Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
The New AI Attack Surface: 3 AI Security Predictions for 2026 

By

Dor Sarig

and

December 3, 2025

Blog
What the Anthropic 'AI Espionage' Disclosure Tells Us About AI Attack Surface Management

By

Dor Sarig

and

November 17, 2025

Blog
AI Asset Inventory: The Foundation of AI Governance and Security

By

Dor Sarig

and

October 29, 2025

Blog
AI Red Teaming Playbook

By

Dan Lisichkin

and

October 8, 2025

Guides
Securing AI On-Premise: Full Data Control with Pillar

By

Dor Sarig

and

September 29, 2025

Blog
A Milestone for Pillar: Honored as Frost & Sullivan's 2025 Competitive Strategy Leader for AI Security

By

Dor Sarig

and

September 17, 2025

News
Securing Context Engineering

By

Dor Sarig

and

September 10, 2025

Blog
Addressing Vertical Agentic Risks with Taint Analysis

By

Dor Sarig

and

September 3, 2025

Blog
Pillar Security's Enhanced Amazon Bedrock Integration: Complete AI Security and Governance

By

Dor Sarig

and

August 26, 2025

Blog
Why I’m Joining Pillar Security by Jenna Raby

By

Jenna Raby

and

August 20, 2025

Blog
From Static Scanning to Recursive Loops: Lessons from a Decade in Data Science and AI

By

Uri Feldman

and

August 18, 2025

Blog
Anatomy of an Indirect Prompt Injection

By

Ariel Fogel

and

Dan Lisichkin

August 12, 2025

Research
Deep Dive Into The Latest Jailbreak Techniques We've Seen In The Wild

By

Dor Sarig

and

July 31, 2025

Research
Building Your AI Security Roadmap

By

and

July 30, 2025

Webinars
Analyzing the Amazon Q Incident Using the SAIL Framework

By

Ziv Karliner

and

July 29, 2025

Blog
From Shift Left to Shift Up: Securing the New AI Abstraction Layer

By

Dor Sarig

and

July 14, 2025

Blog
LLM Backdoors at the Inference Level: The Threat of Poisoned Templates

By

Ariel Fogel

and

July 9, 2025

Research
Introducing the SAIL Framework: A Practical Guide to Secure AI Systems

By

Dor Sarig

and

Ziv Karliner

July 2, 2025

News
Redefining Security Roles for the AI Era: Responsibilities and Controls

By

Dor Sarig

and

June 18, 2025

Blog
Understanding ISO 42005 AI Impact Assessment

By

Hadar Yakir

and

May 30, 2025

Blog
What is AI Assets Sprawl? Causes, Risks, and Control Strategies

By

Dor Sarig

and

May 28, 2025

Guides
The Hidden Security Risks of SWE Agents like OpenAI Codex and Devin AI

By

Dor Sarig

and

May 19, 2025

Blog
Building AI-Powered Software? Prepare to Answer These 11 Security Questions

By

Dor Sarig

and

May 14, 2025

Guides
Code Red: In the Age of AI, Your Data is Executable

By

Dor Sarig

and

May 6, 2025

Blog
Securing your AI via AI Gateways

By

Hadar Yakir

and

April 28, 2025

Blog
Pillar Security Raises $9M to Help Companies Build and Run Secure AI Software

By

Dor Sarig & Ziv Karliner

and

April 16, 2025

News
The Security Risks of Model Context Protocol (MCP)

By

Dor Sarig

and

March 24, 2025

Blog
New 'Rules File Backdoor' Attack Lets Hackers Inject Malicious Code via AI Code Editors

By

The Hacker News

and

March 18, 2025

News
How AI coding assistants could be compromised via rules file

By

SC Media

and

March 18, 2025

News
New Vulnerability in GitHub Copilot and Cursor: How Hackers Can Weaponize Code Agents

By

Ziv Karliner

and

March 18, 2025

Research
Beyond DevSecOps: Pillar’s Approach for Securing Agentic AI

By

Dor Sarig

and

March 10, 2025

Blog
Securing Multimodal AI

By

Dor Sarig

and

February 27, 2025

Blog
Pillar Selected for the AWS & CrowdStrike Cybersecurity Accelerator

By

Hadar Yakir

and

February 24, 2025

News
Pillar Partners with Tavily to Secure Web Access for AI Agents

By

Ziv Karliner

and

February 19, 2025

News
Rethinking AI Security: Beyond the DeepSeek R1 Vulnerability Metrics

By

Ziv Karliner

and

February 4, 2025

Blog
Agentic Use Cases and Challenges for 2025

By

and

February 3, 2025

Webinars
Red Teaming for AI Agents

By

Dor Sarig

and

January 30, 2025

Guides
Traditional AppSec vs. AI Security: Addressing Modern Risks

By

Dor Sarig

and

January 20, 2025

Blog
Security for AI Agents 101

By

Dor Sarig

and

December 10, 2024

Guides
AI Security Trends to Watch in 2025

By

Dor Sarig

and

December 4, 2024

Blog
Pillar Security is Now Available on the AWS Marketplace

By

Mark Phillips

and

December 2, 2024

News
Strengthening LLM Security: Insights from OWASP's 2025 Top 10 List

By

Hadar Yakir

and

November 27, 2024

Blog
Pillar Security is Now Available in the Microsoft Azure Marketplace

By

Mark Phillips

and

November 26, 2024

News
The Rise of Dark AI: Tools, Techniques, and AI-Driven Cyber Threats

By

Dor Sarig

and

November 12, 2024

Research
From Rules to Guardrails: Navigating the New Age of AI with Security at Heart

By

Dor Sarig

and

November 4, 2024

Blog
Understanding the Default Protection Layers of Generative AI Systems

By

Ziv Karliner

and

October 21, 2024

Blog
How GenAI Is Becoming A Prime Target For Cyberattacks

By

Forbes

and

October 10, 2024

News
LLM attacks take just 42 seconds on average, 20% of jailbreaks succeed

By

SC Media

and

October 9, 2024

News
90% of Successful Attacks Seen in the Wild Resulted in Leaked Sensitive Data

By

Dark Reading

and

October 9, 2024

News
The State of Attacks on GenAI: Industry-First Analysis of Real-World Interactions

By

Dor Sarig

and

October 9, 2024

Research
A Deep Dive into LLM Jailbreaking Techniques and Their Implications

By

Dor Sarig

and

October 1, 2024

Research
10 Best AI Newsletters you must Subscribe to

By

Ziv Karliner

and

Dor Sarig

September 18, 2024

Blog
The Cornerstone of Effective Security Platforms: Lessons from a Decade in the EDR space

By

Hadar Yakir

and

September 9, 2024

Blog
Practical AI Red Teaming: The Power of Multi-Turn Tests vs Single-Turn Evaluations

By

Dor Sarig

and

August 29, 2024

Research
Security for AI  Buyer’s Guide

By

Dor Sarig

and

August 22, 2024

Guides
GenAI tools in the workplace: 5 emerging threat scenarios

By

Ctech

and

August 21, 2024

News
Pillar and Portkey Join Forces to Enhance Security for AI Applications

By

Ziv Karliner

and

August 15, 2024

News
AI Red Teaming Regulations and Standards

By

Dor Sarig

and

August 1, 2024

Blog
From data breaches to legal liabilities: The hidden risks of AI chatbots

By

Ctech

and

July 22, 2024

News
Top 5 AI Jailbreaking Communities to Follow

By

Dor Sarig

and

July 18, 2024

Blog
Revolutionizing Cybersecurity: The Kill Chain in the Age of AI

By

Dor Sarig

and

July 1, 2024

Blog
Building Secure and Reliable AI Agents: A New Development Life Cycle

By

Dor Sarig

and

June 6, 2024

Blog
California's SB 1047: A Landmark Bill for Safe and Responsible AI Innovation

By

Dor Sarig

and

May 30, 2024

Blog
Safeguarding the Future: Lessons Learned from Securing over 1,000 GenAI Apps

By

Dor Sarig

and

May 6, 2024

Research
LLMs Are An Essential Kernel Process Of A New Operating System

By

Dor Sarig

and

April 30, 2024

Blog
Securing AI: A Blend Of Old And New Security Practices

By

Dor Sarig

and

April 23, 2024

Blog
The Impending Challenges For Generative AI: A Closer Look

By

Dor Sarig

and

April 9, 2024

Blog
Best Practices for Securely Deploying AI Systems: Insights from NSA's Latest Report

By

Dor Sarig

and

March 27, 2024

Blog
AI Red Teaming: Ensuring Safe and Secure AI Systems

By

Dor Sarig

and

March 20, 2024

Blog
How Will AI Change the Future of the Workforce and What are the Security Implications?

By

Dor Sarig

and

March 13, 2024

Blog
Large Language Models are not Inventions, They're Discoveries.

By

Dor Sarig

and

March 5, 2024

Blog
AI Agents in the Workforce: The Future of Team Collaboration and Efficiency

By

Dor Sarig

and

February 27, 2024

Blog
LLM Jailbreaking: The New Frontier of Privilege Escalation in AI Systems

By

Dor Sarig

and

February 21, 2024

Blog
Manipulating LLM Agents: A Case Study in Prompt Injection Attacks

By

Dor Sarig

and

February 13, 2024

Blog
OWASP Top 10 for LLMs visualized

By

Dor Sarig

and

February 1, 2024

Blog
AI Systems Must Be Secured By Design

By

Dor Sarig

and

January 30, 2024

Blog
Key Questions for Secure Deployment of Large Language Models

By

Dor Sarig

and

January 24, 2024

Blog
Embracing Security in AI: Unpacking the New ISO/IEC 5338 Standard

By

Dor Sarig

and

January 10, 2024

Blog
Understanding the Security Risks of AI Applications

By

Dor Sarig

and

January 4, 2024

Blog