Cybersecurity for AI

Cybersecurity for AI: How to protect AI systems you use or own

An employee asks if they can deploy their own AI agent to process internal documents. They’ve found one that runs effortlessly via a cloud service and “just needs access to the shared folder.” Sounds convenient, but what if that agent starts leaking sensitive data to third parties? What if the source code or the model … Read more

How Zero Trust is Reshaping Cyber Insurance

On May 23rd, 2025, stakeholders from various large insurers met in New York City to dicsuss how cyber insurance is evolving, and how Zero Trust is increasingly at the center of the major cyber insurance shift.

CISO responsibilities: Too much to handle?

Once a primarily technical position, the role of Chief Information Security Officer (CISO) now comes with a range of new responsibilities. Executives increasingly rely on CISOs; but this can be risky.

Hack the Boat

Though the recent Baltimore bridge collision wasn’t a cyber-attack, it did showcase a serious vulnerability in ship systems. A vulnerablity that could’ve easily been exploited by hackers, highlighting a truth that can no longer be denied – ships are easy targets for cybercriminals.

Cyber warfare

In these cyber warfare episodes of Threat Talks, we explore whether or not we stand a chance in this continuous arms race in cyber technologies, what Advanced Persistent Threats (APTs) are, and how these modern threats can affect literally everyone.