-service-aaas-are-we-ready-for-this-5a06</link>
      <guid>https://dev.to/securityleader/saas-is-quietly-being-replaced-by-agent-as-a-service-aaas-are-we-ready-for-this-5a06</guid>
      <description>&lt;p&gt;This week had some interesting signals:&lt;/p&gt;

&lt;p&gt;NVIDIA pushing infrastructure for AI agents&lt;/p&gt;

&lt;p&gt;Alibaba launching enterprise agent platforms&lt;/p&gt;

&lt;p&gt;Feels like we’re moving from SaaS → systems that actually execute tasks.&lt;/p&gt;

&lt;p&gt;Not just dashboards, but AI that:&lt;/p&gt;

&lt;p&gt;updates systems&lt;/p&gt;

&lt;p&gt;triggers workflows&lt;/p&gt;

&lt;p&gt;makes decisions&lt;/p&gt;

&lt;p&gt;The interesting part:&lt;/p&gt;

&lt;p&gt;The biggest challenge isn’t capability.&lt;br&gt;
It’s control.&lt;/p&gt;

&lt;p&gt;If an AI agent takes the wrong action inside your stack, the risk is very real.&lt;/p&gt;

&lt;p&gt;Curious how people here are thinking about this:&lt;/p&gt;

&lt;p&gt;Are you experimenting with agents yet?&lt;br&gt;
Or does this still feel too early / risky?&lt;/p&gt;

&lt;p&gt;

&lt;/p&gt;
&lt;div class="crayons-card c-embed text-styles text-styles--secondary"&gt;
    &lt;div class="c-embed__content"&gt;
      &lt;div class="c-embed__body flex items-center justify-between"&gt;
        &lt;a href="https://periscope-tech.com/agentic-factory" rel="noopener noreferrer" class="c-link fw-bold flex items-center"&gt;
          &lt;span class="mr-2"&gt;periscope-tech.com&lt;/span&gt;
          

        &lt;/a&gt;
      &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;




</description>
      <category>ai</category>
      <category>programming</category>
      <category>security</category>
      <category>discuss</category>
    </item>
    <item>
      <title>Fake Claude Code Download Pages Are Delivering Infostealer Malware</title>
      <dc:creator>Security Expert</dc:creator>
      <pubDate>Mon, 16 Mar 2026 11:36:59 +0000</pubDate>
      <link>https://dev.to/securityleader/fake-claude-code-download-pages-are-delivering-infostealer-malware-585f</link>
      <guid>https://dev.to/securityleader/fake-claude-code-download-pages-are-delivering-infostealer-malware-585f</guid>
      <description>&lt;p&gt;As AI development tools continue to grow in popularity, attackers are beginning to exploit their ecosystems.&lt;/p&gt;

&lt;p&gt;A recent campaign is distributing fake Claude Code download pages that mimic legitimate installers.&lt;/p&gt;

&lt;p&gt;The attack relies on sponsored search advertisements, meaning developers searching for Claude Code may encounter the malicious page before the real one.&lt;/p&gt;

&lt;p&gt;If the installation command is copied and executed, the malware deploys infostealers capable of capturing:&lt;/p&gt;

&lt;p&gt;• Browser credentials&lt;br&gt;
• Session cookies&lt;br&gt;
• API tokens&lt;br&gt;
• Crypto wallet data&lt;/p&gt;

&lt;p&gt;This is another sign that AI tooling ecosystems are becoming a new supply-chain attack vector for developers.&lt;/p&gt;

&lt;p&gt;Full threat analysis:&lt;br&gt;
&lt;a href="https://blog.periscope-tech.com/new-threat-alert-fake-claude-code-downloads-delivering-infostealers/" rel="noopener noreferrer"&gt;https://blog.periscope-tech.com/new-threat-alert-fake-claude-code-downloads-delivering-infostealers/&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  cybersecurity #devops #infosec #ai #security
&lt;/h1&gt;

</description>
      <category>ai</category>
      <category>cybersecurity</category>
      <category>news</category>
      <category>security</category>
    </item>
  </channel>
</rss>
