UC Today

UC Today

News and Insights for Today, and Tomorrow UC Today reports on the latest unified communications and collaboration industry news and marketplace trends. Every day our tech journalists uncover the hottest topics and vendor innovations shaping the future of work.Our coverage is fully digital offering our audience authentic news and insights on the channel of their choice. We offer daily news, weekly features, video conversations and authority content aligned to the needs of business leaders in today's world.For industry professionals, our weekly newsletter offers a range of popular stories hand-picked by our editorial team. Subscribe to our weekly newsletter.If you're seeking editorial coverage, connect with our news desk.

  1. 7 HR AGO

    Data Security, AI Compliance: The Two Blind Spots Your Compliance Solution Can't Ignore - Smarsh

    In this session of UC Today, host Kristian McCann sits down with Simon Peters, Director of Channel Sales at Smarsh, to unpack one of the most pressing questions facing regulated industries in 2026: Is your compliance solution really secure — and is its AI even compliant? It’s a wake-up call for compliance, risk, and IT leaders who assume ticking the compliance box equals airtight data protection. As global fines for compliance and data breaches continue to climb — including over $63 million in penalties in early 2025 alone — this conversation exposes the two blind spots most organizations still overlook. Peters explains how compliance and security aren’t interchangeable, why third-party AI models can create new compliance gaps, and how Smarsh has built “compliant AI by architecture” — keeping all data, transcripts, and analysis inside customers’ own sovereign environments. Key discussion points include: Why compliance ≠ security — and how most tools leave key data unprotectedThe hidden AI compliance gap: when “smart” systems leak sensitive data externallyHow Smarsh’s regional AI architecture ensures zero data leakage and full audit readinessThe real-world consequences of breaches — from SEC fines to reputational damageNext steps: Visit Smarsh.com to download the “Compliance Must-Haves” checklist and the Seven Hidden Voice Data Risks guide.

    10 min
  2. 7 MAY

    Security & Compliance | Securing the Enterprise in the Age of AI Agents

    Agentic AI is moving from a promising productivity tool to a security problem that enterprise leaders can no longer ignore. In the conversation below, Kristian speaks with Irina Tsukerman, President at Scarab Rising; Shlomi Beer, Co-Founder & CEO at ImpersonAlly; and Roey Eliyahu, Co-Founder & CEO at Salt Security, about what agentic AI is, where the risks are emerging, and how organizations can manage systems designed to act on their behalf. What makes the topic urgent is that agentic AI is not simply a chatbot with a smarter interface. These systems can make decisions, take actions, access data, and move across business systems with limited human oversight. That creates efficiency, but it also creates exposure, especially when companies are adopting the technology faster than they are building the controls around it. Kristian frames the discussion around a simple but important question: how do you secure systems that are meant to behave autonomously when traditional security assumptions are no longer enough? The answer, as the guests make clear, is that the companies moving fastest on agentic AI are often the ones least prepared for its consequences. Where The Security Risks Emerge The first major theme in the conversation is that adoption is outpacing governance. Shlomi Beer says attackers do not always need to break through classic perimeter defenses; instead, they can manipulate external inputs, prompt chains, or other content that agents ingest and trust. In that environment, the attack surface is no longer just a network or an endpoint. It is the workflow itself. Roey Eliyahu adds a broader operational view. He argues that consumer-facing sectors, where support volume is high and repetitive tasks are common, are adopting agents aggressively because the business case is compelling. But once an agent is expected to act like an employee, it also needs the permissions of an employee. That is where the security problem begins to scale. Both guests point to the same underlying issue: the more useful the agent becomes, the more access it needs. And the more access it receives, the more dangerous it becomes if it is abused, hijacked, or allowed to make the wrong call. What begins as automation can quickly become a privilege problem, an observability problem, and a governance problem at the same time. A second theme is that organizations often leave the rules unclear because the technology is moving faster than internal policy. Irina Tsukerman says some companies rush into deployment because they want competitive advantage, while others delay formal controls because they do not yet understand the risks well enough. Why Governance Is Lagging But the risks are not abstract. Irina points to predictable failure modes: an agent being hijacked, exposing customer information, or falling for a deepfake-style manipulation. Roey widens that lens by explaining that agents also create compliance exposure, especially in regulated sectors such as finance, insurance, and pharma. Even when the agent improves service, it still has access to sensitive data. The discussion also shows why the current security market can feel fragmented. Vendors often sell point solutions for one layer of the stack, such as identity, the model, or the MCP layer, but the speakers argue that this rarely maps cleanly to the real business risk. The problem is not one isolated component. It is the chain linking agent, prompt, data, API, and downstream action. The conversation turns to remedy, and here the emphasis is clear: start with visibility, then add guardrails, then add detection. Roey says readiness begins with full discovery and observability across agents, MCP servers, APIs, code, runtime, and configuration. Without that holistic view, security teams are trying to defend something they cannot fully see. Once organizations understand the full chain, they can apply business-s

    48 min
  3. 6 MAY

    Unseen Exits: Tracking Data Leakage in the Age of UC Collaboration

    In this interview, UC Today's Kristian McCann sits down with Bob Pruett, Senior Solutions Architect at Myriad360, to tackle one of the most underappreciated security risks in modern business: data leakage through everyday collaboration tools. Most organisations have firewalls, permissions, and email controls in place — but nothing for the conversation happening right now in Teams, Zoom, Slack, and Google Chat?  Data leakage isn't a new problem, but the way it happens in 2026 looks almost nothing like it did five years ago.  Key Topics: 🔵 The real-time problem changes everything. Voice and chat can't be paused for inspection the way email can. If sensitive data is shared in a live call or instant message, it's gone before any traditional DLP tool can react — making prevention and policy far more important than detection after the fact. 🔵 Passwords and API keys are leaking through chat. One of the most common and overlooked risks Bob flags is credentials being shared in what employees assume are private conversations. Those messages are logged, searchable, and far more permanent than the post-it note people think they're replacing. 🔵 Your policies don't follow you across platforms. If you're on Zoom, Teams, Google Chat, and Slack in a single day, your security settings only apply to calls you initiate. The platform the other person starts controls the rules — including whether the call is transcribed, recorded, or shared. 🔵 Tools exist — most companies just haven't deployed them. Bob highlights Truffle Hog as a practical starting point for finding leaked secrets in chat logs, alongside built-in platform features that most organisations simply haven't switched on. The gap isn't tools — it's awareness and policy. For more on UC security, compliance, and collaboration strategy, visit UC Today. Join the UC Today LinkedIn community at linkedin.com/groups/9551264 Subscribe to the newsletter at uctoday.com/register to stay ahead of the risks shaping the industry.

    14 min
  4. 28 APR

    From Automation to Autonomy: How Intelligent Fabrics Are Changing Cloud and UC Operations - Voss

    Join Kieran Devlin, Host at UC Today, as he sits down with Tim Jalland, Solution Manager at VOSS, to unpack the rapid evolution of IT operations. As cloud environments like Microsoft 365 undergo hundreds of feature changes a year, static automation is struggling to keep pace. This session cuts through the AI hype to explore practical, outcome-driven solutions. Tune in to see exactly how intelligent automation fabrics can empower your IT team, prevent outages before users even notice them, and secure complex collaboration ecosystems. The landscape of unified communications is shifting rapidly, and IT teams need more than just basic automation to keep up. In this conversation, we explore how an intelligent operations layer changes the day-to-day reality for IT professionals. Key takeaways from our discussion include: The limits of traditional automation: Why the sheer volume of updates in platforms like Microsoft 365 requires a shift from static orchestration to dynamic, learning-capable operations.AI as an operational assistant: Moving past "AI as a feature" fatigue to focus on tangible outcomes, using agentic AI to proactively support IT teams rather than replace them.Breaking down IT silos: How unifying automation, analytics, and monitoring on a single platform allows for cross-stack intelligence—catching and correcting negative trends before monitoring dashboards even flash red.Real-world proactive fixes: Tangible examples of AI detecting service degradation before a user ticket is raised, and automatically correcting configuration drift to eliminate security risks.Related Stories:   The Intelligent Control Plane: Why Cloud UC and Microsoft 365 Operations Must Move From Automation to AutonomyPractical AI Use Cases to Transform Cloud UC and Microsoft 365 Operations

    13 min

Ratings & Reviews

5
out of 5
5 Ratings

About

News and Insights for Today, and Tomorrow UC Today reports on the latest unified communications and collaboration industry news and marketplace trends. Every day our tech journalists uncover the hottest topics and vendor innovations shaping the future of work.Our coverage is fully digital offering our audience authentic news and insights on the channel of their choice. We offer daily news, weekly features, video conversations and authority content aligned to the needs of business leaders in today's world.For industry professionals, our weekly newsletter offers a range of popular stories hand-picked by our editorial team. Subscribe to our weekly newsletter.If you're seeking editorial coverage, connect with our news desk.

You Might Also Like