Book a Demo
Oximy Blog
Oximy Blog



Setting a Standard for AI Security: Inside Oximy Gateway’s Benchmark Results
How enterprises can detect and block prompt-level exploits before they spread.
Nov 8, 2025
|
Announcements



Announcing the Oximy Private Beta
How enterprises can detect and block prompt-level exploits before they spread.
Nov 4, 2025
|
Announcements



Poison in the Well: Securing Data, Embeddings & Context Flows in Enterprise AI
How enterprises can detect and block prompt-level exploits before they spread.
Oct 28, 2025
|
Whitepaper



Seeing What You Can’t See: Visibility Gaps and Shadow AI in the Enterprise
How enterprises can detect and block prompt-level exploits before they spread.
Oct 15, 2025
|
Whitepaper



When the Model Lies: Incident Response and Forensics for AI Systems
How enterprises can detect and block prompt-level exploits before they spread.
Oct 4, 2025
|
Whitepaper



Autonomous Adversaries: Red-Teaming AI with Agents and Exploit Chains
How enterprises can detect and block prompt-level exploits before they spread.
Sep 28, 2025
|
Whitepaper



The Human Is the New Attack Vector: Shadow AI, Insider Risk, and Behavioral Defenses
How enterprises can detect and block prompt-level exploits before they spread.
Aug 8, 2025
|
Whitepaper

Setting a Standard for AI Security: Inside Oximy Gateway’s Benchmark Results
How enterprises can detect and block prompt-level exploits before they spread.
Nov 8, 2025
|
Announcements

The Human Is the New Attack Vector: Shadow AI, Insider Risk, and Behavioral Defenses
How enterprises can detect and block prompt-level exploits before they spread.
Aug 8, 2025
|
Whitepaper

Autonomous Adversaries: Red-Teaming AI with Agents and Exploit Chains
How enterprises can detect and block prompt-level exploits before they spread.
Sep 28, 2025
|
Whitepaper

When the Model Lies: Incident Response and Forensics for AI Systems
How enterprises can detect and block prompt-level exploits before they spread.
Oct 4, 2025
|
Whitepaper

Poison in the Well: Securing Data, Embeddings & Context Flows in Enterprise AI
How enterprises can detect and block prompt-level exploits before they spread.
Oct 28, 2025
|
Whitepaper

Seeing What You Can’t See: Visibility Gaps and Shadow AI in the Enterprise
How enterprises can detect and block prompt-level exploits before they spread.
Oct 15, 2025
|
Whitepaper

Announcing the Oximy Private Beta
How enterprises can detect and block prompt-level exploits before they spread.
Nov 4, 2025
|
Announcements


Nov 4, 2025
Announcements
Setting a Standard for AI Security: Inside Oximy Gateway’s Benchmark Results
Nov 4, 2025
Announcements
|


Nov 4, 2025
Whitepaper
The Human Is the New Attack Vector: Shadow AI, Insider Risk, and Behavioral Defenses
Nov 4, 2025
Whitepaper
|


Nov 4, 2025
Whitepaper
Autonomous Adversaries: Red-Teaming AI with Agents and Exploit Chains
Nov 4, 2025
Whitepaper
|


Nov 4, 2025
Whitepaper
When the Model Lies: Incident Response and Forensics for AI Systems
Nov 4, 2025
Whitepaper
|


Nov 4, 2025
Whitepaper
Poison in the Well: Securing Data, Embeddings & Context Flows in Enterprise AI
Nov 4, 2025
Whitepaper
|


Nov 4, 2025
Whitepaper
Seeing What You Can’t See: Visibility Gaps and Shadow AI in the Enterprise
Nov 4, 2025
Whitepaper
|


Nov 4, 2025
Announcements
Announcing the Oximy Private Beta
Protecting the models, the data, and the people who use them.
Nov 4, 2025
Announcements
|

Nov 4, 2025
Announcements
Setting a Standard for AI Security: Inside Oximy Gateway’s Benchmark Results
Nov 4, 2025
Announcements
|

Nov 4, 2025
Announcements
Announcing the Oximy Private Beta
Protecting the models, the data, and the people who use them.
Nov 4, 2025
Announcements
|

Nov 4, 2025
Whitepaper
Poison in the Well: Securing Data, Embeddings & Context Flows in Enterprise AI
Nov 4, 2025
Whitepaper
|

Nov 4, 2025
Whitepaper
Seeing What You Can’t See: Visibility Gaps and Shadow AI in the Enterprise
Nov 4, 2025
Whitepaper
|

Nov 4, 2025
Whitepaper
When the Model Lies: Incident Response and Forensics for AI Systems
Nov 4, 2025
Whitepaper
|

Nov 4, 2025
Whitepaper
Autonomous Adversaries: Red-Teaming AI with Agents and Exploit Chains
Nov 4, 2025
Whitepaper
|

Nov 4, 2025
Whitepaper
The Human Is the New Attack Vector: Shadow AI, Insider Risk, and Behavioral Defenses
Nov 4, 2025
Whitepaper
|
© 2025 Oximy Inc. All Rights Reserved.
© 2025 Oximy Inc. All Rights Reserved.
© 2025 Oximy Inc. All Rights Reserved.
© 2025 Oximy Inc. All Rights Reserved.
© 2025 Oximy Inc. All Rights Reserved.