Rethinking Security from the OS Up in the Age of AI and more RSAC 2026 Interviews - Karen Heart, Sachin Jade, Phil Calvin, Craig Sanderson, Travis Wong - ESW #456
好的,用户让我用中文总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要仔细阅读用户提供的文章内容,找出主要观点和关键信息。 这篇文章主要讨论了操作系统层面的安全措施,特别是针对现代攻击如勒索软件和供应链攻击的防御策略。Karen Heart提出了一种基于文件系统的安全方法,限制文件和网络访问权限,以及防止权限提升。这种方法强调在内核层嵌入不可变的控制措施,以预防数据外泄和恶意代码执行。 此外,文章还探讨了AI代理和承包商如何扩大攻击面,因此需要严格隔离、备份保护和确定性的系统边界。其他部分涉及DNS安全、AI在威胁情报中的应用、持续网络安全风险评估以及身份安全重新定义。 接下来,我需要将这些要点浓缩到100字以内。要确保涵盖操作系统安全、AI影响、防御策略以及新兴技术对安全的影响。同时,语言要简洁明了,避免使用复杂的术语。 可能的结构是先介绍主题,然后提到关键人物和方法,接着说明防御策略和AI的影响。最后可以提到其他相关技术或策略。 例如:“文章探讨了操作系统层面的安全防御策略,提出限制文件访问和权限提升的方法以应对现代攻击。同时讨论了AI扩展攻击面及持续风险评估的重要性。” 这样既涵盖了主要观点,又控制在字数限制内。 </think> 文章探讨了操作系统层面的安全防御策略,提出通过限制文件访问、网络连接和权限提升来减少攻击风险,并强调嵌入式控制措施的重要性。同时讨论了AI扩展攻击面及持续风险评估的必要性。 2026-4-27 09:0:0 Author: sites.libsyn.com(查看原文) 阅读量:9 收藏

Apr 27, 2026

Rethinking Security from the OS Up in the Age of AI

Karen Heart discusses a file-system–first approach to security, arguing that most modern attacks—including ransomware and supply chain compromises—succeed because they inherit user permissions and operate inside overly trusted system structures.

She explains how limiting file access, socket (network) access, and privilege escalation at the operating system level can reduce entire classes of attacks. Rather than relying on reactive detection, her approach emphasizes immutable, allowlisted controls embedded close to the kernel layer, designed to prevent both data exfiltration and malicious code execution at the source.

The conversation also explores how AI agents and contractors expand the attack surface, reinforcing the need for strict isolation, backup protection, and deterministic system boundaries.

Segment Resources:

https://www.simonandschuster.com/books/Zero-Day-Secure/Karen-Heart/9781968865078

​The New Era of DNS Resilience: Breaking down the newly finalized NIST SP 800-81 Craig Sanderson from Infoblox will dive into the newly finalized NIST SP 800-81 as it marks a pivotal shift in DNS security, emphasizing resilience through modernized practices tailored for today’s distributed, cloud-driven, and threat-laden environments. This update provides actionable guidance for organizations to strengthen DNS infrastructure against evolving threats like ransomware and data exfiltration, while prioritizing initiatives like DNSSEC, encryption, and protective DNS for immediate risk reduction.

This segment is sponsored by Infoblox. Visit https://securityweekly.com/infobloxrsac to learn more about them!

Agentic AI and the Future of Threat Intelligence Operations Security teams collect large volumes of threat intelligence but often struggle to translate that information into coordinated operational response. This discussion explores how organizations are embedding intelligence directly into security workflows and introducing AI agents to support investigation, enrichment and response. Sachin will discuss Cyware’s Agentic Fabric approach and the evolution toward an agent-centric model, where a portfolio of specialized agents assists analysts across threat intelligence, detection engineering and response workflows. The conversation will focus on how AI can support security teams while maintaining human oversight and operational control.

This segment is sponsored by Cyware. Visit https://securityweekly.com/cywarersac to learn more about them!

Beyond the Audit: Making Cyber Risk Continuous, Quantified, and Actionable Most companies assess cyber risk once a year and call it done — but for organizations managing dozens of subsidiaries or portfolio companies, that's a costly blind spot. In this RSA interview, Resilience's VP of Customer Engagement explores why measuring risk in dollars (not color-coded charts) changes the conversation at the board level, and why the organizations best positioned to prevent losses are the ones treating cyber risk as a continuous discipline rather than an annual exercise.

See it in action. Request a demo at https://securityweekly.com/resiliencersac.

Delinea: Redefining Identity Security for the Agentic AI Era As enterprises scale agentic AI and automation, privileged access is increasingly required by non-human identities (NHIs) that operate autonomously across hybrid and cloud-native environments, introducing risks that static, credential-based models were never designed to govern. Delinea's recent of acquisition of StrongDM.

This segment is sponsored by Delinea. Visit https://securityweekly.com/delinearsac to learn more about them!

Visit https://www.securityweekly.com/esw for all the latest episodes!

Show Notes: https://securityweekly.com/esw-456


文章来源: http://sites.libsyn.com/18678/rethinking-security-from-the-os-up-in-the-age-of-ai-and-more-rsac-2026-interviews-karen-heart-sachin-jade-phil-calvin-craig-sanderson-travis-wong-esw-456
如有侵权请联系:admin#unsafe.sh