Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Asymmetric Threat: Why AI API Traffic is Hard to Predict

The Asymmetric Threat: Why AI API Traffic is Hard to Predict As AI becomes more integrated into business operations, the way data moves through APIs is changing. In this clip from the A10 Networks webinar, "APIs are the Language of AI: Protecting Them is Critical," experts Jamison Utter and Carlo Alpuerto break down the concept of data asymmetry in AI.

AI vs. Legacy Systems: Why Your Old Documentation Isn't Safe

AI vs. Legacy Systems: Why Your Old Documentation Isn’t Safe In this A10 Networks discussion, "APIs are the Language of AI: Protecting Them is Critical," security experts Jamison Utter and Carlo Alpuerto tackle one of the most overlooked threats in modern IT: the "specter in the shadow." For years, many organizations relied on "security through obscurity"—the idea that if a system is old or undocumented, it's safe from attackers. However, AI has changed the rules. These systems can now decipher legacy documentation and communicate with obscure systems faster than a human ever could.

How Agentic AI Creates Shadow APIs: Security Risks Explained

How Agentic AI Creates Shadow APIs: Security Risks Explained As businesses move from static applications to Agentic AI, the security landscape is shifting beneath our feet. In this clip from the A10 Networks webinar, "APIs are the Language of AI: Protecting Them is Critical," experts Jamison Utter and Carlo Alpuerto discuss a new frontier in cybersecurity: AI that builds its own APIs.