Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mapping the Future of AI Security

AI security is one of the most pressing challenges facing the world today. Artificial intelligence is extraordinarily powerful, and, especially considering the advent of Agentic AI, growing more so by the day. But it is for this reason that securing it is so important. AI handles massive amounts of data and plays an increasingly important role in operations; should cybercriminals abuse it, the consequences can be dire.

Strengthening Cloud Security: API Posture Governance, Threat Detection, and Attack Chain Visibility with Salt Security and Wiz

In the current cloud-centric environment, strong API security is essential. Google's acquisition of Wiz underscores the urgent necessity for all-encompassing cloud security solutions. Organizations should focus on both governing API posture — ensuring secure configuration and deployment to reduce vulnerabilities and assure compliance — and on effective threat detection and response.

Developer Leaks API Key for Private Tesla, SpaceX LLMs

In AI, as with so many advancing technologies, security often lags innovation. The xAI incident, during which a sensitive API key remained exposed for nearly two months, is a stark reminder of this disconnect. Such oversights not only jeopardize proprietary technologies but also highlight systemic vulnerabilities in API management. As more organizations integrate AI into their operations, ensuring robust API security has never been more critical.

The Ongoing Risks of Hardcoded JWT Keys

In early May 2025, Cisco released software fixes to address a flaw in its IOS XE Software for Wireless LAN Controllers (WLCs). The vulnerability, tracked as CVE-2025-20188, has a CVSS score of 10.0 and could enable an unauthenticated, remote attacker to upload arbitrary files to a susceptible system – but the real story is that this vulnerability drives home the persistent risks associated with hardcoded credentials, particularly JSON Web Tokens (JWTs), in network infrastructure components.

APIs: The Invisible Backbone of Digital Transformation

APIs: The Invisible Backbone of Digital Transformation In today's app-driven economy, APIs (Application Programming Interfaces) have become the foundation for innovation and connectivity. A10's security experts Carlo Alpuerto and Jamison Utter explore the explosive growth in API development and adoption across industries. These powerful interfaces now power everything from financial services and retail experiences to transportation systems, IoT devices, autonomous vehicles, and smart city infrastructure.

Addressing API Security with NIST SP 800-228

APIs are quickly becoming the primary attack surface targeted by cyber criminals. The rise of generative AI systems, which run on APIs, has driven a dramatic increase in the number of APIs in use. How can you ensure your existing APIs and growing AI deployments remain secure, compliant, and resilient? NIST has now released an initial public draft of SP 800-228: Guidelines for API Protection for Cloud-Native Systems.