Impart and Chill Blog

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Smarter, Clearer Rules: Now with Condition Groups, Reordering, Multi-line Descriptions & Numeric Operators

We’ve made it easier to build and manage rules with new features designed for clarity and control. You can now group conditions for more powerful logic, reorder them with ease, add multi-line descriptions for better documentation, and use numeric operators in CTX-based rules to support advanced comparisons.
Nick Soegono
June 25, 2025
Read article

Understanding EchoLeak: What This Vulnerability Teaches Us About Application Security

The recent disclosure of EchoLeak by Aim Labs marks a significant milestone in AI security research. As the first documented zero-click exploit targeting a production AI system, it offers valuable insights into the emerging threat landscape that security professionals need to understand and prepare for.
Brian Joe
June 19, 2025
Read article

Why We're Going All In on Application Protection

Brian Joe
June 9, 2025
Read article

Announcing our Series A

Today, we're announcing our $12 million Series A led by Madrona. This funding represents more than capital—it validates our solution to what I call the 'last mile problem' in application security.
Jonathan DiVincenzo
June 5, 2025
Read article

Introducing the runtime rule library

Instead of spending time writing and testing custom logic, detection and response teams can now tap into a curated set of rules tailored for modern cloud applications. These aren't your standard WAF rules — they're full-featured, deeply customizable, and built to align with your business logic. Even better, the rule library has rules of different types - including rule recipes (rule builder based) or rule scripts (code based)!
Brian Joe
May 27, 2025
Read article

Custom Client Identifiers: Smarter Client Tracking for Security Teams

Relying on IP addresses alone isn't enough to reliably track or distinguish clients—especially in modern, complex environments. That’s why we’ve introduced Custom Client Identifiers, giving your team the flexibility to define what a “client” really means based on your specific use case.Whether it’s IP + User-Agent, IP + API Key, or Token + Product Identifier, you can now tailor client identification to suit your architecture and security goals.
Brian Joe
May 20, 2025
Read article

Introducing Rule Builder: Powerful Protection Without Coding

Brian Joe
May 13, 2025
Read article

New Integration: Impart + Claude

Brian Joe
May 6, 2025
Read article

🚀 Agentic Runtime Protection Rules Makes Us the First Truly Self-Writing Security System

Jonathan DiVincenzo
April 29, 2025
Read article

Design, implement, and deploy application protection policies with Cursor Agent

Brian Joe
April 4, 2025
Read article

Introducing Agentic Risk Scoring

We're inviting forward-thinking security teams to experience an agentic approach to risk assessment. If you're ready to transform how you manage security risks, we want you in our beta program.
Brian Joe
March 25, 2025
Read article

Launching Enterprise-Grade Protection for Linkerd Applications

Today, we are excited to announce Enterprise-Grade Protection for Linkerd, the first security solution that seamlessly integrates with Linkerd to deliver next-gen WAF, API security, and LLM protection—all with a single integration.
Brian Joe
March 3, 2025
Read article