Resources

Insights for modern software security.
Research Paper

The 15 Principles of Secure Agentic Systems

The 15 Principles of Secure Agentic Systems

Most organizations adopting agentic workflows today are building faster than their governance infrastructure can keep up. The tooling for agent identity, supply chain verification, runtime isolation, and structured observability is still maturing. Connecting the right controls into a coherent governance layer, and operating that layer without adding unsustainable overhead for developers is the unsolved operational problem most enterprises face.

Research Paper

Shadow MCP: How to Find Rogue MCP Servers Before They Find You

Shadow MCP: How to Find Rogue MCP Servers Before They Find You

Shadow MCP is not a future risk. Developers are running ungoverned MCP servers in your environment today. Security researchers have documented supply chain attacks, remote code execution vulnerabilities, and credential theft targeting the exact servers your developers are most likely to adopt.

Research Paper

How to Run AI Agents on Kubernetes

How to Run AI Agents on Kubernetes

Learn how platform engineers can deploy, isolate, and govern AI agents and MCP servers on Kubernetes. Build on your existing infrastructure with an MCP registry, runtime and gateway, and integrate that with your existing IdP and observability stack for centralized visibility and control.

Research Paper

The MCP Platform Buyers Guide for AI Enablement Teams

The MCP Platform Buyers Guide for AI Enablement Teams

Your organization is deploying MCP to production for the first time. This is new territory. So what do you need from an MCP platform to meet your security requirements and business objectives? This Buyers Guide is based on the exacting requirements of more than 40 Platform Engineering teams.

Research Paper

The MCP Platform Buyers Guide for Platform Teams

The MCP Platform Buyers Guide for Platform Teams

Your organization is deploying MCP to production for the first time. This is new territory. So what do you need from an MCP platform to meet your security requirements and business objectives? This Buyers Guide is based on the exacting requirements of more than 40 Platform Engineering teams.

Research Paper

Model Context Protocol Maturity Model

Model Context Protocol Maturity Model

The MCP market is moving so fast, it can be hard to know where you stand. Are you ahead of the curve, or behind? We put together a simple, four-stage MCP Maturity Model so you know where you are, and how to take the next step.