Latest news with #Tuskira


Techday NZ
30-04-2025
- Business
- Techday NZ
Tuskira launches AI Analyst Workforce to automate threat defence
Tuskira has launched a fully autonomous AI Analyst Workforce designed to simulate threats, validate security controls, and take action against adversarial AI across SIEM, EDR, identity, and firewall tools. The new solution introduces a fleet of specialist AI agents for different stages of the detection-to-response workflow, replacing much of the manual effort required by security teams with automated, goal-driven systems. According to Tuskira, this advancement moves security automation beyond current agentic AI and provides a dedicated AI analyst for every significant step in the detection and defence process. The platform aims to tackle high-priority cybersecurity issues, including the rise of AI-facilitated attacks and the operational impacts of alert fatigue and analyst burnout. Tuskira's system enables both human-machine collaboration and fully autonomous execution in areas such as triage, validation, and rapid response. The company states that its AI Analysts have the capacity to simulate real-world cyberattacks, assess the robustness of defensive measures, and autonomously respond across multiple security technologies. Piyush Sharma, Chief Executive Officer and co-founder of Tuskira, highlighted the challenges security teams face. "Security teams are overwhelmed because they lack the time and resources to respond to what they're detecting fast enough," said Sharma. "Tuskira replaces manual triage with an autonomous AI workforce that validates exposures, closes the loop from detection to defense, and keeps teams ahead of threats, without burning them out." Among its features, the solution provides Autonomous SIEM Optimisation, which continually evaluates detection coverage, enriches alerts with context, and modifies rules to cut down on false positives and eliminate any blind spots. Tuskira says this upgrade can replace static detection mechanisms with adaptive, evolving defences—reducing the demand for ingesting superfluous log data and improving the cost-efficiency of security operations. Highlighting the business impact, early users of Tuskira's platform have seen a 99% reduction in alert noise and a 50% faster response to threats. Further metrics include an 80% reduction in manual triage caused by automated signal enrichment and a 50% reduction in operational costs by supplementing existing staff with AI Analysts. Tuskira's AI Analyst Workforce includes purpose-built agents mapped to the traditional roles found in security teams such as VM, SOC, GRC, and AppSec, delivering measurable KPIs for each. Each specialised AI Analyst operates across the stack, leveraging AI-curated data from over 150 security tools and a digital twin of the client's digital environment to identify real risks and prompt necessary actions. The core analysts within the automated roster include a Zero-Day Analyst for detecting new attack types using anomaly models and threat intelligence and providing proactive mitigation with current controls. The Threat Intel Analyst works to correlate emerging indicators of compromise and tactics, techniques, and procedures with internal telemetry to uncover stealthy threats in context. Other specialised roles encompass the Defence Optimisation Analyst, tasked with real-time simulation of threats and tuning controls; the Vulnerability Analyst, which assesses the true risk of vulnerabilities; and the Alert Analyst, which handles alert triage and generates remediation actions for risks such as lateral movement and exposed credentials. Tuskira's technology incorporates continuous Autonomous SIEM Optimisation intended to ensure that the system adjusts dynamically to changing threats, continuously enriching threat alerts and tuning security rules. This is designed to support teams in maintaining high signal fidelity without an excess of false alarms or unnecessary data ingestion. The firm identified urgent priorities for their platform as preventing breaches through AI-powered Continuous Threat Exposure Management, analysing and responding to zero-day threats with behaviour-based intelligence, and improving alert investigation and resolution across identity, endpoint, and infrastructure domains. The company's mission, as stated, is to deploy self-learning AI analysts that maintain and manage cybersecurity risks, turning static defences into adaptive, self-tuning systems. Tuskira's agents work to autonomously analyse incoming threats and vulnerabilities, validate and optimise defences in real-time, and manage exposures continuously to speed up response, strengthen protection, and reduce operational costs in line with the evolving threat environment. Whether organisations are coping with advanced cyber threats, high alert volumes, or the need to prioritise vulnerabilities, Tuskira's suite of AI Analysts is positioned to help address these tasks without the typical complexity or strain experienced by human teams.


Business Wire
28-04-2025
- Business
- Business Wire
Tuskira Launches Virtual AI Analysts Workforce at RSAC 2025 to Combat the Rise of AI-Based Attacks
SAN FRANCISCO--(BUSINESS WIRE)-- Tuskira, the first AI-native platform built to unify and optimize proactive and responsive security operations, today announced the launch of its fully autonomous AI Analyst Workforce at RSA Conference 2025. Designed to combat both the speed of adversarial AI and the strain of alert fatigue and analyst burnout, Tuskira enables human and AI co-execution across triage, validation, and response. Its AI Analysts simulate real-world attacks, validate defensive coverage, and autonomously take action across SIEM, EDR, identity, and firewall tools, mitigating risks before they escalate into incidents and freeing up security teams to focus on what matters most. 'Security teams are overwhelmed because they lack the time and resources to respond to what they're detecting fast enough,' said Piyush Sharma, CEO and co-founder of Tuskira. 'Tuskira replaces manual triage with an autonomous AI workforce that validates exposures, closes the loop from detection to defense, and keeps teams ahead of threats, without burning them out.' Tuskira Delivers AI-Powered Defense Across the Most Critical Use Cases Tuskira is built to solve three of the most urgent and persistent challenges in cybersecurity: Preventing breaches through AI-Powered CTEM that pinpoints what's truly exploitable and currently undefended Analyzing and responding to zero-day threats using AI-driven threat intelligence and real-time behavioral simulation Investigating and resolving alerts across identity, endpoint, and infrastructure with complete infrastructure telemetry and posture context by augmenting SOC teams with AI analysts These use cases are operationalized through Tuskira's fleet of purpose-built AI Analysts trained to deliver on VM, SOC, GRC, AppSec team's roles and responsibilities, and maintain measurable KPIs. Meet the Tuskira AI Analyst Workforce Each AI Analyst mirrors a critical security function, operating continuously across the stack to identify real risk and drive action. Tuskira's AI Analysts work upon AI-curated security data ingested from over 150 tools and overlaid upon a dynamic digital twin of the environment. Core Analysts include: Zero-Day Analyst – Detects novel attacks via anomaly models and threat intel; delivers proactive mitigation using existing controls. Threat Intel Analyst – Correlates emerging IOCs and TTPs with internal telemetry; surfaces stealthy threats in context. Defense Optimization Analyst – Tunes SIEM, EDR, WAF, and firewall rules via real-time threat simulation. Vulnerability Analyst – Identifies toxic security risks of vulnerabilities based on reachability, exposure, exploitability, business context, and defense coverage Alert Analyst – Triage alerts for detection and response to lateral movement risks, exposed credentials, and stealthy attacks; auto-generates mitigations A major part of enabling the AI Analysts' effectiveness is making sure your SIEM can keep up. Tuskira's Autonomous SIEM Optimization continuously evaluates detection coverage, enriches alerts with posture and telemetry context, and tunes rules to reduce false positives and eliminate blind spots. Proven Business Impact Real-world data confirms the impact of Tuskira's AI Analyst Workforce: 99% less alert noise before it reaches the queue 80% reduction in manual triage through intelligent signal enrichment 50% faster response times from preemptive mitigation 50% lower operational costs by augmenting the existing workforce with AI Analysts Your Next Security Hire is an AI Analyst Whether you're dealing with zero-day threats, drowning in alerts, or trying to validate which vulnerabilities actually matter, Tuskira's AI Analysts are built to help you preempt, defend, and respond without the complexity or fatigue. Visit to meet your AI Analyst Workforce or stop by Booth #N-5371 at RSA Conference 2025. About Tuskira Tuskira's mission is to deploy a fleet of self-learning AI analysts that continuously assess and manage cybersecurity risks by transforming traditional defenses into adaptive, self-adjusting systems. These AI agents autonomously analyze AI-driven attacks and known vulnerabilities, ensuring continuous validation and optimization of defenses in real time. By continuously managing and reducing threat exposure, Tuskira aims to accelerate response times, strengthen defenses, and minimize operational costs, all while adapting to the evolving threat landscape. Learn more at