Eoin Keary's avatarPerson

Eoin Keary

CEOEdgescan Inc

Dublin, Ireland

About

Executive with over 20 years cyber and software security experience. Ex Global Board member of Owasp.

Published content

AI-Powered Browsers: What Builders, Users and Businesses Must Know Now

expert panel

AI-powered browsers are quickly becoming co-pilots that can read, reason and sometimes even act on a user’s behalf. Professionals may be especially tempted to turn to AI browsers because they make work feel faster and smoother, especially when someone is juggling research, analysis or repetitive tasks. The promise of instant summaries, automated workflows and fewer clicks can be hard to resist.  However, cybersecurity experts are increasingly raising red flags concerning these tools’ security weaknesses. While their capabilities are impressive, AI browsers open up a fresh class of risks that traditional safeguards weren’t built to handle. Indeed, a recent Gartner report recommends businesses block AI browsers for the foreseeable future.  The members of the Senior Executive Cybersecurity Think Tank bring years of experience to this timely topic. With expertise in enterprise security, regulatory compliance and threat detection, they’re watching the evolution of AI browsers with a blend of anticipation and concern. Below, two of them explain the unique risks these systems introduce and the essential precautions all stakeholders—developers, regulators and end users—must take as AI-powered browsers gain traction in both enterprise and personal settings.

What Execs Need to Know Now to Avoid Data Protection Penalties

expert panel

Data protection rules are tightening faster than most executive teams can update their playbooks. California has approved new regulations requiring risk assessments and cybersecurity audits for many businesses, and the SEC has rolled out new cybersecurity disclosure requirements that raise the stakes for boards and C-suites. Globally, companies face tightening scrutiny, and the penalties for missteps can be steep: GDPR violation fines exceeded €3 billion in the first half of 2025 alone. For business leaders already juggling digital transformation, AI adoption and sprawling data ecosystems, managing incoming (and ongoing) waves of cybersecurity rules and regulations can feel overwhelming. But the real danger isn’t just the number or complexity of new rules—it’s the blind spots leaders don’t realize they have. From siloed security and shadow IT to hidden vendor vulnerabilities, many organizations have all the warning signs of an incoming compliance headache. As experts in enterprise cybersecurity strategies and regulatory compliance, the members of the Senior Executive Cybersecurity Think Tank know where leaders most often overlook risk—and why regulators tend to focus on those areas after a breach. Below, three of them share what executives should prioritize now to stay compliant and resilient and avoid costly surprises down the line.

How to Evaluate Third-Party Vendors: Key Security Questions for Executives

expert panel

Third-party technology tools promise efficiency, scale and all the digital bells and whistles execs need to keep productivity humming and power growth—but not all tools are created equal. Cloud platforms, SaaS productivity suites, niche workflow apps and industry-specific managed services can all introduce unseen risk when they plug into core systems. However, in many companies, third-party risk management continues to fly under the radar—even though 30% of enterprise data breaches involve a third party. From misaligned encryption standards and unclear data flows to vendors that treat compliance like a box-checking exercise, there are significant risks that can come with working with third-party vendors and SaaS tools. As experts in enterprise cybersecurity strategies, data breach prevention, risk management and regulatory compliance, the members of the Senior Executive Cybersecurity Think Tank know that to operate on trust when working with tech vendors is to court disaster. Below, three of them share the details to dig into before entering into a partnership with a third-party vendor or software provider.

Future-Proofing Cyber Teams in an Era of Escalating Risk

article

Demands on cybersecurity teams are growing faster than ever before. Members of the Senior Executive Cybersecurity Think Tank share how they’re transforming team culture, training strategies and internal collaboration to address both escalating attacks and shifting regulatory demands.

Navigating Evolving Global Privacy Laws: Advice From Cyber Experts

article

From SEC incident disclosure rules to evolving data privacy laws, cybersecurity leaders facing increasing scrutiny must rethink how compliance fits into daily operations. Members of the Cybersecurity Think Tank share practical frameworks and mindset shifts for staying ahead.

Man vs. Machine: How AI Can Strengthen Cybersecurity Efforts

article

From real-time anomaly detection to vulnerability prioritization at scale, AI is transforming cybersecurity operations. But Senior Executive Cybersecurity Think Tank members say human oversight is more important than ever. Here’s how they’re integrating machine learning into their cybersecurity efforts—and where they draw the line.

Company details

Edgescan Inc

Company bio

Continuous penetration testing and exposure management. Attack surface management

Industry

Computer & Network Security

Area of focus

Cyber Security
Artificial Intelligence
Cloud Computing

Company size

51 - 200