Featured Posts
Key Takeaways from IBM’s 2025 Cost of a Data Breach Report
4 days ago
Uncategorized
For 20 years, IBM’s Cost of a Data Breach Report has been one of the industry’s most trusted sources on the financial and operational impact of security incidents. Each edition provides a rare combination of breadth, spanning hundreds of breaches across industries and geographies, and depth, translating complex technical realities
More Reading
Cross-Server Tool Shadowing: Hijacking Calls Between Servers
Context MCP allows an AI agent to connect to multiple tool servers simultaneously. This flexibility can be dangerous: if one of those […]
Rug Pulls (Silent Redefinition): When Tools Turn Malicious Over Time
Context Imagine that the AI assistant’s tool was actually safe at first – perhaps you used it for days without issue. Then, […]
Secrets in the Wind: Environment Variables, URLs, and the Leaky Abstractions
Context In the evolving landscape of MCP servers and AI agents, a new category of risk is emerging: sensitive data exposure through […]
Tool Poisoning: Hidden Instructions in MCP Tool Descriptions
Imagine installing a seemingly benign math tool on your AI assistant that simply adds two numbers. Unbeknownst to you, the tool’s description […]
Gen AI Runtime Protection with Gen AI gateways
The rise of generative AI has introduced new threats while driving demand for solutions that manage AI services and help development teams […]
Acuvity Launches RYNO: The Industry’s First Context-Aware Gen AI Security Platform to Protect the AI-Driven Enterprise
SUNNYVALE, Calif., June 26, 2025 /PRNewswire/ — Acuvity, a leading runtime generative AI security platform company, today announced the launch of RYNO, the first Gen AI security […]
Deploy a simple chatbot application using Secure MCP Servers
Context You’ve built an agentic application that leverages MCP servers to give your agent advanced capabilities… and now it’s time to ship […]
MCP Server: The Dangers of “Plug-and-Play” Code
With great power comes great(er) responsibility Since its launch in November 2024, MCP (Model Context Protocol) has been adopted across industries, for […]
AI Security Series 5 – Model Training
As enterprises increasingly adopt Large Language Models (LLMs), some choose to pre-train or fine tune models. This blog describes problems that one […]
AI Security Series 4 – Model Usage
At the heart of any AI application or agentic system are LLMs. Your developers and vendors are using multiple LLMs to achieve […]
AI Security Series 3 – Datastores
Modern AI applications—especially those involving conversational agents, retrieval-augmented generation (RAG), and enterprise copilots—depend heavily on a variety of datastores to supply, retrieve, […]
AI Security Series 2 – Gen AI Application Security Pillars
As enterprises rapidly integrate AI systems into core workflows, the need to adopt a security-first mindset becomes imperative. These systems, especially those […]
AI Security Series 1 – Applications and Agents
Introduction The rapid advancement of AI technologies—particularly large language models (LLMs) and agentic systems—has transformed the way modern applications are built and […]
AI Security Series: What It Really Takes to Secure Gen AI
This is Acuvity’s AI Security Series which offers a comprehensive exploration of securing AI systems, particularly focusing on Large Language Models (LLMs) and […]
How Acuvity Manages Gen AI Risk
Gen AI adoption in enterprises has surged due to productivity and efficiency gains, reduced costs, improved decision making, enhanced customer experience and […]
Acuvity Secures Two Global InfoSec Awards for Generative AI Security at RSAC 2025
Multi-category win highlights Acuvity’s comprehensive approach to securing the Gen AI era Sunnyvale, California – April 28, 2025 – Acuvity, the comprehensive AI […]
Becoming an AI Operator of Excellence
The launch of ChatGPT catapulted AI from an unknown science project to ubiquitous and indispensable in just a matter of a year. […]
Why Your AI Security Needs a Content-First Approach
In the age of AI, it’s hard to predict the nuanced ways people will interact with technology, and even harder to control […]
Seeing the Unseen: How Acuvity’s Visualization Transforms AI Security
“If you cannot measure it, you cannot manage it.” – Peter Drucker If an AI security threat isn’t visible, does that mean it’s […]
Building Acuvity: A Better Path Forward With AI
At Acuvity, we believe that AI is here to stay. Its immediate benefits are undeniable, and the excitement it generates can easily […]
Tackling Enterprise’s Latest Threat: Shadow AI
In the fast-paced world of modern business, the allure of AI is undeniable. Organizations across industries are racing to harness the power […]
Acuvity Runtime Security with OpenAI SDK
OpenAI released new features on March 11th designed to help developers and enterprises build AI agents, automated systems that can independently accomplish tasks, using […]
Agentic Application Security for Enterprises
Gen AI adoption has doubled to 65% from 2023 to 2024 and 75% of generative AI users are looking to automate tasks […]
Securing Anthropic MCP with Acuvity
Anthropic made a simple announcement of Model Context Protocol (MCP) in November 2024 via a brief three-minute-read blog. Arguably, since the launch of […]
The Third Wave of Security: Why Gen AI Demands a Ground-Up Rethink
Over the past two decades, enterprise technology has evolved in waves—each one pushing boundaries, transforming operations, and inevitably reshaping the security landscape. […]