Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The AI SOC Analyst That Offloads 90%+ of Tier-1 Cases - Meet Socrates

Security Operations Centers (SOCs) continue to struggle in 2025. The perfect storm of growing alert volume, consistent talent shortage, and the well-documented limitations of legacy SOAR solutions have brought many SOC teams to a breaking point. At the same time, bad actors continue to innovate, and cybercriminals have become more sophisticated in their tactics and techniques, including using AI to launch attacks at scale.

How Content Marketing Can Educate and Convert in the Security Space

In the rapidly evolving security industry, where trust and knowledge are critical, content marketing has emerged as a powerful strategy. It's no longer enough to simply showcase your product features. Instead, brands must educate their audience on complex security challenges and guide them toward effective solutions. This approach not only builds credibility but also drives conversions by addressing real customer pain points. In this blog, we explore how security companies can use content marketing to both educate and convert their audience.

API Compliance

Most organizations have no idea how many APIs are running in their environment – and that's a significant security problem. In this essential discussion, A10's security experts Akhilesh Dhawan and Jamison Utter tackle one of cybersecurity's biggest blind spots: API compliance and protection. Unlike traditional applications, APIs operate without standardized functionality requirements, creating a regulatory nightmare. This lack of standards renders APIs nearly impossible to govern effectively, making API discovery a mission-critical security function. If you can't see it, you can't protect it.

AI - More Than a Buzzword?

Lately, the common theme in emerging identity security technology has been… well, you know. AI. It’s all anyone wants to talk about. All of us in the IAM business have been scurrying to find a way to tell our customers and the market that, yes! we have AI! we've had it all along! If that were so obviously true, then why are we having to tell you about it now? As an identity security technologist, I’ve experienced the growing pains of AI in IAM.

Performance measurements... and the people who love them

Principal Engineer Kevin Guthrie walks us through his blog post, “Performance measurements… and the people who love them,” which explores how teams can better measure, visualize, and communicate web performance—beyond just raw metrics. Part of the “This Week in NET” show/podcast.

Verifying Bots and Agents with Cryptography in the Age of AI

In this episode, host João Tomé is joined in Cloudflare’s Lisbon office by our Senior Research Engineer Thibault Meunier to explore a new proposal that could reshape how bots interact with the web in the age of AI. Timestamps: We go into Cloudflare’s proposal of using cryptographic signatures for bots, enabling websites to verify their identity. Why is this important? As AI systems rely increasingly on online content, this standard could help build a better relationship between content creators and AI platforms.

Poison everywhere: No output from your MCP server is safe

The Model Context Protocol (MCP) is an open standard and open-source project from Anthropic that makes it quick and easy for developers to add real-world functionality — like sending emails or querying APIs — directly into large language models (LLMs). Instead of just generating text, LLMs can now interact with tools and services in a seamless, developer-friendly way.

What is an API Specification?

API specifications are no longer just tools for developers; they are also essential for businesses. In today’s hyperconnected enterprise, they serve as strategic assets that define how digital ecosystems interact, share data, and enforce security protocols. Yet, most C-suite leaders underestimate their influence on risk posture, regulatory compliance, and operational resilience. That needs to change.

Network Solutions API

Network APIs have quietly evolved from backend enablers to frontline security and business risk vectors. While traditionally viewed as infrastructure tools, they significantly influence enterprise agility, availability, and threat surface. For CISOs and CFOs navigating the complexities of digital transformation and cyber risk governance, the security of these APIs is no longer optional—it is foundational.

Building a Secure Foundation: Compliance-Driven API Posture Governance

APIs are the vital connectors of modern digital business, powering everything from e-commerce and financial transactions to healthcare data exchange and government services. While indispensable for innovation, this widespread API adoption introduces significant security risks.