<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=7015364&amp;fmt=gif">
Mitigating Vector and Embedding Weaknesses

Mitigating Vector and Embedding Weaknesses

OWASP released a new version of the Top 10 LLM risks in November 2024, adding a new category: Vector and Embedding Weaknesses. ...

Learn More
Rolling out M365 Copilot? Beware of Overshared Content

Rolling out M365 Copilot? Beware of Overshared Content

Enterprises are rolling out Microsoft 365 (M365) Copilot for productivity gains, helping in variety of tasks—summarizing emails ...

Learn More
The State of Security Observability in Agentic Platforms

The State of Security Observability in Agentic Platforms

As AI agents move from experiments to production in enterprises, security observability has become critical. Unlike traditional ...

Learn More
Detecting XPIA (Cross Prompt Injection Attacks)

Detecting XPIA (Cross Prompt Injection Attacks)

Detecting XPIA (Cross Prompt Injection Attacks) Cross Prompt Injection Attacks (XPIA) are in the news. One recent case is ...

Learn More
Monitoring Agentic Tool Use with Observability Data

Monitoring Agentic Tool Use with Observability Data

Over the past few months, we’ve witnessed a growing concern in the agentic AI space: agents going rogue and executing harmful ...

Learn More
Where Ackuity Fits Into GenAI Security

Where Ackuity Fits Into GenAI Security

Where Ackuity Fits Into GenAI Security GenAI security is complex and evolving, and so are the solutions that address it. While ...

Learn More
Top 10 Gen AI Security Risks

Top 10 Gen AI Security Risks

At the Prompt level 1. Prompt injection LLMs have guardrails to filter out specific content. Also, when enterprises build their ...

Learn More