Startups who switch to Intercom can save up to $12,000/year
Startups who read beehiiv can receive a 90% discount on Intercom's AI-first customer service platform, plus Fin—the #1 AI agent for customer service—free for a full year.
That's like having a full-time human support agent at no cost.
What’s included?
6 Advanced Seats
Fin Copilot for free
300 Fin Resolutions per month
Who’s eligible?
Intercom’s program is for high-growth, high-potential companies that are:
Up to series A (including A)
Currently not an Intercom customer
Up to 15 employees
Want to appear here? Talk with us
Vulnerability
CISA Directs Federal Agencies to Identify and Mitigate Potential Compromise of Cisco Devices
CISA has issued Emergency Directive ED 25-03, signaling a high-risk security situation for federal networks using Cisco ASA and Firepower devices.
The directive requires agencies to quickly identify all affected devices, collect memory files for analysis, and either disconnect unsupported systems or upgrade them immediately.
This action is in response to actively exploited vulnerabilities that could allow attackers to access sensitive systems or disrupt operations.
For CIOs and CISOs, the key takeaway is that timely compliance is critical to prevent breaches and maintain operational security. Agencies must prioritize patching, auditing, and monitoring to reduce exposure to these high-severity threats.
Overall, the directive highlights the need for proactive asset management and rapid incident response in protecting enterprise and government infrastructure.
Budget
Preemptive cybersecurity to dominate 50% of security spend by 2030
Gartner predicts that by 2030, half of all cybersecurity spending will go toward preemptive solutions, up from under 5% today.
Preemptive cybersecurity uses AI and machine learning to anticipate threats before they happen. It includes predictive threat intelligence, automated defenses, and deception techniques to spot attacks early.
Traditional detection-and-response methods will no longer be enough, as attackers increasingly use AI to bypass standard defenses. Organizations will need automated systems that act independently to protect critical assets.
The next step is the Autonomous Cyber Immune System (ACIS), which creates a decentralized, adaptive defense across interconnected systems. Early adoption of ACIS is crucial to stay ahead of evolving cyber threats.
Companies will shift toward specialized solutions tailored to specific industries, applications, and attack types. Collaboration between vendors and interoperability of security tools will become vital.
Leaders who fail to invest in preemptive cybersecurity risk major breaches and market setbacks in the coming years.
Governance
How CISOs Can Drive Effective AI Governance
AI is becoming central to business, and CISOs now face the challenge of guiding its safe use.
The goal is not to block AI but to create governance that allows innovation without putting data or compliance at risk.
Effective AI governance starts with understanding real-world use. CISOs should track which AI tools are in use, how data flows, and the risks introduced by external services.
Tools like AI Bills of Materials and model registries give clear visibility, while cross-functional committees ensure oversight is shared across security, legal, HR, and business teams.
Policies must match the pace of the organization. Rules written too rigidly or too slowly can leave gaps, causing employees to use unapproved tools and increasing risk. Governance should be flexible, evolving with new AI applications, leadership changes, and employee practices.
Sustainable AI governance focuses on making safe practices easy. Providing approved AI tools and reinforcing positive behavior encourages employees to follow guidelines. Security teams should also use AI defensively to reduce noise, validate alerts, and maintain analyst oversight. Protecting AI systems from adversarial threats is equally important.
Compliance
Strike Graph 2025 State of AI in Compliance Report
Compliance is getting more complicated, and organizations are feeling the pressure to keep up.
According to Strike Graph’s 2025 survey, many companies manage four or more compliance frameworks, including SOC 2, GDPR, HIPAA, and ISO 27001, and the number is expected to grow.
Most compliance teams are worried about staying ahead. Only a small fraction feels highly confident that their current processes can scale with their organization.
This concern is driving interest in AI and automation, with over 70% of respondents planning to add AI tools to help with compliance in the next year.
Despite the interest, AI adoption is still limited. Just over 10% of companies have implemented autonomous AI systems in compliance tasks, and many are evaluating AI-powered GRC (governance, risk, and compliance) platforms.
Choosing the right AI-driven compliance platform is critical. Nearly 80% of compliance leaders consider AI capabilities a major factor when selecting solutions, emphasizing the need for systems that integrate well with existing security controls.
For CISOs, the main takeaway is that AI can help manage regulatory demands, but oversight, validation, and secure implementation are essential to prevent compliance failures and reduce risk exposure.
Survey
5 Takeaways for Security Leaders from the State of DDoS Defenses Survey
DDoS attacks remain a significant threat, yet many organizations are not fully prepared.
A MazeBolt survey of 300 CISOs and senior security leaders found that companies face an average of nearly four damaging attacks per year.
Despite higher investments in protection, readiness has not improved. Most organizations test defenses only once a year or less and testing often requires maintenance windows that limit coverage.
No organization reported fully automated DDoS protection. Even the most advanced systems require manual intervention to adjust configurations and remediate issues after an attack begins.
Continuous, nondisruptive testing and automated vulnerability reporting are seen as valuable solutions. These approaches allow companies to identify weaknesses and receive remediation guidance without affecting live services.
The key takeaway for CISOs is that traditional testing and protection methods leave gaps. Implementing ongoing, automated validation can significantly reduce the risk of damaging DDoS attacks.
Vulnerability
Vulnerability in Salesforce AI could be tricked into leaking CRM data
Salesforce recently fixed a critical vulnerability in its Agentforce AI platform that could have exposed sensitive CRM data.
Researchers at Noma Security discovered that attackers could hide malicious instructions inside routine customer forms.
Attackers exploited Web-to-Lead forms by embedding hidden instructions that the AI would follow alongside legitimate requests.
This could allow them to exfiltrate CRM data without triggering standard security alerts. A previously expired domain on Salesforce’s allowlist increased the risk, showing how small gaps in trusted configurations can become significant attack vectors.
Salesforce mitigated the issue by enforcing strict URL allowlists and improving input validation. However, prompt injection remains a persistent threat in AI systems that interpret external inputs.
For CISOs, this incident underscores the importance of AI governance, continuous monitoring, and validation of AI workflows. Security teams must ensure that AI platforms handling sensitive data are regularly audited, inputs are sanitized, and potential injection points are monitored to prevent data breaches.
The broader implication is clear: as AI adoption grows, CISOs must expand their security strategies to include AI-specific risks and ensure these systems do not become a vector for compromise.
That’s all for this week.