Averlon (@averlon_ai) 's Twitter Profile
Averlon

@averlon_ai

Peerless cloud security

ID: 1765526485417476096

calendar_today06-03-2024 23:55:17

10 Tweet

23 Takipçi

9 Takip Edilen

Averlon (@averlon_ai) 's Twitter Profile Photo

💡 How do you innovate with AI at enterprise scale without creating new risks? Next week, Scott Roberts, CISO of UiPath, joins us to share how his team applies agentic AI to strengthen UiPath’s own security program. From accelerating vulnerability management workflows to

💡 How do you innovate with AI at enterprise scale without creating new risks?

Next week, Scott Roberts, CISO of <a href="/UiPath/">UiPath</a>, joins us to share how his team applies agentic AI to strengthen UiPath’s own security program.

From accelerating vulnerability management workflows to
Averlon (@averlon_ai) 's Twitter Profile Photo

How do you build trust in a world shaped by AI, fraud, and cyber threats? This Wednesday, October 22, Averlon Co-founder & CEO Sunil Gottumukkala (Sunil) will join Erik Benson, General Partner at Voyager Capital, and Alex Algard (Alex Algard), Founder & CEO of Hiya, at the

How do you build trust in a world shaped by AI, fraud, and cyber threats?

This Wednesday, October 22, Averlon Co-founder &amp; CEO Sunil Gottumukkala (<a href="/sunilgot/">Sunil</a>) will join Erik Benson, General Partner at <a href="/voyagercapital/">Voyager Capital</a>, and Alex Algard (<a href="/algard/">Alex Algard</a>), Founder &amp; CEO of <a href="/Hiya/">Hiya</a>, at the
Averlon (@averlon_ai) 's Twitter Profile Photo

AI is transforming how software is built and secured. As development accelerates, security must move just as fast while maintaining trust and accountability. Tomorrow at 11 am PT, UiPath CISO Scott Roberts joins Averlon’s Rajeev Raghunarayan (Rajeev R) to share how agentic AI

AI is transforming how software is built and secured. As development accelerates, security must move just as fast while maintaining trust and accountability.

Tomorrow at 11 am PT, <a href="/UiPath/">UiPath</a> CISO Scott Roberts joins Averlon’s Rajeev Raghunarayan (<a href="/raraghun/">Rajeev R</a>)  to share how agentic AI
Averlon (@averlon_ai) 's Twitter Profile Photo

👀 Every security team has felt it. The backlog of dependency alerts that never seems to shrink. Each one important, but not all urgent. ⚙️ We’re excited to share our integration with GitHub Dependabot. Averlon helps teams focus on what matters, act on real risk, and accelerate

👀 Every security team has felt it.
The backlog of dependency alerts that never seems to shrink.
Each one important, but not all urgent.

⚙️ We’re excited to share our integration with GitHub Dependabot.
Averlon helps teams focus on what matters, act on real risk, and accelerate
Averlon (@averlon_ai) 's Twitter Profile Photo

Join fellow security leaders in Chicago for an evening of open conversation. The Security Leaders Roundtable brings together a small group of CISOs and senior security executives for thoughtful dialogue on modern security priorities and emerging challenges. This Chicago session

Join fellow security leaders in Chicago for an evening of open conversation.

The Security Leaders Roundtable brings together a small group of CISOs and senior security executives for thoughtful dialogue on modern security priorities and emerging challenges.

This Chicago session
Averlon (@averlon_ai) 's Twitter Profile Photo

🎃 Not all scares come with fangs and capes. Some hide in plain sight. This Halloween, don’t let hidden exposures haunt your environment. Fix what matters, faster. 👻 Wishing you a happy and safe Halloween from all of us at Averlon! #RemediationOps #AgenticAI #Cybersecurity

🎃 Not all scares come with fangs and capes.
Some hide in plain sight.

This Halloween, don’t let hidden exposures haunt your environment.

Fix what matters, faster.

👻 Wishing you a happy and safe Halloween from all of us at Averlon!

#RemediationOps #AgenticAI #Cybersecurity
Averlon (@averlon_ai) 's Twitter Profile Photo

📘 New research from Enterprise Strategy Group (Enterprise Strategy Group), part of OmdiaCyber, Automating Risk Reduction in the AI Era 400 security leaders share how AI is reshaping exposure management and driving faster remediation across hybrid and cloud environments. Kudos to Tyler

📘 New research from Enterprise Strategy Group (<a href="/esg_global/">Enterprise Strategy Group</a>), part of <a href="/OmdiaCyber/">OmdiaCyber</a>, Automating Risk Reduction in the AI Era

400 security leaders share how AI is reshaping exposure management and driving faster remediation across hybrid and cloud environments.

Kudos to Tyler
Averlon (@averlon_ai) 's Twitter Profile Photo

How long does it take UiPath security team to investigate an alert? Hint: you’ll be surprised when you hear it. We sure were. In this 47-second clip, UiPath CISO Scott Roberts shares how his team uses Agentic automation to reshape security operations and accelerate

Averlon (@averlon_ai) 's Twitter Profile Photo

🎤 Exciting news: Sunil Gottumukkala (Sunil), CEO & Co-Founder of Averlon, will be speaking at Camp IT Cloud Security Strategies – Chicago (Nov 12-13). He’ll share how security teams can turn endless alerts into real action by thinking like the adversary and closing the

🎤 Exciting news: Sunil Gottumukkala (<a href="/sunilgot/">Sunil</a>), CEO &amp; Co-Founder of Averlon, will be speaking at Camp IT  Cloud Security Strategies – Chicago (Nov 12-13).

He’ll share how security teams can turn endless alerts into real action by thinking like the adversary and closing the
Averlon (@averlon_ai) 's Twitter Profile Photo

Security teams are not short on findings. They are short on time. The latest research from ESG (Enterprise Strategy Group) shows what the most effective teams have in common. 1. They prioritize with real context. 2. They remove manual steps that slow them down. 3. They use agentic AI to

Security teams are not short on findings. They are short on time.

The  latest research from ESG (<a href="/esg_global/">Enterprise Strategy Group</a>) shows what the most effective teams have in common.

1. They prioritize with real context.
2. They remove manual steps that slow them down.
3. They use agentic AI to
Averlon (@averlon_ai) 's Twitter Profile Photo

Sunil Gottumukkala (Sunil) will be speaking at ISACA Boise tomorrow on a challenge every security team feels. Too many findings, too few fixes, and exposure windows that grow faster than teams can close them. Anthropic's recent research on AI driven espionage showed how

Sunil Gottumukkala (<a href="/sunilgot/">Sunil</a>) will be speaking at ISACA Boise tomorrow on a challenge every security team feels. Too many findings, too few fixes, and exposure windows that grow faster than teams can close them.

<a href="/AnthropicAI/">Anthropic</a>'s recent research on AI driven espionage showed how
Averlon (@averlon_ai) 's Twitter Profile Photo

Sunil Sunil kicked off a strong conversation at CAMP IT last week, sharing his perspective on the widening #ExposureWindow and how teams are working to scale remediation. It echoed what many in the room shared. The gap between findings and fixes keeps growing as

Sunil <a href="/sunilgot/">Sunil</a>  kicked off a strong conversation at CAMP IT last week, sharing his perspective on the widening #ExposureWindow and how teams are working to scale remediation. 

It echoed what many in the room shared. The gap between findings and fixes keeps growing as
Averlon (@averlon_ai) 's Twitter Profile Photo

Millions of code and secret findings surface every year in GitHub repos. With more than 23 million leaked secrets detected last year, the remediation gap matters. Averlon now integrates with GitHub Advanced Security to help close that gap. It enriches CodeQL and secret scanning

Millions of code and secret findings surface every year in GitHub repos. With more than 23 million leaked secrets detected last year, the remediation gap matters.

Averlon now integrates with GitHub Advanced Security to help close that gap. It enriches CodeQL and secret scanning
Averlon (@averlon_ai) 's Twitter Profile Photo

We are pleased to welcome Brad Cheezum to Averlon as our Principal Security Engineer. Brad brings close to two decades of experience across offensive security, cloud engineering, and large scale operations. His work at Salesforce, Tableau, Brass Lion Entertainment, and Microsoft

We are pleased to welcome Brad Cheezum to Averlon as our Principal Security Engineer.

Brad brings close to two decades of experience across offensive security, cloud engineering, and large scale operations. His work at Salesforce, Tableau, Brass Lion Entertainment, and Microsoft
Averlon (@averlon_ai) 's Twitter Profile Photo

Most real security stories never make headlines. They avoid becoming breaches because of something small and unglamorous. An exposed access token caught early. A vulnerability patched in time. A moment when an engineer says “this feels strange” and checks anyway. Security often

Most real security stories never make headlines.
They avoid becoming breaches because of something small and unglamorous.

An exposed access token caught early. A vulnerability patched in time. A moment when an engineer says “this feels strange” and checks anyway.

Security often
Averlon (@averlon_ai) 's Twitter Profile Photo

▹ How do organizations align risk appetite with the real risk they’re carrying? ▹ How does AI reshape expectations for oversight, assurance, and accountability? ▹ And how can governance models accelerate innovation instead of slowing it? Next week, Averlon is hosting a

Averlon (@averlon_ai) 's Twitter Profile Photo

React2Shell (CVE-2025-55182) has been widely discussed in the security and engineering communities this week. It is a CVSS 10 vulnerability in React Server Components affecting React 19 and frameworks that depend on those packages, including recent versions of Next.js. Key

React2Shell (CVE-2025-55182) has been widely discussed in the security and engineering communities this week. It is a CVSS 10 vulnerability in React Server Components affecting React 19 and frameworks that depend on those packages, including recent versions of Next.js.

Key
Averlon (@averlon_ai) 's Twitter Profile Photo

What does the “trust gap” actually look like inside an organization? In this short clip, Laura Sawka, founder of Sawka Advisory Group and former SVP of Security GRC at Salesforce, explains how the gap emerges when real cyber risk quietly exceeds what leaders believe they are

Averlon (@averlon_ai) 's Twitter Profile Photo

Many teams are still working through React2Shell (CVE-2025-55182). Patching React and Next.js to the fixed releases remains the only reliable way to remove this risk. For teams that cannot upgrade right away, there may be a short exposure window. Our engineer Brad Cheezum

Many teams are still working through React2Shell (CVE-2025-55182). Patching React and Next.js to the fixed releases remains the only reliable way to remove this risk.

For teams that cannot upgrade right away, there may be a short exposure window. Our engineer Brad Cheezum