Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

How Can You Use the Dow Jones Chart to Understand Market Trends?

Dow Jones' chart is an excellent graphical resource that can convert intricate market information into understandable trends and patterns. The market performance chart offers investors immediate responses to what the market has achieved over different periods and is therefore a key element of effective investment strategy. Possessing reading and interpreting skills of such charts can significantly help your ability to invest wisely and discover potential market opportunities.

Third-party risk is everyone's problem: What CISOs need to know now

In this article The alarm wasn’t a breach. It was an invoice. A mid-sized enterprise onboarding a new analytics vendor found themselves tangled in a post-implementation scramble: customer data had been shared without encryption, the vendor’s security posture was based on trust alone, and legal had skipped the SLA review because “they’d worked with them before.” What followed wasn’t a data loss, but something quieter and more corrosive, an erosion of confidence.

xonPlus Launches Real-Time Breach Alerting Platform for Enterprise Credential Exposure

xonPlus, a real-time digital risk alerting system, officially launches today to help security teams detect credential exposures before attackers exploit them. The platform detects data breaches and alerts teams and systems to respond instantly. Built by the team behind XposedOrNot, an open-source breach detection tool used by thousands, xonPlus gives organizations instant visibility when their email addresses or domains appear in breach dumps or dark web forums.

What Is AI Penetration Testing? A Guide to Autonomous Security Testing

AI penetration testing is changing how organizations identify and exploit vulnerabilities. Instead of relying on traditional manual tests or basic automated scans, autonomous systems now simulate attacker behavior continuously and at scale. These systems use agentic AI to execute real-world exploits, reduce noise, and shift security left, all while keeping human experts focused on the creative flaws machines can’t yet catch.

Securing AI-Generated Code: Why It Matters

Securing AI-Generated Code: Why It Matters In this video, A10's Madhav Aggarwal explains how using AI for coding is an excellent use case, but the code generated by AI must be safe and secure. As AI and large language models (LLMs) become central to enterprise strategy, securing these powerful workloads is no longer optional—it's essential. A10 Networks' security leaders, Jamison Utter, Madhav Aggarwal, and Diptanshu Purwar, explore the growing security risks associated with AI/LLM adoption and what organizations must do to stay protected.

Security is a Critical Factor in AI Adoption

Security is a Critical Factor in AI Adoption Jamison Utter joins A10's GenAI experts Madhav Aggarwal and Diptanshu Purwar to discuss the critical importance of security for AI adoption. They cover how AI fundamentally shifts the attack surface, requiring a move from traditional rule-based pattern matching to understanding natural language semantics. The team emphasizes the need for alignment in AI to ensure models are "helpful, harmless, and honest" (the 3H philosophy) and highlights the role of red teaming and guardrails in preventing vulnerabilities, such as prompt injection.