Close Menu
Versa AI hub
  • AI Ethics
  • AI Legislation
  • Business
  • Cybersecurity
  • Media and Entertainment
  • Content Creation
  • Art Generation
  • Research
  • Tools

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

What's Hot

Building cost-effective enterprise RAG applications using Intel Gaudi 2 and Intel Xeon

May 18, 2025

Republicans are trying to boost AI while tightening grips on social media and online speeches

May 17, 2025

Face x Langchain embrace: a new partner package

May 17, 2025
Facebook X (Twitter) Instagram
Versa AI hubVersa AI hub
Sunday, May 18
Facebook X (Twitter) Instagram
Login
  • AI Ethics
  • AI Legislation
  • Business
  • Cybersecurity
  • Media and Entertainment
  • Content Creation
  • Art Generation
  • Research
  • Tools
Versa AI hub
Home»Cybersecurity»ORCA Security acquires OPUS and acquires AI Agent Orchestration Technology
Cybersecurity

ORCA Security acquires OPUS and acquires AI Agent Orchestration Technology

versatileaiBy versatileaiMay 16, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
#image_title
Share
Facebook Twitter LinkedIn Pinterest Email

ORCA Security revealed this week that it has access to technology that allows it to acquire OPUS and can coordinate AI (AI) agents trained to automate various cybersecurity tasks.

Opus previously adopted its core capabilities to drive the vulnerability management platform that ORCA Security is currently planning for sunset.

Orca Security CEO Gil Geron said the AI ​​agent orchestration technology developed by OPUS will be incorporated into the company’s Cloud-Native Application Protection Platform (CNAPP).

AWS Hub

Ultimately, the ability to coordinate AI agents performing routine tasks on behalf of cybersecurity teams proves to be a game changer, says Geron.

In addition to eliminating the painstaking majority of cybersecurity experts often conspire to burn, AI agents can go a long way in closing the lack of cybersecurity skills that have plagued organizations for a long time, he added.

Reducing the amount of hardship combined with the inference ability that AI agents can call will help level things out what is now clearly a biased cybersecurity arena, Jeron noted. He noted that most existing cybersecurity teams already have chronic staffing shortages.

Additionally, cybersecurity teams will discover that AI agents will soon be easier to work with DevOps teams to fix vulnerabilities in their applications and infrastructure, Geron said.

It’s not very clear, but it’s about how much AI agents will accelerate their broader drive towards integration. Organizations continue to invest in cybersecurity, but in the long run, they tend to adopt a platform that promises to eliminate the need for many of the bespoke cybersecurity tools that are regularly employed today. The overall goal is to make it easier for cybersecurity teams to identify and respond to cybersecurity threats in ways that reduce the total cost of cybersecurity.

The integration initiatives of these platforms should also provide the additional benefit of being able to train AI models more easily with data that is easy to collect and normalize.

It is not clear how widely AI is adopted among cybersecurity teams, but it is rapidly becoming clear that many cybersecurity teams cannot succeed without it. The enemy has already invested heavily in AI and launched more sophisticated attacks at unprecedented scale levels. The only way a cybersecurity team can keep pace is basically to fight AI fires with AI fires.

AI will quickly replace the need for cybersecurity experts, but the nature of these roles within an organization will undoubtedly change. Today’s cybersecurity teams are permanently trapped in a race against time to prevent the next violation or to fix issues that have led to recent violations. If faster cybersecurity teams can identify the root cause of the problem, the less damage will occur.

In the meantime, cybersecurity teams will need to invent an inventory of tasks that could be quickly assigned to AI agents who will not get tired, bored or sick. Everything else is the real part of the work they actually enjoy, which they are likely to discover soon.

author avatar
versatileai
See Full Bio
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleThe evolving role of AI in shaping the future of physical safety
Next Article AI Security Status in 2025: Key Insights from the Cisco Report
versatileai

Related Posts

Cybersecurity

What is the security attitude of campus in the age of AI? – Campus Technology

May 17, 2025
Cybersecurity

AI Security Status in 2025: Key Insights from the Cisco Report

May 16, 2025
Cybersecurity

The evolving role of AI in shaping the future of physical safety

May 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

The UAE announces bold AI-led plans to revolutionize the law

April 22, 20253 Views

The UAE will use artificial intelligence to develop new laws

April 22, 20253 Views

New report on national security risks from weakened AI safety frameworks

April 22, 20253 Views
Stay In Touch
  • YouTube
  • TikTok
  • Twitter
  • Instagram
  • Threads
Latest Reviews

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

Most Popular

The UAE announces bold AI-led plans to revolutionize the law

April 22, 20253 Views

The UAE will use artificial intelligence to develop new laws

April 22, 20253 Views

New report on national security risks from weakened AI safety frameworks

April 22, 20253 Views
Don't Miss

Building cost-effective enterprise RAG applications using Intel Gaudi 2 and Intel Xeon

May 18, 2025

Republicans are trying to boost AI while tightening grips on social media and online speeches

May 17, 2025

Face x Langchain embrace: a new partner package

May 17, 2025
Service Area
X (Twitter) Instagram YouTube TikTok Threads RSS
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
© 2025 Versa AI Hub. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.

Sign In or Register

Welcome Back!

Login to your account below.

Lost password?