AI Security Intelligence
The AI security landscape.
Decoded and covered.
New frameworks, regulations, and research papers appear every month. It's hard to keep up. This page tracks every major AI security standard and shows exactly what each one requires — and how SharkRouter's ecosystem covers it.
Updated continuously · 32 findings mapped · 10 sources
Standards & Frameworks
Industry-recognized security frameworks and taxonomies that define the AI threat landscape.
OWASP LLM Top 10
The Open Web Application Security Project's definitive list of the most critical security risks in LLM applications. Updated annually with input from 500+ security professionals.
Read in whitepaper →OWASP LLM01 — Prompt Injection
OWASP LLM02 — Insecure Output Handling
OWASP LLM03 — Training Data Poisoning
OWASP LLM05 — Supply Chain Vulnerabilities
OWASP LLM06 — Sensitive Information Disclosure
OWASP LLM06 (2025) — Excessive Agency
OWASP LLM07 — Inadequate AI Agent Oversight
OWASP LLM07 (2025) — System Prompt Leakage
OWASP LLM08 (2025) — Vector & Embedding Weaknesses
OWASP LLM09 — Overreliance
OWASP LLM10 (2025) — Unbounded Consumption
OWASP Top 10 for LLM Applications — Full Coverage
MITRE ATLAS
Adversarial Threat Landscape for AI Systems — MITRE's knowledge base of adversary tactics and techniques against machine learning systems, modeled after ATT&CK.
Read in whitepaper →MITRE ATLAS — Adversarial AI Techniques
MITRE ATLAS — AI Attack Techniques
MITRE ATLAS — ML Supply Chain Compromise
NIST AI Risk Management
The National Institute of Standards and Technology's AI Risk Management Framework and adversarial ML taxonomy — the U.S. government's baseline for trustworthy AI.
Read in whitepaper →NIST AI 100-2 — Adversarial ML Taxonomy
NIST AI 100-4 — Reducing Risks from Dual-Use Foundation Models
NIST AI 600-1 — AI RMF Generative AI Profile
NIST SP 800-53 Rev 5 — Security & Privacy Controls
ISO/IEC 42001
The international standard for AI Management Systems — providing requirements for establishing, implementing, and improving AI governance within organizations.
Read in whitepaper →ISO/IEC 42001 — AI Management System
Regulatory & Compliance
Government regulations, central bank directives, and international standards shaping AI governance requirements.
EU AI Act
The European Union's comprehensive regulation on artificial intelligence — the world's first major AI law, establishing risk-based requirements for AI systems operating in the EU.
Read in whitepaper →EU AI Act — High-Risk AI Systems (Articles 6-9)
GDPR Article 25 — Data Protection by Design
Bank of Israel AI Directive
Bank of Israel's directive on AI governance in financial institutions — requiring explainability, human oversight, and risk controls for AI-driven financial decisions.
Read in whitepaper →Bank of Israel Circular — AI in Banking
Research & Industry
Cutting-edge research papers, threat intelligence reports, and practitioner insights from leading AI security experts.
Google DeepMind Research
Frontier AI safety research from Google DeepMind — including agent security taxonomies, red-teaming methodologies, and adversarial robustness studies.
Read in whitepaper →Google "Securing the AI Software Supply Chain"
Google DeepMind "Defeating Agentic AI Traps" Paper
O'Reilly Media
Practitioner-focused analysis from O'Reilly's AI security experts — bridging academic research with real-world implementation challenges.
Read in whitepaper →O'Reilly "AI, A2A, and the Governance Gap"
O'Reilly "AI, A2A, and the Governance Gap"
Academic Research
Peer-reviewed papers from leading AI security researchers at top universities and research institutions.
Read in whitepaper →"Measuring Faithfulness in Chain-of-Thought Reasoning" (Lanham et al.)
"Universal and Transferable Adversarial Attacks on Aligned LLMs" (Zou et al.)
Industry Reports
Threat intelligence and best-practice reports from enterprise security teams, red teams, and AI security practitioners.
Read in whitepaper →CCPA/CPRA — AI Data Processing
PCI DSS v4.0 — AI Data Handling
SLSA Framework — Supply Chain Levels for Software Artifacts
Download the SharkRouter Whitepaper
Deep dive into SharkRouter's architecture, threat model, compliance posture, and the full framework coverage matrix behind this page.
- Seven-layer governance architecture with ToolGuard internals
- Full 32+ framework mapping with per-control coverage
- Threat model and trap-defense taxonomy
- Compliance posture across OWASP, NIST, EU AI Act, ISO/IEC 42001
Request-only. Each copy is individually watermarked and sent by our team after review — no instant download, no spam.
See the products behind the coverage.
Five products. One event stream. Complete governance from discovery to chaos testing.