Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Keep AI interactions secure and risk-free with Guardrails in AI Gateway

The transition of AI from experimental to production is not without its challenges. Developers face the challenge of balancing rapid innovation with the need to protect users and meet strict regulatory requirements. To address this, we are introducing Guardrails in AI Gateway, designed to help you deploy AI safely and confidently.

Does Claude 3.7 Sonnet Generate Insecure Code?

With the announcement of Anthropic’s Claude 3.7 Sonnet model, we, as developers and cybersecurity practitioners, find ourselves wondering – is the new model any better at generating secure code? We commission the model to generate a classic CRUD application with the following prompt: The model generates several files of code in one artifact, which the user can manually copy and organize according to the file tree suggested by Claude alongside the main artifact.

Navigating the API Security Landscape: Progress and Persistent Challenges in 2025

API adoption has become a critical driver of digital transformation, fueling cloud migration, seamless integrations, and the monetization of data and functionality. This rapid expansion, however, has inadvertently created increasingly complex ecosystems that often outpace the security measures designed to protect them.

The Dawn of Agentic AI in the SOC

Now that six in ten security leaders view AI as a “game changer” across all security functions and 85% of security professionals report increased AI investment and usage in the past year, it’s clear that AI is no longer a fringe technology in security operations. But the AI conversation has evolved recently as a new buzzword has taken over: agentic AI.

CrowdStrike Falcon Cloud Security Expands Support to Oracle Cloud Infrastructure

CrowdStrike is thrilled to announce a collaboration with Oracle that will bring the unified, AI-powered protection of CrowdStrike Falcon Cloud Security support to Oracle Cloud Infrastructure (OCI). As OCI has become a strategic choice for organizations seeking enterprise-grade performance and security, this expansion improves the visibility and protection to defend against cloud-focused threats.

From Zero to CTEM: An Actionable Approach to the Five Stages

Join Nucleus team members Tali Netzer, Head of Product Marketing, and Scott Koffer, COO and Co-Founder, as they navigate the intricacies of Continuous Threat Exposure Management (CTEM). In this webinar, they discuss the history of vulnerability management, the evolution to CTEM, and how it fundamentally changes the approach to cybersecurity. Learn about the five-step CTEM process, from scoping and prioritization to validation and mobilization.

Strengthening Industrial Security with Advanced 3D Printing Technologies

3D printing has become an essential tool in modern manufacturing, providing businesses with new ways to produce secure, high-quality components while reducing reliance on complex supply chains. However, as additive manufacturing gains widespread adoption, security concerns related to intellectual property, supply chain integrity, and cyber threats are becoming more significant.