<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>AI SECURITY - Aqua</title>
	<atom:link href="https://www.aquasec.com/category/ai-security/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Cloud Native Security, Container Security &#38; Serverless Security</description>
	<lastBuildDate>Wed, 22 Apr 2026 14:50:29 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Autonomous Runtime Security: Turning Runtime Intelligence into Agentic Response</title>
		<link>https://www.aquasec.com/blog/autonomous-runtime-security-turning-runtime-intelligence-into-agentic-response/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Wed, 22 Apr 2026 05:30:26 +0000</pubDate>
				<category><![CDATA[AI SECURITY]]></category>
		<category><![CDATA[AI Security]]></category>
		<category><![CDATA[Cloud Workload Protection Platform CWPP]]></category>
		<category><![CDATA[Container Security]]></category>
		<category><![CDATA[Runtime Security]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=27398</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/autonomous-runtime-security-turning-runtime-intelligence-into-agentic-response/" title="Autonomous Runtime Security: Turning Runtime Intelligence into Agentic Response" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2026/03/Social-Reporting-and-Dashboards-Blog.jpg" alt="Autonomous Runtime Security: Turning Runtime Intelligence into Agentic Response" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Security teams have spent years and billions of dollars shifting security left. This has changed what teams can see and introduced a new level of visibility, but it has not helped with what they can control. Last year, more than 48,000 new vulnerabilities were cataloged, growing at roughly 20 percent annually. Add to that the&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Unveiling the Mythos Behind Runtime Security</title>
		<link>https://www.aquasec.com/blog/unveiling-the-mythos-behind-runtime-security/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Mon, 13 Apr 2026 13:10:04 +0000</pubDate>
				<category><![CDATA[AI SECURITY]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=27472</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/unveiling-the-mythos-behind-runtime-security/" title="Unveiling the Mythos Behind Runtime Security" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2026/04/Social-Unveiling-the-mythos-blog-1200x628-1.jpg" alt="Unveiling the Mythos Behind Runtime Security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>TLDR: We are about to have a serious problem: attackers no longer need months to investigate and exploit systems, they need minutes. Anthropic says its unreleased Claude Mythos Preview can autonomously find severe vulnerabilities, reproduce them and in some cases chain them into working exploits across hardened systems. The model was deemed too dangerous to&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Aqua at KubeCon 2025: Securing Cloud Native and AI Apps</title>
		<link>https://www.aquasec.com/blog/aqua-kubecon25-securing-cloud-native-and-ai-apps/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Tue, 04 Nov 2025 13:25:17 +0000</pubDate>
				<category><![CDATA[AI SECURITY]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=26975</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/aqua-kubecon25-securing-cloud-native-and-ai-apps/" title="Aqua at KubeCon 2025: Securing Cloud Native and AI Apps" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/11/Social-Aqua-at-kubecon-blog-image-1200x628-1.jpg" alt="Aqua at KubeCon 2025: Securing Cloud Native and AI Apps" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Every KubeCon tells a story about where the cloud native world is headed. In 2025, that story is about the evolution of AI from a bad movie script to a core part of enterprise solutions. Cloud native applications and artificial intelligence are now part of the same conversation, with security emerging as the vital connection&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Aqua Secure AI Wins AI Cybersecurity Solution of the Year</title>
		<link>https://www.aquasec.com/blog/aqua-secure-ai-wins-cybersecurity-solution-2025/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Thu, 09 Oct 2025 13:55:48 +0000</pubDate>
				<category><![CDATA[AI SECURITY]]></category>
		<category><![CDATA[AI Security]]></category>
		<category><![CDATA[Aqua Security]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=26777</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/aqua-secure-ai-wins-cybersecurity-solution-2025/" title="Aqua Secure AI Wins AI Cybersecurity Solution of the Year" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/10/Social-breakthrough-award-blog-2.jpg" alt="Aqua Secure AI Wins AI Cybersecurity Solution of the Year" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>AI applications are at tremendous risk. The complex chain of different components that AI applications depend on to truly push the boundaries of innovation is also what dramatically increases their attack surface, leaving them vulnerable to attackers. We introduced Aqua Secure AI to protect AI applications where they live: in containers. And now we’re proud&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Secure AI Infrastructure On-Premises from Day One</title>
		<link>https://www.aquasec.com/blog/every-ai-infrastructure-needs-security-from-day-one/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Tue, 30 Sep 2025 11:55:08 +0000</pubDate>
				<category><![CDATA[AI SECURITY]]></category>
		<category><![CDATA[AI Security]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=26693</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/every-ai-infrastructure-needs-security-from-day-one/" title="Secure AI Infrastructure On-Premises from Day One" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/09/social-secure-ai-infrastructure-blog-image.jpg" alt="Secure AI Infrastructure On-Premises from Day One" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Your company rolls out a new claims system powered by AI. It is fast, efficient, and customers love the experience. Then one day, a single malicious input slips through. The model is tricked into revealing sensitive records, or a workload spins out of control and consumes expensive GPU cycles. What began as a breakthrough quickly&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Navigating the OWASP LLM and GenAI Security Landscape</title>
		<link>https://www.aquasec.com/blog/owasp-llm-genai-security-landscape/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Tue, 23 Sep 2025 11:55:13 +0000</pubDate>
				<category><![CDATA[AI SECURITY]]></category>
		<category><![CDATA[AI Security]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=26665</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/owasp-llm-genai-security-landscape/" title="Navigating the OWASP LLM and GenAI Security Landscape" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/09/Social-Navigating-owasp-gen-ai-landscape-blog-image.jpg" alt="Navigating the OWASP LLM and GenAI Security Landscape" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>The rush to adopt generative AI has created an explosion of new security tools targeting different aspects of an increasingly complex landscape. Every week, a solution promises to stop prompt injection, prevent data leakage, or harden models against attack. For security leaders, it can feel overwhelming. Which solutions matter, how do they fit together, and&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Why AI-SPM Alone is Not Enough to Secure AI Workloads</title>
		<link>https://www.aquasec.com/blog/ai-spm-is-not-enough-to-secure-ai-workloads/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Tue, 16 Sep 2025 11:55:03 +0000</pubDate>
				<category><![CDATA[AI SECURITY]]></category>
		<category><![CDATA[AI Security]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=26645</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/ai-spm-is-not-enough-to-secure-ai-workloads/" title="Why AI-SPM Alone is Not Enough to Secure AI Workloads" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/09/social-why-ai-spm-is-not-enough-blog.jpg" alt="Why AI-SPM Alone is Not Enough to Secure AI Workloads" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>From writing code to serving customers, companies worldwide are capitalizing on AI to enhance their applications and business processes. But this boom is poised to turn into a bust if security can’t keep pace with AI adoption. And make no mistake: LLMs and AI services, whether they are consumed by the application or hosted and&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>MCP to Agentic AI: Shaping AI Security for What’s Next</title>
		<link>https://www.aquasec.com/blog/mcp-security-to-agentic-ai-adapt-your-ai-security-strategy/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Tue, 09 Sep 2025 11:57:59 +0000</pubDate>
				<category><![CDATA[AI SECURITY]]></category>
		<category><![CDATA[AI Security]]></category>
		<category><![CDATA[CNAPP]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=26500</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/mcp-security-to-agentic-ai-adapt-your-ai-security-strategy/" title="MCP to Agentic AI: Shaping AI Security for What’s Next" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/09/Social-MCP-Servers-blog-1200x628-2.jpg" alt="MCP to Agentic AI: Shaping AI Security for What’s Next" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Enterprises are rapidly adopting large language model applications, AI assistants, and model orchestration platforms at a pace that rivals the early days of cloud computing. With this acceleration comes both significant opportunity and risk. Yet AI security is lagging behind, struggling to match the speed and scale of adoption. One of the hottest topics right&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>AI Container Security Begins Inside the Workload</title>
		<link>https://www.aquasec.com/blog/ai-container-security-begins-inside-the-workload/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Tue, 19 Aug 2025 11:55:52 +0000</pubDate>
				<category><![CDATA[AI SECURITY]]></category>
		<category><![CDATA[AI Security]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=26349</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/ai-container-security-begins-inside-the-workload/" title="AI Container Security Begins Inside the Workload" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/08/Social-where-ai-security-happens-container-blog-image.jpg" alt="AI Container Security Begins Inside the Workload" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>AI security is often discussed at the edge, through firewalls, proxies, SDKs, or prompt filtering. These approaches serve a purpose, but they overlook where many of the most serious risks actually take place, inside the container. In our recent webinar, Aqua’s threat research team, Nautilus, shared firsthand insights from running hundreds of honeypots designed to&#160;&mldr;]]></description>
		
		
		
			</item>
		<item>
		<title>Operationalizing AI Security: Protecting Workloads Where AI Runs</title>
		<link>https://www.aquasec.com/blog/operationalizing-ai-security-protecting-ai-workloads/</link>
		
		<dc:creator><![CDATA[Aqua Security]]></dc:creator>
		<pubDate>Tue, 22 Jul 2025 11:30:27 +0000</pubDate>
				<category><![CDATA[AI SECURITY]]></category>
		<category><![CDATA[AI Security]]></category>
		<guid isPermaLink="false">https://www.aquasec.com/?p=26039</guid>

					<description><![CDATA[<div class="hs-featured-image-wrapper"><a href="https://www.aquasec.com/blog/operationalizing-ai-security-protecting-ai-workloads/" title="Operationalizing AI Security: Protecting Workloads Where AI Runs" class="hs-featured-image-link"><img src="https://www.aquasec.com/wp-content/uploads/2025/07/Social-Secure-AI-BLOG-2-image-1200x628-1.jpg" alt="Operationalizing AI Security: Protecting Workloads Where AI Runs" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"></a></div>Security teams are facing urgent questions as AI moves from experimentation to production. What models are running in our environment? Where are they deployed? Are they operating within policy and if not, can we stop them? Existing tools offer limited answers and they rarely provide governance without slowing developers down. To move forward, security leaders&#160;&mldr;]]></description>
		
		
		
			</item>
	</channel>
</rss>
