Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

API Vulnerabilities and Attack Surface Management

ThreatX by A10 Networks: API Vulnerabilities and Attack Surface Management In this video, Carlo Alpuerto of A10 Networks discusses API security with Beau Hamilton of SourceForge. He explains that API security is a broad term that includes addressing vulnerabilities in the development cycle, which takes time and involves various stages like QA, staging, and UAT.

Top 25 Web Application Firewalls (WAFs) of 2026: Cloudflare Alternatives, Features & Pricing

In today’s hyper-connected world, Web Application Firewalls (WAFs) have become one of the most critical layers in a modern security stack. As businesses shift more operations, data, and user experiences online, web apps and APIs are increasingly under siege – from basic bot scraping to sophisticated logic abuse and zero-day exploits.

Complete Guide for SaaS PMs to Develop AI Features Without Leaking Customer PII

Enterprises are making bold, strategic changes in their tech stack to ramp it up by incorporating AI. With positive results of AI showing, investments are rapidly flowing in – but all this does not come without consequences. Today, privacy has become a key concern around safe AI use, especially without strong guardrails. Managing innovation and compliance risks become a challenge for SaaS product managers unless they know the right way of balancing both.

Adapting to the Changing AI Threat Landscape

Adapting to the Changing AI Threat Landscape In this video, A10 Networks' security leaders, Jamison Utter, Madhav Aggarwal, and Diptanshu Purwar, discuss the evolving security risks associated with AI and Large Language Model (LLM) adoption, as well as what organizations must do to stay protected. Diptanshu Purwar outlines key shifts in the approach to AI security.

Can AI hackers access the smart devices in my home? #ai #cybersecurity

New research shows how attackers could hijack Google's Gemini AI through a simple calendar invite to control smart lights, shutters, and even boilers. The key insight from our latest podcast is that it's not about the AI vulnerability, it's about network segmentation. The real lesson? Don't give AI systems direct access to your physical devices. The simple fix is to segment your IoT devices on separate networks.

When AI Agents Go Awry

When your AI agents go awry, rewind those changes easily with Agent Rewind from Rubrik. As AI agents gain autonomy and optimize for outcomes, unintended errors can lead to business downtime. Agent Rewind will enable organizations to undo mistakes made by agentic AI by providing visibility into agents' actions and enabling enterprises to rewind those changes to applications and data. We’ve integrated Predibase's advanced AI infrastructure with Rubrik's recovery capabilities to enable enterprises to embrace agentic AI confidently.

Why Authorization Is Still the Weakest Link in API Security? #apisecurity #authorization #zerotrust

Even as authentication improves, broken authorization remains one of the most exploited vulnerabilities in APIs. In this clip, Wallarm and Oracle experts discuss real-world authorization flaws—including how missing or weak access checks can let attackers access sensitive data and functions. Learn why robust, field-level authorization is essential to protecting your APIs.