top of page
Tags:


Malware‑as‑a‑Service: Why “Faster Than You” Is the New Cybersecurity Game
It's too easy to be the Bear. You don’t have to outrun the bear... just the other campers. 🐻 With the rise of Malware‑as‑a‑Service,...
Mark Gilmor
Jul 14, 20252 min read


AI on the Frontlines - How Cyber Warfare is Evolving Before Our Eyes
Last week, Axios reported a 700% surge in Iranian cyberattacks targeting Israeli infrastructure and institutions since mid-June. These...
Mark Gilmor
Jun 23, 20252 min read


What’s the Deal with the AI Regulation Ban?
There’s a new proposal in Congress that would stop states from making their own rules about artificial intelligence (AI) for the next 10...
Mark Gilmor
May 21, 20252 min read


Breaking Free from the Algorithm: The Rise of Non-Algorithmic Media
If you’ve felt like social media isn’t what it used to be, you’re not imagining things. Over the last decade, algorithms have taken over,...
Mark Gilmor
Feb 19, 20252 min read


The Algorithmic Shift in Social Media: Its Impact on Politics and Security
If You Have Noticed a Change in Social Media, You Aren’t Alone. Over the past decade, social media has transformed from an open digital...
Mark Gilmor
Feb 14, 20253 min read


The U.S. Anti-Bribery Policy Shift: A Double-Edged Sword
The recent move by the U.S. government to scale back enforcement of the Foreign Corrupt Practices Act (FCPA) has ignited a heated debate...
Mark Gilmor
Feb 11, 20252 min read


Navigating the Shifts in AI Regulation - Implications of the New Executive Order
This week, a significant pivot in U.S. artificial intelligence policy emerged as President Donald Trump signed an executive order on...
Mark Gilmor
Jan 24, 20252 min read


Software Supply Chain Security in the Age of AI: Leveraging AI Technologies
Background With the rise of AI technologies and their increasing use by threat actors, today's IT security organizations face a growing variety and volume of sophisticated cyberattacks. The first post in this series introduced Cyberify ’s method of classifying AI security discussions: Security From AI, Security With AI, or Security Of AI. This post then highlighted a critical attack surface security professionals must defend from AI-enhanced threats: software supply chains,
Dan Griffith
Jan 7, 20255 min read


Don’t forget the rest of AI
How the hype for GenAI has blurred our understanding of “AI” These days the AI label is everywhere, whether you are reading a technical...

Jonathan Baier
Dec 11, 20244 min read


Uncovering Insider Threats: The ByteDance AI Incident Case Study
On October 22, 2024, ByteDance became the center of attention due to a concerning incident involving an intern who improperly accessed...
Mark Gilmor
Oct 23, 20244 min read


Software Supply Chain Security in the Age of AI: Advanced Mitigations
Soccer teams preparing for ultra-competitive leagues or tournaments will build on their basic skills through training for scenarios such as offside traps, corner kicks, and free kicks, to prepare them for specific attacks. As organizations and their security teams enter the AI era, they also face daunting challenges. The first post in this series examined how threat actors will likely mount an increasing frequency and volume of attacks on software supply chains , and how at l
Dan Griffith
Oct 21, 20248 min read


Software Supply Chain Security in the Age of AI: Defensive Fundamentals
Background With the rise of AI technologies and their increasing use by threat actors, today's IT security organizations face an...
Dan Griffith
Oct 16, 20244 min read


Homomorphic Encryption: A Deep Dive into Secure Computation
In today's digital age, data security is more critical than ever. With the increasing amount of sensitive information being stored and...
raviravoory
Oct 3, 20244 min read


Homomorphic Encryption: Strong Enough for Classical, But What About the Quantum Madness?
Homomorphic encryption, in its current forms, is not inherently quantum-resistant. The primary reason is that most homomorphic encryption...
raviravoory
Oct 1, 20242 min read


Software Supply Chain Security in the Age of AI: Evolving Attacks
Attack surfaces and risks inherent to software supply chains have grown as AI technologies have proliferated.
Dan Griffith
Sep 10, 20245 min read


Securing Data in Use
Homomorphic Encryption and Confidential Computing are two next-gen technologies, each crafted with the purpose of elevating the sanctity...
raviravoory
Sep 3, 20243 min read


Quantum Computing and Cybersecurity Risks: Understanding the Threats and Mitigation Strategies
As technology advances, so too do the capabilities of quantum computing, posing significant challenges to the cybersecurity landscape....
raviravoory
Aug 23, 20243 min read


How Can Businesses Achieve Cryptographic Agility in a Changing Security Landscape?
Cryptographic agility, or crypto-agility , refers to the ability of a system to rapidly and effectively adapt encryption methods. This...
raviravoory
Aug 23, 20242 min read


The Crowdstrike Glitch: A Lesson in Cyber Resiliency and the Importance of the Small Things
To each person managing the downstream effects of this outage, we remember those days when it was us and are deeply grateful for your...
Mark Gilmor
Jul 23, 20243 min read


AI Ethics & The Unexpected Golden Rule
An exploration of AI Ethics, Bias, and Governance By Mark Gilmor & Jonathan Baier We are in an age of firsts. I never in all my...
Mark Gilmor
Jun 18, 20243 min read
bottom of page