Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Scale Application Traffic Automatically with A10 FlexPool

How to Scale Application Traffic Automatically with A10 FlexPool Priyanka Mullan, Senior Product Marketing Manager at A10 Networks, explains how FlexPool revolutionizes application delivery by dynamically allocating resources based on real-time user demand. Whether you are managing a sudden traffic surge from a major online event or balancing workloads across a hybrid cloud environment, FlexPool ensures your infrastructure scales automatically, without manual intervention. Learn how to maintain peak application performance while significantly reducing operational costs.

How a Fortune 50 Company Deployed Agentic AI at Scale Without Losing Control of Their Data

In late 2025, a Fortune 50 enterprise decided to deploy autonomous AI agents across core business operations. Customer support that could reason through complex issues. Supply chain systems that could adapt in real time. Product managers with AI assistants pulling insights from dozens of data sources simultaneously. The capabilities that made the agents useful also introduced a problem nobody had a clean answer for. These weren’t chatbots locked inside a single application.

Why Synthetic Data for AI Fails in Production

Synthetic data has been fine for testing software for decades. Traditional apps follow rules. You check inputs, check outputs, file a bug when something breaks. AI is different. AI gets deployed into the situations where the rules aren’t clear and context is everything. The edge cases aren’t exceptions. They’re the whole point. That changes what your test data needs to look like.

Are AI Security Tools the New EDR? Attackers Are Treating Them That Way

AI security tools are no longer just defensive layers. They are high value targets being studied, fingerprinted, and bypassed much like traditional endpoint detection and response (EDR) platforms and antivirus solutions were in their early days. The speed and scale at which these tools are being deployed makes reactive defense increasingly unsustainable.

From Phishing to AI Agents: Can We Design for Digital Mindfulness?

Anyone who knows me knows I’m passionate about mindfulness. Because I genuinely believe it makes us better humans. But also, because I have one of those brains that desperately needs it. I’m easily distracted and I start new ideas before finishing old ones. My attention can scatter in a hundred directions. I wrote before how I clicked on a phishing test because I was multitasking and running on autopilot. And that moment really changed the direction of my career and my research.

What is Integrated Cloud Email Security (ICES) and Why do you Need It?

Integrated cloud email security (ICES) is a term coined by industry analyst, Gartner, in their 2021 Market Guide for Email Security. The guide was reissued in 2023 and stated that ‘by 2025, 20% of anti-phishing solutions will be delivered via API integration with the email platform, up from less than 5%” at the time of publication’.

Introducing AI-powered Contextual Project Classification: From severity scores to business risk

Today, Mend.io is launching Contextual Project Classification, an AI-native feature that automatically analyzes your codebase to identify which applications handle sensitive data like payments, healthcare records, and PII, enabling true risk-based security prioritization.

Meet the Industry's First GPU-Powered SASE Platform with Native AI Security

AI has moved from experimentation to a strategic enterprise imperative. It’s no longer about whether organizations will adopt AI, but whether their security architecture can govern it at the speed and scale at which it is being embedded into the business. This is not a future concern. It is today’s operational mandate to: Securing AI is not limited to software applications and agents.