Menu
Blog How it works Use Cases
agentsh
Open-source runtime for AI agent security
Beacon
AI endpoint visibility and control
Watchtower
Enterprise control plane for agentsh and Beacon
Contact Us

Blog

Insights on AI agent security, governance, and the future of enterprise AI.

By Eran Sandler 11 min read

Breaking the Agentic Kill Chain: Where Beacon and AgentSH Disrupt Attacks

Mapping Beacon and AgentSH to the cybersecurity kill chain, showing where each product breaks the attacker's sequence in supervised and unsupervised AI environments.

agentic-ai ai-security execution-layer-security runtime-security kill-chain beacon agentsh mcp-security
By Gur Brosh 4 min read

When an AI Agent Complies

Many AI agent incidents occur not because systems break rules, but because they follow them perfectly. When autonomy meets human permission models, authorized actions can still become unsafe.

agentic-ai ai-security autonomous-systems execution-layer-security runtime-security agentsh governance
By Gur Brosh 5 min read

The Most Surprising Trait of AI Coding Agents

AI coding agents don’t tire, hesitate, or abandon difficult problems. Their relentless persistence is transforming how software gets built — and redefining what developers must learn to manage.

agentic-ai software-development ai-agents developer-tools agentic-workflows ai-safety agentsh
By Eran Sandler 6 min read

Intent, Execution, Audit: A Model for Agent Control

Most agent “guardrails” live before execution (prompts) or after execution (logs). This post explains why that leaves you with hope and hindsight, and why real control must exist at the execution layer.

agentic-ai ai-security governance developer-tools runtime-security security-engineering prompt-injection llm agentsh
By Eran Sandler 6 min read

The Control Gap: Agents Move Faster Than Humans Can Supervise

What we are seeing as AI agents start taking real actions, and why human speed oversight cannot keep up with machine speed execution.

agentic-ai ai-security governance prompt-injection developer-tools runtime-security llm security-engineering agentsh