Secnomic https://backline.ai/ Say goodbye to your security backlog Tue, 13 May 2025 06:00:52 +0000 en-US hourly 1 https://backline.ai/wp-content/uploads/2025/03/cropped-fav-32x32.png Secnomic https://backline.ai/ 32 32 The Rise of AI Agents in Cybersecurity: Insights from RSA Conference 2025 https://backline.ai/the-rise-of-ai-agents-in-cybersecurity-insights-from-rsa-conference-2025/ Mon, 12 May 2025 19:51:55 +0000 https://backline.ai/?p=833 <p>RSA Conference 2025 in San Francisco confirmed that AI agents are rapidly transforming cybersecurity, moving from simple copilots to autonomous systems capable of executing complex, multi-step tasks. This shift is already reshaping how organizations detect, respond to, and manage cyber threats, but the journey toward full automation, where AI can not only identify but also [&#8230;]</p> <p>The post <a href="https://backline.ai/the-rise-of-ai-agents-in-cybersecurity-insights-from-rsa-conference-2025/" data-wpel-link="internal">The Rise of AI Agents in Cybersecurity: Insights from RSA Conference 2025</a> appeared first on <a href="https://backline.ai" data-wpel-link="internal">Secnomic</a>.</p> <p>RSA Conference 2025 in San Francisco confirmed that <strong>AI agents are rapidly transforming cybersecurity</strong>, moving from simple copilots to autonomous systems capable of executing complex, multi-step tasks. This shift is already reshaping how organizations detect, respond to, and manage cyber threats, but the journey toward full automation, where AI can not only identify but also fix issues without human intervention, is still underway.</p> <h2>Fields Where AI Agents Are Shaping Cybersecurity</h2> <p>AI agents are now active across a growing number of cybersecurity domains, each with distinct capabilities and examples from RSA 2025:</p> <h3>1. Security Operations Automation</h3> <p>AI agents are streamlining security operations by handling repetitive tasks, triaging alerts, and automating incident response workflows. For example, several vendors at RSA showcased agents that can autonomously investigate threats, summarize incidents, and escalate only the most critical cases to human analysts, freeing up valuable time for more complex investigations<sup>[<a href="#ref">1</a>][<a href="#ref">2</a>][<a href="#ref">3</a>]</sup>.</p> <h3>2. Identity and Access Security</h3> <p>With identity-based attacks on the rise, AI agents are now central to monitoring and protecting digital identities, including non-human identities in cloud environments. These agents analyze behavioral patterns to detect anomalies, automate access reviews, and enforce zero trust policies, helping organizations defend against credential theft and privilege misuse<sup>[<a href="#ref">3</a>][<a href="#ref">4</a>]</sup>.</p> <h3>3. Threat Intelligence and Hunting</h3> <p>AI agents are used to aggregate threat intelligence from multiple sources, identify emerging attack patterns, and proactively hunt for threats in enterprise environments. At RSA, new tools demonstrated the ability to correlate threat data in real time, providing analysts with actionable insights and reducing time-to-detection<sup>[<a href="#ref">1</a>][<a href="#ref">2</a>]</sup>.</p> <h3>4. Phishing Defense and Security Awareness</h3> <p>Autonomous agents are replacing static security awareness training with real-time, personalized coaching. For example, Abnormal AI introduced an “AI Phishing Coach” that simulates attacks and provides immediate feedback to users, significantly reducing risky behaviors<sup>[<a href="#ref">2</a>]</sup>.</p> <h3>5. Data Security and Compliance Automation</h3> <p>AI agents are increasingly tasked with automating compliance checks, managing security documentation, and ensuring sensitive data is handled according to policy. These agents help organizations surface the right information for audits and streamline security reviews, reducing manual effort and improving transparency<sup>[<a href="#ref">3</a>]</sup>.</p> <h3>6. Cross-Platform Orchestration</h3> <p>Some AI agents showcased at RSA can coordinate actions across multiple security tools and platforms, such as triggering responses in IT service management systems or updating firewall rules, enabling a more unified and adaptive defense posture<sup>[<a href="#ref">1</a>][<a href="#ref">4</a>]</sup>.</p> <h2>The Unresolved Challenge: Closing the Remediation Gap</h2> <p>Despite these advances, <strong>true end-to-end automation, where AI agents not only detect different types of security findings (software vulnerabilities, cloud misconfigurations, etc.) but also remediate them without human intervention, remains out of reach</strong>. Several technical and operational hurdles stand in the way:</p> <ul> <li><strong>Complexity of Real-World Environments:</strong> Remediation often involves modifying code, reconfiguring systems, or deploying patches. These tasks require deep contextual understanding, creativity, and the ability to anticipate unintended consequences, capabilities that current AI agents lack<sup>[<a href="#ref">1</a>][<a href="#ref">5</a>]</sup>.</li> <li><strong>Security and Governance Risks:</strong> Autonomous actions by AI agents can introduce new vulnerabilities or disrupt business operations if not properly governed. For example, misconfigured or overly permissive agents could inadvertently escalate privileges or expose sensitive data<sup>[<a href="#ref">6</a>][5][7]</sup>. Proper authentication for AI Agent tools and one-time access are being used to make sure AI Agents are secured by default.</li> <li><strong>Attack Surface Expansion:</strong> AI agents themselves become new targets for attackers, who may exploit vulnerabilities in agent logic, prompt injection, or tool integrations to subvert their behavior or gain unauthorized access<sup>[<a href="#ref">6</a>][<a href="#ref">5</a>]</sup>. New AI protection vendors and emerging security best practices for AI Agents are focused on addressing this issue.</li> <li><strong>Integration and Data Quality Issues:</strong> Effective remediation often requires seamless integration with development and IT systems, as well as access to high-quality, unified data &#8211; something many organizations still struggle to achieve<sup>[<a href="#ref">3</a>]</sup>. The new advantages in AI Agent tooling and MCP can bridge this gap.</li> <li><strong>Technical Limitations:</strong> While existing LLMs can generate or fix code snippets, they often fail when lacking the full context, especially in large codebases. Without a clear understanding of the surrounding logic, dependencies, and security requirements, they are prone to introducing errors or insecure implementations. To effectively address complex security issues, models must be provided with well-scoped context and guided with precise, structured instructions.</li> </ul> <h2>Looking Ahead: Realizing the Promise of AI Agents in Cybersecurity</h2> <p>RSA 2025 made it clear that the journey toward fully autonomous cybersecurity is still unfolding, but the trajectory is clear. AI agents are no longer theoretical &#8211; they are already detecting threats, managing incidents, and offering strategic insights with impressive speed and scale. The next frontier is empowering them to not only identify and triage problems but also solve them by writing secure code, reconfiguring systems, and verifying that fixes are safe and effective. Achieving this vision will require advances in AI reasoning, stronger governance frameworks, and tighter integration between security, engineering, and IT teams.</p> <p>To get there, we need to think of AI agents not as standalone tools but as collaborators, working alongside security teams and developers. By embedding them directly into development workflows, training them on real-world remediation strategies, and designing them to operate under human oversight, we can begin to bridge the remediation gap safely and effectively.</p> <p>The future will likely be built on hybrid systems: AI agents that handle the tedious and time-consuming aspects of cybersecurity while humans steer complex decisions and edge cases. With continued investment in agent architecture, safety frameworks, and cross-functional collaboration, we can accelerate toward a world where security is not just reactive but also continuously self-healing.</p> <p>This vision isn’t science fiction &#8211; it’s within reach. The foundation has been laid. This is the frontier that industry leaders and innovators are now racing to reach, as highlighted throughout RSA 2025. Now it’s time to build on it.</p> <p><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-835" src="https://backline.ai/wp-content/uploads/2025/05/blog-ai.jpg" alt="" width="512" height="512" srcset="https://backline.ai/wp-content/uploads/2025/05/blog-ai.jpg 512w, https://backline.ai/wp-content/uploads/2025/05/blog-ai-300x300.jpg 300w, https://backline.ai/wp-content/uploads/2025/05/blog-ai-150x150.jpg 150w" sizes="(max-width: 512px) 100vw, 512px" /></p> <h2 id="ref">References</h2> <ol> <li><a href="https://cloud.google.com/blog/products/identity-security/the-dawn-of-agentic-ai-in-security-operations-at-rsac-2025" target="_blank" rel="noopener noreferrer nofollow external" data-wpel-link="external">https://cloud.google.com/blog/products/identity-security/the-dawn-of-agentic-ai-in-security-operations-at-rsac-2025</a></li> <li><a href="https://www.esecurityplanet.com/news/trends-rsa-conference-25-2/" target="_blank" rel="noopener noreferrer nofollow external" data-wpel-link="external">https://www.esecurityplanet.com/news/trends-rsa-conference-25-2/</a></li> <li><a href="https://safebase.io/blog/5-trends-rsa-2025" target="_blank" rel="noopener noreferrer nofollow external" data-wpel-link="external">https://safebase.io/blog/5-trends-rsa-2025</a></li> <li><a href="https://www.itpro.com/security/what-to-look-out-for-at-rsac-conference-2025" target="_blank" rel="noopener noreferrer nofollow external" data-wpel-link="external">https://www.itpro.com/security/what-to-look-out-for-at-rsac-conference-2025</a></li> <li><a href="https://www.rsaconference.com/library/blog/securing-the-future-innovative-cybersecurity-for-agentic-ai" target="_blank" rel="noopener noreferrer nofollow external" data-wpel-link="external">https://www.rsaconference.com/library/blog/securing-the-future-innovative-cybersecurity-for-agentic-ai</a></li> <li><a href="https://unit42.paloaltonetworks.com/agentic-ai-threats/" target="_blank" rel="noopener noreferrer nofollow external" data-wpel-link="external">https://unit42.paloaltonetworks.com/agentic-ai-threats/</a></li> <li><a href="https://www.youtube.com/watch?v=gJUxT4yuofA" target="_blank" rel="noopener noreferrer nofollow external" data-wpel-link="external">https://www.youtube.com/watch?v=gJUxT4yuofA</a></li> </ol> <p>The post <a href="https://backline.ai/the-rise-of-ai-agents-in-cybersecurity-insights-from-rsa-conference-2025/" data-wpel-link="internal">The Rise of AI Agents in Cybersecurity: Insights from RSA Conference 2025</a> appeared first on <a href="https://backline.ai" data-wpel-link="internal">Secnomic</a>.</p> Why Now? https://www.linkedin.com/posts/maorgoldberg_backline-cyber-autonomous-activity-7302441485092696064-6HAe/?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAC1itkBy2Kh0MY4q0OlHXlU3y5J4rC0ljw#new_tab Sun, 30 Mar 2025 06:31:18 +0000 https://backline.ai/?p=815 <p>Timing is everything. In sports, a fraction of a second could determine victory or defeat. </p> <p>The post <a href="https://www.linkedin.com/posts/maorgoldberg_backline-cyber-autonomous-activity-7302441485092696064-6HAe/?utm_source=share&#038;utm_medium=member_desktop&#038;rcm=ACoAAAC1itkBy2Kh0MY4q0OlHXlU3y5J4rC0ljw#new_tab" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">Why Now?</a> appeared first on <a href="https://backline.ai" data-wpel-link="internal">Secnomic</a>.</p> <p>The post <a href="https://www.linkedin.com/posts/maorgoldberg_backline-cyber-autonomous-activity-7302441485092696064-6HAe/?utm_source=share&#038;utm_medium=member_desktop&#038;rcm=ACoAAAC1itkBy2Kh0MY4q0OlHXlU3y5J4rC0ljw#new_tab" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">Why Now?</a> appeared first on <a href="https://backline.ai" data-wpel-link="internal">Secnomic</a>.</p> The State of Remediation: Why Security Backlogs Keep Growing https://backline.ai/the-state-of-remediation-why-security-backlogs-keep-growing/ Sat, 22 Mar 2025 11:52:18 +0000 https://backline.ai/?p=589 <p>In the ever-evolving world of cybersecurity, organizations are facing an overwhelming challenge: the growing backlog of unresolved security findings. Despite advances in detection technologies, the gap between identifying security findings and remediating them continues to widen. Security Findings? Let&#8217;s define what we mean by Security Findings. Sometimes also referred to as vulnerabilities, these security findings [&#8230;]</p> <p>The post <a href="https://backline.ai/the-state-of-remediation-why-security-backlogs-keep-growing/" data-wpel-link="internal">The State of Remediation: Why Security Backlogs Keep Growing</a> appeared first on <a href="https://backline.ai" data-wpel-link="internal">Secnomic</a>.</p> <p>In the ever-evolving world of cybersecurity, organizations are facing an overwhelming challenge: the growing backlog of unresolved security findings. Despite advances in detection technologies, the gap between identifying security findings and remediating them continues to widen.</p> <h2>Security Findings?</h2> <p>Let&#8217;s define what we mean by Security Findings. Sometimes also referred to as vulnerabilities, these security findings are detected by various tools that scan an organization’s code repositories, infrastructure, applications, and cloud environments. Tools like SCA (Software Composition Analysis), SAST (Static Application Security Testing), DAST (Dynamic Application Security Testing), CNAPP (Cloud-Native Application Protection Platform), and CIEM (Cloud Infrastructure Entitlement Management) uncover weaknesses such as:</p> <ul> <li><strong>Code vulnerabilities:</strong> Flaws in application code or third-party packages that can be exploited by attackers.</li> <li><strong>Configuration issues:</strong> Misconfigurations in cloud environments, servers, or applications that expose systems to unnecessary risk.</li> <li><strong>Identity-related exposures:</strong> Weak credentials or improperly managed permissions that attackers can exploit.</li> <li><strong>Exposed secrets:</strong> Issues that arise when tokens and secrets are exposed in code and configuration or not rotated regularly.</li> </ul> <p>Resolving these findings is critical for maintaining a secure posture, yet they often pile up faster than organizations can address them. Most of the problem lies not in detection but in what happens next.</p> <h2>Security Team&#8217;s Catch 22: Responsibility without Ownership</h2> <p>Security teams are responsible for security. They detect, triage and prioritize findings using these tools, but here’s the catch—they don’t own the code, configurations, or infrastructure they’re responsible with securing. Additionally, in most cases, they won’t know how to fix it or what would be the after effect of any of the changes.</p> <p>Instead, security teams must pass these findings to engineering teams, software developers or platform engineers, who have the authority and knowledge to implement fixes. However, this handoff is fraught with challenges:</p> <ol> <li><strong>Volume Overload:</strong> Security tools generate an overwhelming number of findings.</li> <li><strong>Collaboration Gaps:</strong> Security teams often &#8220;throw findings over the fence&#8221; to engineering teams without clear ownership or actionable context.</li> <li><strong>Proving Urgency:</strong> Security teams must either convince engineering teams to prioritize fixes or justify delays to auditors by downplaying the severity of unresolved issues.</li> </ol> <p>These dynamics create friction between teams and slows down remediation efforts. Most organizations report limited collaboration between security and development teams and some even describe their relationship as counterproductive.</p> <h2>Why Backlogs Keep Growing</h2> <h3>AI-Powered Threats</h3> <p>The rise of AI-driven cyberattacks has exacerbated the problem. Malicious actors now use AI agents to automate vulnerabilities and weaknesses discovery at an unprecedented scale:</p> <ul> <li>AI tools identify new vulnerabilities, weaknesses and exploits faster. Just 2 years ago the rate was 2000 a month &#8211; now it’s closer to 3000.</li> <li>AI tools start leveraging and combining these findings together, crafting sophisticated exploits that would be harder to evade.</li> </ul> <p>This surge further outpaces human capacity for remediation. As attackers get faster and smarter, organizations fall further behind.</p> <h3>More Security Tools Highlight The Paradox of Progress</h3> <p>Security vendors employ skilled researchers and analysts to uncover new findings and exploits, which is undeniably beneficial for advancing cybersecurity. However, this constant discovery process feeds into an ever-expanding list of issues that organizations must address:</p> <ul> <li>Each new finding adds to the pile, making it harder for security teams to prioritize and remediate effectively.</li> <li>The result is a cycle where the tools meant to protect systems also amplify the remediation burden often resulting in analysis/paralysis.</li> </ul> <h3>Working Around Remediation: The Management Overhead</h3> <p>Even before actual remediation actually starts, security teams often find themselves bogged down by management overhead, which diverts time and energy away from actually resolving findings.</p> <ul> <li><strong>Triaging Alerts:</strong> Security teams spend considerable time reviewing and categorizing alerts to determine their validity and priority. This process is often manual due to lack of trust in the tools’ judgement.</li> <li><strong>Identifying Issue Owners:</strong> A significant challenge in many organizations is identifying who owns the responsibility for fixing specific issues. This lack of clear ownership leads to delays as teams spend valuable time determining who should address each issue.</li> </ul> <h3>Remediating Findings: A Treacherous Road</h3> <p>Remediation is a high-stakes balancing act between security and stability. Fixing findings isn’t just about bumping versions or a simple configuration change. It is about navigating dependencies, handling breaking changes and their consequences, and ensuring business continuity. Any single fix can cascade into failures across interconnected systems.</p> <p>Validating fixes adds another layer of complexity. Ensuring that fixes effectively address findings without introducing new issues or breaking functionality. This often involves rigorous testing (hopefully) across multiple environments, which is time-consuming, resource-intensive and in most cases involves a lot of failures along the way.</p> <h2>Prioritization &#8211; A False Sense of Security</h2> <p>Prioritization is often introduced as the solution to managing the overwhelming number of security findings that organizations struggle to address. However, prioritization doesn&#8217;t solve the problem—it exacerbates it. It blindsides many vulnerabilities by pushing them down the list, ignoring critical context and leaving organizations exposed to risks that aren&#8217;t immediately visible or that are simple and easy to solve.</p> <h3>The Numbers Game: Overwhelmed by Volume</h3> <p>Organizations now face thousands—or even millions—of findings annually. This avalanche of data is the growing backlog that teams cannot feasibly remediate within their current capacity (and probably never will). Despite automation efforts and prioritization frameworks, the backlog continues to grow because prioritization addresses symptoms rather than the root cause.</p> <h3>So Why False Sense of Security?</h3> <p>A false sense of security emerges when organizations focus exclusively on a small number of prioritized findings while ignoring the larger backlog. With an overwhelming number of issues identified, prioritization often narrows attention to the most critical findings. While resolving these provides a sense of progress, it masks the reality that the majority of findings remain unaddressed. This selective approach can create an illusion of safety—“We’ve fixed the important ones, so we’re fine”—when, in truth, the broader attack surface is still exposed. The sheer scale of unresolved findings means attackers have plenty of opportunities to exploit weaknesses that were deprioritized.</p> <h2>Why a Growing Backlog is Detrimental</h2> <h3>Resource and Risk Implications</h3> <p><strong>Resource Drain:</strong> Managing backlogs diverts resources from strategic initiatives, leading to firefighting rather than proactive security.</p> <p><strong>Increased Risk:</strong> Unaddressed findings broaden the attack surface, complicating remediation and increasing compliance risks.</p> <p>In summary, inaction on security backlogs leads to financial, operational, and reputational consequences, ultimately increasing vulnerability to cyber threats and impacting business resilience.</p> <h3>The Cost</h3> <p><strong>Direct Costs:</strong> Breaches average $7.29 million, covering investigation, legal, and notification expenses.</p> <p><strong>Indirect Costs:</strong> They harm reputation and revenue, disrupt operations, and can incur major regulatory fines (e.g., GDPR).</p> <h2>Why Existing Remediation Approaches Fall Short</h2> <p>While many organizations have implemented various remediation strategies, these approaches often fail to address the root causes of the growing security backlog. Here&#8217;s why current solutions just don’t cut it:</p> <h3>Process Management: A Band-Aid Solution</h3> <p>Many remediation approaches focus on managing the remediation process itself. While this can improve efficiency to some degree, it fails to address the fundamental issues of volume and velocity.</p> <p>Process management alone cannot keep pace with the exponential growth of security findings, especially given the rise of AI-powered threats.</p> <h3>Generic Solutions Lack Trust, Adoption and Velocity</h3> <p>Existing remediation tools often suggest fixes, but these solutions frequently fall short for two key reasons:</p> <p><strong>Lack of Specificity:</strong> Generic solutions fail to account for the unique aspects of an organization&#8217;s infrastructure and codebase. This one-size-fits-all approach often leads to:</p> <ul> <li>Incompatibility with existing systems</li> <li>Potential introduction of new findings</li> <li>Resistance from engineering teams who understand their systems better</li> </ul> <p><strong>Insufficient Explanation:</strong> Many tools provide fixes without adequate context or reasoning. This lack of transparency:</p> <ul> <li>Erodes trust between security and engineering teams</li> <li>Fails to educate engineers on security best practices</li> <li>Leads to reluctance in implementing suggested changes</li> </ul> <p><strong>Low Velocity:</strong>
Existing remediation processes are often too slow because they rely heavily on manual work. This manual approach leads to:</p> <ul> <li>Inability to Scale</li> <li>Human Error and Inconsistency</li> <li>Inability to handle the volume</li> </ul> <h3>Will It Break?</h3> <p>A critical shortcoming of current remediation approaches is their inability to guarantee operational continuity:</p> <ul> <li>No existing solution provides a robust way to verify that systems will continue functioning without interruption after implementing security fixes.</li> <li>This lack of assurance leads to: <ul> <li>Hesitation in applying patches, especially for critical systems.</li> <li>Increased dwell time for vulnerabilities as teams conduct manual testing.</li> <li>Potential for unexpected downtime or performance issues post-remediation.</li> </ul> </li> </ul> <p>These limitations highlight the need for a more comprehensive, trust-building approach to remediation that addresses not just the symptoms but the underlying causes of the growing security backlog. Future solutions must focus on fostering collaboration between security and engineering teams, providing context-aware fixes, and ensuring operational stability throughout the remediation process.</p> <h2>A New Era of Security: Autonomous Remediation</h2> <p>The current state of remediation is unsustainable. Security backlogs grow daily, fueled by detection tools that outpace manual processes. Prioritization, while helpful, fails to address the root problem: the inability to act at scale. The solution lies in autonomous remediation—a transformative approach that bridges the gap between detection and action.<br /> Secnomic’s AI-powered agents embody this shift, automating the resolution of vulnerabilities with speed, precision, context-awareness and verification. These agents don’t just prioritize—they fix. By implementing verified code and configuration changes autonomously, Secnomic eliminates backlogs, reduces exposure windows, and scales effortlessly to meet the demands of modern environments.<br /> Autonomous remediation isn’t just a technological leap; it’s a strategic necessity. It turns security from reactive firefighting into proactive resilience. With Secnomic leading the way, organizations can finally close the loop on remediation, ensuring robust defenses while empowering teams to focus on growth and innovation. The future of security starts here.</p> <p>The post <a href="https://backline.ai/the-state-of-remediation-why-security-backlogs-keep-growing/" data-wpel-link="internal">The State of Remediation: Why Security Backlogs Keep Growing</a> appeared first on <a href="https://backline.ai" data-wpel-link="internal">Secnomic</a>.</p> CrowdStrike and AWS Select 36 Startups for 2025 Cybersecurity Accelerator, with Support from NVIDIA https://www.crowdstrike.com/en-us/press-releases/crowdstrike-and-aws-with-nvidia-support-select-36-startups-for-2025-cybersecurity-accelerator/#new_tab Mon, 24 Feb 2025 06:43:12 +0000 https://backline.ai/?p=822 <p>The post <a href="https://www.crowdstrike.com/en-us/press-releases/crowdstrike-and-aws-with-nvidia-support-select-36-startups-for-2025-cybersecurity-accelerator/#new_tab" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">CrowdStrike and AWS Select 36 Startups for 2025 Cybersecurity Accelerator, with Support from NVIDIA</a> appeared first on <a href="https://backline.ai" data-wpel-link="internal">Secnomic</a>.</p> <p>The post <a href="https://www.crowdstrike.com/en-us/press-releases/crowdstrike-and-aws-with-nvidia-support-select-36-startups-for-2025-cybersecurity-accelerator/#new_tab" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">CrowdStrike and AWS Select 36 Startups for 2025 Cybersecurity Accelerator, with Support from NVIDIA</a> appeared first on <a href="https://backline.ai" data-wpel-link="internal">Secnomic</a>.</p> Secnomic Tackles Enterprise Security Backlogs With AI https://www.darkreading.com/vulnerabilities-threats/backline-tackles-enterprise-security-backlogs-with-ai#new_tab Wed, 05 Feb 2025 06:24:18 +0000 https://backline.ai/?p=812 <p>The security startup's autonomous security remediation platform uses off-the-shelf large language models (LLMs) to analyze security alerts and apply the fixes.</p> <p>The post <a href="https://www.darkreading.com/vulnerabilities-threats/backline-tackles-enterprise-security-backlogs-with-ai#new_tab" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">Secnomic Tackles Enterprise Security Backlogs With AI</a> appeared first on <a href="https://backline.ai" data-wpel-link="internal">Secnomic</a>.</p> <p>The post <a href="https://www.darkreading.com/vulnerabilities-threats/backline-tackles-enterprise-security-backlogs-with-ai#new_tab" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">Secnomic Tackles Enterprise Security Backlogs With AI</a> appeared first on <a href="https://backline.ai" data-wpel-link="internal">Secnomic</a>.</p> Secnomic automatically remediates security vulnerabilities https://techcrunch.com/2025/01/30/backline-automatically-remediates-security-vulnerabilities/#new_tab Thu, 30 Jan 2025 14:45:00 +0000 https://backline.ai/?p=640 <p>Secnomic, a new security startup that uses AI agents to automatically remediate security vulnerabilities, is coming out of stealth with a $9 million seed round led by StageOne Ventures.</p> <p>The post <a href="https://techcrunch.com/2025/01/30/backline-automatically-remediates-security-vulnerabilities/#new_tab" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">Secnomic automatically remediates security vulnerabilities</a> appeared first on <a href="https://backline.ai" data-wpel-link="internal">Secnomic</a>.</p> <p>The post <a href="https://techcrunch.com/2025/01/30/backline-automatically-remediates-security-vulnerabilities/#new_tab" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">Secnomic automatically remediates security vulnerabilities</a> appeared first on <a href="https://backline.ai" data-wpel-link="internal">Secnomic</a>.</p>