What You Don't Log Will Hurt You - Webinar with Jeremy Snyder and John Tobin of Virtual Guardian
You'll find useful content about AI & API security, the cybersecurity landscape, news, events and much more updated regularly here.
We’ve talked before about the importance of logging in your AI and API security posture. But what happens when organizations fail to log their interactions adequately? And what can you do within your own organization to prevent this? Explore all this and more with the latest webinar from FireTail.
If you prefer to be notified of new posts via email, simply subscribe to our blog below.
It’s here! The New CIS Guide for API Security provides teams with actionable steps for their own API security postures. API use is skyrocketing with the recent adoption of AI, and security teams are struggling to keep up with the rising threats. That’s where the CIS Guide comes in.
API security is a critical issue, especially with the rise of AI, which runs on APIs. So how do we ensure consistent API security in an age of growing threats? In this blog, we’ll go over one of the most critical enabling aspects of API security: API specifications.
FireTail’s latest platform update gives customers expanded AI security features and discovery capabilities to better find, document and protect AI initiatives across your organization. Here, we look at what the update covers and the benefits these new features deliver for FireTail customers.
In this blog, we are taking a closer look at Prompt Injection, the #1 vulnerability on the OWASP Top 10 list of LLM risks in 2025. Join us in the first of this 10-part series as we examine the root causes of prompt injection, how prompt injection attacks are carried out, and the best methods to avoid them.
FireTail has been selected as a finalist for the Blackhat Asia 2025 Startup Spotlight Competition. We're delighted to be taking part and can't wait to showcase how FireTail helps enterprises discover, assess, and secure AI usage while preventing threats like shadow AI, data leaks, and AI-specific attacks.
Researchers recently found a vulnerability in Apache Tomcat’s servers that would allow an attacker to commit Remote Code Execution with a single PUT request to a specific API, followed by a GET. And now, this vulnerability is officially being exploited in the wild.