Category: Blogs
-
The Social Engineering Economy
It started the way most heists do, with a file that shouldn’t exist. Bob, the vendor account manager, exported a spreadsheet to send out Holiday greeting cards to his customer’s family. Bob always takes copious notes on his customers, their family, how many kids, their names, ages, and which college they got accepted to. It’s…
-

How To Make It in this Agentic World
For centuries, the question of achieving success was answered simply by effort and skill. Back in the day, you were told to do a good job, and in doing so, you would be rewarded. “Lace up your boots and get to work,” they preached. Expertise was fundamental to doing a good job, hence education, practice,…
-
A Quantum Tunnel Through Time: Quantum Computers and Post-Quantum Cryptography
The Nobel Prize and the Quantum Era On Tuesday, the Nobel Prize in Physics was awarded to John Clarke, Michel H. Devoret, and John M. Martinis. Their experiments with superconducting circuits and Josephson junctions demonstrated that quantum mechanics can govern the behavior of an entire electronic circuit—not just individual particles. They showed that these macroscopic…
-
Secure Your AI Pipeline: Introducing Protegrity Developer Edition
Introducing Protegrity Developer Edition Developers are under pressure to build and test new workflows quickly, often with sensitive data. As soon as real customer or financial information is introduced, projects slow down because of compliance, risk, and governance concerns. Identifiers like account numbers, claims records, or health data can’t safely flow through pipelines or models…
-
The Asana of Success
Yoga aims to unite the body, mind, and soul together to form an integrated whole. All is one. As I reflect on my 25-year yoga journey, I realize there are certain go-to poses in my Vinyasa database, if you will. This makes me wonder what it is in my personality that attracts me to the…
-
Securing Data Integrity in the Age of AI
I’ve spent my career in security, and I’ve never seen a moment like this. Every organization wants to use AI and machine learning to get better insights, modernize operations, and improve services. But the challenge is clear: how do you migrate sensitive data to the cloud, share it broadly, and still keep it secure and…
-
Why Data Security in AI Isn’t an Add-On — It’s Built Into Every Component of Your Pipeline
Why Data Security in AI Isn’t an Add‑On — It’s Built Into Every Component of Your Pipeline When most organizations think about securing AI, they still picture a staged process borrowed from traditional software: design the system, build it, test it, deploy it — and then, at the very end, tack on a “security review.”…
-

Can Your Current Architecture Handle Secure, High-Speed Analytics on Databricks?
As enterprises increasingly use Databricks for analytics and AI, protecting sensitive data on the platform is paramount. Protegrity’s data protection integration with Databricks ensures that even sensitive data (like PII) can be analyzed in the cloud safely and in compliance with regulations. Two recent advancements make this integration especially powerful: By combining Unity Catalog’s unified…
-
Darwinian Data, Evolutionary AI, and How to Survive
Charles Darwin famously said in 1859, “It is not the strongest of the species that survives, nor the most intelligent… It is the one that is the most adaptable to change.” But Darwin’s perspective is no longer just about animal species; it’s also about current models and data. 165 years after Darwin published his theory…
-

Cloud Migrations Don’t Need to Wait On Security
Cloud transformation in financial services is no longer a matter of if—but how fast. Yet, too often, security is treated as a blocker to progress. In our recent webinar with AWS, we explored what it really takes for financial services to migrate to the cloud with confidence. The answer wasn’t a surprise, but it was…