Web applications face persistent risks from OWASP Top 10 web application threats. White text on a blue background.

Threat Detection and AI

| | AI, Cyber Security
In this blog series, we identified the challenges plaguing traditional security measures and introduced the modern three-pronged, AI-enhanced platform approach. In our second post, we examined the first pillar: threat prevention. We will now be breaking down the second pillar: threat detection. Uncovering Malicious Objectives: Seeing Beyond Human Limitations Modern ... Read More
96% of decision-makers agree Zero Trust is crucial; blue background.

What are Zero Trust APIs?

| | AI, Cyber Security
Over the past few years, APIs have become an integral part of virtually every digital platform. Gartner reports that APIs are at the heart of the digital business. According to Slashdata 19th Developer Economics Survey, nearly 90 percent of developers are using APIs in some capacity. Therefore, as the digital ... Read More
Top Challenges for AI Environments, Latency, Security, Operational Complexity

Enabling Secure, High-performance Infrastructure for AI and LLM Environments

| | AI, Cyber Security
Artificial Intelligence has been part of the technology landscape for decades, but recent developments in GPU processing power have accelerated its evolution and adoption at an unprecedented rate. Generative AI (GenAI) and large language models (LLMs) are now at the forefront of this transformation, redefining how organizations operate, innovate, and ... Read More
Credential Stuffing: Examples, Detection and Impact

Credential Stuffing: Examples, Detection and Impact

Credential stuffing has become one of the most common and significant threats facing organizations today and is a risk for virtually any application that has login functionality, which is to say most applications. Let’s take a closer look at what credential stuffing is, why it is a challenge to control, ... Read More

How to Secure APIs – 10 Best Practices to Follow

Application programming interfaces (APIs) are a foundation for modern software development. They simplify the development process by providing a wealth of functionality and interoperability for programmers to use as they build their products. They save time and resources by eliminating the need to develop existing functions from scratch. However, over ... Read More
Organizations continue to experience skill shortages and look for opportunities to automate resource-intensive cybersecurity tasks.

Threat Prevention and AI

In our first post in this blog series, we identified the challenges plaguing traditional security measures and introduced the modern three-pronged, AI-enhanced platform approach. Today, we will break down the first pillar: threat prevention. Modern Security Pillar One: AI-enhanced Threat Prevention Organizations must shift from reactive responses to proactive security ... Read More
How Artificial Intelligence is Changing the Game in Cybersecurity

How Artificial Intelligence is Changing the Game in Cybersecurity

Cybersecurity isn’t about building a bigger wall. It’s about building a smarter system that adapts faster than the threat evolves. Let’s cut through the noise right now: cybersecurity is broken—but not beyond repair. The threats are faster, the attack surfaces are wider, and the bad guys? They’re not just hackers ... Read More

The Dangers of Rushing into AI Adoption: Lessons from DeepSeek

As organizations race to adopt the latest advancements in artificial intelligence, DeepSeek serves as a cautionary tale about the potential dangers of rushing into the hype cycle without adequate consideration of security and ethical implications. DeepSeek, a Chinese AI startup, has been identified as having several significant security risks and ... Read More

Survey: Enterprises Seek New Load Balancing Vendors as Issues Mount

A cloud transformation is no time to discover shortcomings in your load balancing solution—or the vendor who provides it. But according to a recent series of industry surveys, that’s exactly the situation currently facing many enterprises. With hybrid environments now the norm, and cloud-first strategies on the agenda, both load ... Read More

Elevating Cyber Resilience with AI-powered Security

New A10 Networks Security Services In today’s digital age, as organizations modernize their applications and infrastructure by embracing hybrid cloud environments, API-centric architectures, and AI-driven technologies to enhance customer experiences and productivity, they also face an unprecedented increase in cyber threats aimed at disrupting their operations. According to research by ... Read More