Chapters
Ch. 00Introduction
The Advent of GenAI
External Threats
Internal Threats
The Regulatory Wave
Guardrails and Governance
Model and Data Protection
Security Agents and Agent Security
AI for Security
SOC Automation
AI for Identity
Vulnerability Management
Penetration Testing
Defense Against Deepfakes
Application Security
Unique Solutions
How We Win in the Machine Age
Appendices
App. IAppendix I: AI Security Funding
Appendix II: AI Security M&A
Appendix III: Legacy Vendors with AI Security Products
Appendix IV: Alphabetical Listing of AI Security Vendors
