ATO attacks surged 250%—see what’s fueling the rise & how to stop them → Register now

AI Data Poisoning: How Misleading Data Is Evading Cybersecurity Protections

Discover why AI data poisoning is an emerging threat and how fake data is used to evade AI cybersecurity protections.

By |2024-08-28T16:25:33+00:00April 25, 2024|Blogs, Featured Blog Post|Comments Off on AI Data Poisoning: How Misleading Data Is Evading Cybersecurity Protections

Building Strong Defences: The Intricacies of Effective Bot Mitigation – Part 1

Learn how you can assess a bot mitigation provider's ability to detect and stop bots in our new technical blog series.

By |2024-03-28T21:05:22+00:00March 28, 2024|Blogs|Comments Off on Building Strong Defences: The Intricacies of Effective Bot Mitigation – Part 1

Meet the Female Engineers Behind Kasada’s Mobile Bot Defense

Liz Mills and Mira Kim are two trailblazing women at Kasada shaping cybersecurity. Discover their journey into tech, impactful projects, and sage advice for aspiring engineers.

By |2024-03-08T16:08:39+00:00March 8, 2024|Blogs|Comments Off on Meet the Female Engineers Behind Kasada’s Mobile Bot Defense