Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Language Switching Attacks: The New Threat Vector in LLM Security

Language Switching Attacks: The New Threat Vector in LLM Security In this clip from "Securing AI Part 4: The Rising Threat of Hidden Attacks in Multimodal AI," Diptanshu Purwar discusses the growing trend of language-switching attacks. These techniques exploit the ongoing development and training gaps in Large Language Models (LLMs). Diptanshu explains how attackers can evade an LLM's built-in filters and guardrails by rapidly shifting between different languages, particularly less common ones, to find weaknesses where the model's safety data is sparse.

Stop Alert Fatigue: Delivering Time and Assurance to the SOC Team

In his talk from Black Hat USA 2025, A10 Networks security expert Jamison Utter challenges the conventional approach to security alerting and automation. He argues against the "magic AI" hype and champions a model where intelligent systems augment human analysts, rather than overwhelming them. Jamison highlights the critical process of filtering security data to deliver real value to the SOC team.

The Essential Definition of AI Agents: Tools, APIs, and Workflow Automation

In this video segment from Securing AI Part 3: AI Agents – Use Cases and Security, A10 security experts, Jamison Utter, Diptanshu Purwar, and Madhav Aggarwal explore the topic of securing AI agents, which they define as systems that perceive, decide, and act. Diptanshu Purwar starts with a fundamental definition of an AI agent, clearly distinguishing it from a simple chatbot and setting the stage for the security challenges discussed in the series.

Futurize, Unite, and Simplify Application Security: A Black Hat Discussion

In this video from Black Hat 2025, A10 Networks security expert Jamiso Utter explains the critical need to "futurize our defenses." He argues that many current cybersecurity solutions, such as firewalls and Regex, are built on decades-old technology, making them ill-equipped to handle today's emerging threats. Jamison highlights the problem with buying from companies whose "bottom line is more important than your bottom line," leading to a fragmented "best-of-breed" approach that ultimately adds complexity to a network.

Agentic AI Security: Introducing the AI Firewall/Guardrail

As organizations adopt powerful AI agents for complex B2B workflow automation, securing their actions and ensuring compliance becomes paramount. A10 Networks' security expert, Diptanshu Purwar, explains the foundational need to integrate AI agents into existing governance platforms, which involves utilizing established enterprise security practices, such as role-based access and robust policy management, tailored explicitly for agents.

Verifiable AI: Policy Management for Next-Gen AI Security

As AI agents increasingly automate complex B2B workflows, how do organizations ensure security and compliance? In this segment, A10 Networks' security experts, Jamison Utter, Diptanshu Purwar, and Madhav Aggarwal, dive into the critical steps for securing AI deployments. Diptanshu emphasizes the importance of integrating AI agents into existing governance platforms, leveraging systems such as role-based access control and policy management.

API Security: A Holistic View on Protecting Web Presences

In this video from Black Hat 2025, A10 Networks security expert Jamison Utter explains the importance of a unified, "one mind" approach to API security. He argues against the traditional, "stitched-together" method of using separate tools for different threats (e.g., API protection and a WAF). Instead, A10's real-time API protection solution looks at the holistic behavior of traffic and applies a single, intelligent security model to protect your web presence.