{"id":796,"date":"2025-07-04T09:31:00","date_gmt":"2025-07-04T09:31:00","guid":{"rendered":"https:\/\/infosec-daily.com\/?page_id=796"},"modified":"2025-07-04T09:31:00","modified_gmt":"2025-07-04T09:31:00","slug":"your-ai-agents-might-be-leaking-data-watch-this-webinar-to-learn-how-to-stop-it","status":"publish","type":"page","link":"https:\/\/infosec-daily.com\/?page_id=796","title":{"rendered":"Your AI Agents Might Be Leaking Data \u2014 Watch this Webinar to Learn How to Stop It"},"content":{"rendered":"<p>Generative AI is changing how businesses work, learn, and innovate. But beneath the surface, something dangerous is happening. AI agents and custom GenAI workflows are creating new, hidden ways for sensitive enterprise data to leak\u2014and most teams don\u2019t even realize it.<br \/>\nIf you\u2019re building, deploying, or managing AI systems, now is the time to ask: Are your AI agents exposing confidential data<\/p>","protected":false},"excerpt":{"rendered":"<p>Generative AI is changing how businesses work, learn, and innovate. But beneath the surface, something dangerous is happening. AI agents and custom GenAI workflows are creating new, hidden ways for&hellip;<\/p>\n","protected":false},"author":1,"featured_media":797,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"saved_in_kubio":false,"footnotes":""},"class_list":["post-796","page","type-page","status-publish","has-post-thumbnail","hentry"],"kubio_ai_page_context":{"short_desc":"","purpose":"general"},"_links":{"self":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/796","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=796"}],"version-history":[{"count":0,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/796\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/media\/797"}],"wp:attachment":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=796"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}