AI Implemented without Governance Concerns

As this story pointed out at the Register: “Enterprises neglect AI security – and attackers have noticed” The findings come from Big Blue’s Cost of a Data Breach Report 2025 report, which shows that AI-related exposures currently make up only a small proportion of the total, but these are anticipated to grow in line with … Read more

Google Claims AI Agent Found Zero Day Vulnerability

Out of a Record.media story where Google “Big Sleep” AI tool found a vulnerability that was not yet uncovered. The white paper referenced by Google discusses how to use AI agents in a hybrid defense in depth approach: Building on well-established principles of secure software and systems design, and in alignment with Google’s Secure AI … Read more

Make Assessments and Prepare for the Unknown

In Cybersecurity we are programmed to prepare for the constant Internet attacks. But there are many aspects to these attacks, including what is considered a watering hole tactic. A watering hole tactic is where just like in the desert water is important , and in an oasis there is a watering hole. What does that … Read more