UC Today

UC Today

News and Insights for Today, and Tomorrow UC Today reports on the latest unified communications and collaboration industry news and marketplace trends. Every day our tech journalists uncover the hottest topics and vendor innovations shaping the future of work.Our coverage is fully digital offering our audience authentic news and insights on the channel of their choice. We offer daily news, weekly features, video conversations and authority content aligned to the needs of business leaders in today's world.For industry professionals, our weekly newsletter offers a range of popular stories hand-picked by our editorial team. Subscribe to our weekly newsletter.If you're seeking editorial coverage, connect with our news desk.

  1. 2D AGO

    AI-Driven SOCs: What PwC Is Seeing and What Security Leaders Should Do

    AI is reshaping the security operations center (SOC), shifting it from a manual, reactive function into a faster, intelligence-driven environment. For organizations dealing with alert fatigue and limited analyst capacity, AI is becoming a practical tool for improving how threats are identified and managed. In this UC Today discussion, Kristian McCann speaks with Morgan Adamsky, Principal at PwC, to explore how enterprises are operationalizing AI in the SOC.  Adamsky brings a pragmatic perspective, focusing on how AI can be deployed responsibly. Her insights center on aligning technology with people and process, ensuring AI enhances rather than complicates decision-making in high-pressure environments. From Hype to Operational Reality Traditionally, analysts have had to manually review large volumes of data, often taking significant time to identify real threats. AI is changing that by rapidly surfacing anomalies and prioritizing potential risks, helping teams respond faster. Adoption, however, varies widely. Many organizations are still taking a “bolt-on” approach, adding AI into existing workflows. More advanced organizations are rethinking the SOC entirely, treating AI as a “force multiplier” and designing operations around it from the outset. This gap highlights different levels of maturity. While some are experimenting, others are investing in deeper transformation, a move Adamsky suggests will deliver greater long-term value, particularly as attackers also leverage AI to accelerate their efforts. Challenges remain. Organizations must integrate AI across the full security lifecycle, ensure outputs can be trusted, and train teams to use it effectively. As Adamsky notes, the human factor is still a key hurdle in scaling adoption. Building a Smarter, Safer SOC To manage these challenges, organizations are introducing clearer boundaries between AI and human decision-making. AI can handle tasks like initial triage, but critical actions such as containment or shutting down systems typically require human validation. This human-in-the-loop approach helps maintain trust while still benefiting from automation. It ensures that AI supports, rather than replaces, human judgment in high-stakes scenarios. Adamsky also outlines what effective implementation looks like. This includes combining threat intelligence, vulnerability data, and network activity into a unified view. AI then helps identify patterns and surface meaningful insights, enabling more informed decisions. She also points to three priorities: faster vulnerability management, stronger third-party risk oversight, and preparing for breaches. The latter reflects a growing recognition that incidents are increasingly likely, making readiness essential. From Experimentation to Transformation The discussion makes clear that incremental adoption is not enough. While bolt-on AI can deliver short-term gains, long-term success requires rethinking the SOC as a whole, with AI embedded across workflows. At the same time, core cybersecurity fundamentals still matter. Practices like patching, testing, and incident planning remain critical, but must now operate at greater speed to keep up with AI-driven threats. For security leaders, the focus should be on both technology and people. That means investing in tools while also upskilling teams and adapting processes to fully leverage AI. Ultimately, organizations that treat AI as foundational rather than optional will be better positioned to keep pace in an increasingly automated threat landscape.

    15 min
  2. MAY 14

    Data Security, AI Compliance: The Two Blind Spots Your Compliance Solution Can't Ignore - Smarsh

    In this session of UC Today, host Kristian McCann sits down with Simon Peters, Director of Channel Sales at Smarsh, to unpack one of the most pressing questions facing regulated industries in 2026: Is your compliance solution really secure — and is its AI even compliant? It’s a wake-up call for compliance, risk, and IT leaders who assume ticking the compliance box equals airtight data protection. As global fines for compliance and data breaches continue to climb — including over $63 million in penalties in early 2025 alone — this conversation exposes the two blind spots most organizations still overlook. Peters explains how compliance and security aren’t interchangeable, why third-party AI models can create new compliance gaps, and how Smarsh has built “compliant AI by architecture” — keeping all data, transcripts, and analysis inside customers’ own sovereign environments. Key discussion points include: Why compliance ≠ security — and how most tools leave key data unprotectedThe hidden AI compliance gap: when “smart” systems leak sensitive data externallyHow Smarsh’s regional AI architecture ensures zero data leakage and full audit readinessThe real-world consequences of breaches — from SEC fines to reputational damageNext steps: Visit Smarsh.com to download the “Compliance Must-Haves” checklist and the Seven Hidden Voice Data Risks guide.

    10 min
  3. MAY 7

    Security & Compliance | Securing the Enterprise in the Age of AI Agents

    Agentic AI is moving from a promising productivity tool to a security problem that enterprise leaders can no longer ignore. In the conversation below, Kristian speaks with Irina Tsukerman, President at Scarab Rising; Shlomi Beer, Co-Founder & CEO at ImpersonAlly; and Roey Eliyahu, Co-Founder & CEO at Salt Security, about what agentic AI is, where the risks are emerging, and how organizations can manage systems designed to act on their behalf. What makes the topic urgent is that agentic AI is not simply a chatbot with a smarter interface. These systems can make decisions, take actions, access data, and move across business systems with limited human oversight. That creates efficiency, but it also creates exposure, especially when companies are adopting the technology faster than they are building the controls around it. Kristian frames the discussion around a simple but important question: how do you secure systems that are meant to behave autonomously when traditional security assumptions are no longer enough? The answer, as the guests make clear, is that the companies moving fastest on agentic AI are often the ones least prepared for its consequences. Where The Security Risks Emerge The first major theme in the conversation is that adoption is outpacing governance. Shlomi Beer says attackers do not always need to break through classic perimeter defenses; instead, they can manipulate external inputs, prompt chains, or other content that agents ingest and trust. In that environment, the attack surface is no longer just a network or an endpoint. It is the workflow itself. Roey Eliyahu adds a broader operational view. He argues that consumer-facing sectors, where support volume is high and repetitive tasks are common, are adopting agents aggressively because the business case is compelling. But once an agent is expected to act like an employee, it also needs the permissions of an employee. That is where the security problem begins to scale. Both guests point to the same underlying issue: the more useful the agent becomes, the more access it needs. And the more access it receives, the more dangerous it becomes if it is abused, hijacked, or allowed to make the wrong call. What begins as automation can quickly become a privilege problem, an observability problem, and a governance problem at the same time. A second theme is that organizations often leave the rules unclear because the technology is moving faster than internal policy. Irina Tsukerman says some companies rush into deployment because they want competitive advantage, while others delay formal controls because they do not yet understand the risks well enough. Why Governance Is Lagging But the risks are not abstract. Irina points to predictable failure modes: an agent being hijacked, exposing customer information, or falling for a deepfake-style manipulation. Roey widens that lens by explaining that agents also create compliance exposure, especially in regulated sectors such as finance, insurance, and pharma. Even when the agent improves service, it still has access to sensitive data. The discussion also shows why the current security market can feel fragmented. Vendors often sell point solutions for one layer of the stack, such as identity, the model, or the MCP layer, but the speakers argue that this rarely maps cleanly to the real business risk. The problem is not one isolated component. It is the chain linking agent, prompt, data, API, and downstream action. The conversation turns to remedy, and here the emphasis is clear: start with visibility, then add guardrails, then add detection. Roey says readiness begins with full discovery and observability across agents, MCP servers, APIs, code, runtime, and configuration. Without that holistic view, security teams are trying to defend something they cannot fully see. Once organizations understand the full chain, they can apply business-s

    48 min
  4. MAY 6

    Unseen Exits: Tracking Data Leakage in the Age of UC Collaboration

    In this interview, UC Today's Kristian McCann sits down with Bob Pruett, Senior Solutions Architect at Myriad360, to tackle one of the most underappreciated security risks in modern business: data leakage through everyday collaboration tools. Most organisations have firewalls, permissions, and email controls in place — but nothing for the conversation happening right now in Teams, Zoom, Slack, and Google Chat?  Data leakage isn't a new problem, but the way it happens in 2026 looks almost nothing like it did five years ago.  Key Topics: 🔵 The real-time problem changes everything. Voice and chat can't be paused for inspection the way email can. If sensitive data is shared in a live call or instant message, it's gone before any traditional DLP tool can react — making prevention and policy far more important than detection after the fact. 🔵 Passwords and API keys are leaking through chat. One of the most common and overlooked risks Bob flags is credentials being shared in what employees assume are private conversations. Those messages are logged, searchable, and far more permanent than the post-it note people think they're replacing. 🔵 Your policies don't follow you across platforms. If you're on Zoom, Teams, Google Chat, and Slack in a single day, your security settings only apply to calls you initiate. The platform the other person starts controls the rules — including whether the call is transcribed, recorded, or shared. 🔵 Tools exist — most companies just haven't deployed them. Bob highlights Truffle Hog as a practical starting point for finding leaked secrets in chat logs, alongside built-in platform features that most organisations simply haven't switched on. The gap isn't tools — it's awareness and policy. For more on UC security, compliance, and collaboration strategy, visit UC Today. Join the UC Today LinkedIn community at linkedin.com/groups/9551264 Subscribe to the newsletter at uctoday.com/register to stay ahead of the risks shaping the industry.

    14 min

About

News and Insights for Today, and Tomorrow UC Today reports on the latest unified communications and collaboration industry news and marketplace trends. Every day our tech journalists uncover the hottest topics and vendor innovations shaping the future of work.Our coverage is fully digital offering our audience authentic news and insights on the channel of their choice. We offer daily news, weekly features, video conversations and authority content aligned to the needs of business leaders in today's world.For industry professionals, our weekly newsletter offers a range of popular stories hand-picked by our editorial team. Subscribe to our weekly newsletter.If you're seeking editorial coverage, connect with our news desk.

You Might Also Like