Category: Blogs

  • The Hidden Market for Your Personal Data

    The Hidden Market for Your Personal Data

    A police detective in Moscow needed to find someone, but official channels required paperwork. It needed stamped, logged, audited and he would need to fill out the right forms which might be lost in the bureaucracy for weeks. Who has time for that? Instead of that headache, the detective opened his phone. He found the…

  • WaaS: Weirdness as a Service

    WaaS: Weirdness as a Service

    In 1999, Salesforce, give or take, invented SaaS (Software as a Service). In 2006, Amazon launched IaaS (Infrastructure as a Service). In 2017, Amazon, Microsoft, and Google provided API-based tools for vision, speech, and translation, thereby launching AIaaS (Artificial Intelligence as a Service). So today, I am announcing WaaS (Weirdness as a Service). But before…

  • Closing the AI Trust Gap: Why Data-Centric Security Matters

    Closing the AI Trust Gap: Why Data-Centric Security Matters

    Can you trust AI? It’s a question a lot of people are asking. And many say “No.” But why? Aren’t most enterprises testing AI models, while tens of billions of dollars are being spent on supporting infrastructure? Seems like a disconnect: IT teams are pressured to move AI projects from trial to production, while senior…

  • Protegrity Browser Protector: Enterprise Data Protection via Chrome Extension (MV3) with Microsoft Entra ID SSO

    Protegrity Browser Protector: Enterprise Data Protection via Chrome Extension (MV3) with Microsoft Entra ID SSO

    Chrome Extension Architecture (MV3) Protegrity Browser Protector is a Chrome extension that enables protect and unprotect operations directly within web applications. The extension communicates with Azure AD for authentication and authorization operations, and Protegrity Cloud APIs and Enterprise Security Appliance (ESA) services for data security operations. Protegrity Browser Protector Demo The following video shows how…

  • Is This Our End? Or Just Another Extinction Event?

    Is This Our End? Or Just Another Extinction Event?

    Knowledge workers wiped out. Architectural legends unemployed. Block announces ~40% RIF. Citrini AI report paints a dystopian future by 2028. Your company is like the Titanic. Your career is over. Better to sell the house while people have money to buy it. Stocks get battered, just so the winners win more. Trump wars in Iran,…

  • Just-In-Time Data Visibility: Protegrity Browser Protector

    Just-In-Time Data Visibility: Protegrity Browser Protector

    A Practical, Browser-Level Approach to Enterprise Data Protection Most enterprises protect sensitive data at rest and in transit. Data protection techniques such as tokenization, encryption, and masking are widely accepted best practices. They reduce breach impact, limit exposure, and support compliance initiatives across industries. But the moment users need to interact with protected data, security…

  • If AI Can’t Do Yoga, Should It Do Healthcare?

    If AI Can’t Do Yoga, Should It Do Healthcare?

    Artificial wellness is a big topic these days. For $365 per year, you can swing by Function Health and test 100 biomarkers, covering thyroid, cardiovascular health, heavy metals, nutrients, and much more. If you’re feeling ambitious, add SiPhox Health, Direct Labs, Ways2Well, and maybe squeeze in a Prenuvo or Ezra scan to hunt for early-stage…

  • Agentic Cybersecurity ROI: The CEO CISO Gap 

    Agentic Cybersecurity ROI: The CEO CISO Gap 

    Over the past few weeks, Anthropic has knocked billions of dollars of value out of the stock market. The “SaaSpocalypse” stock drop has just been supplanted by Cybersecurity stocks as the post-agentic era punching bag. The fundamental question, “Can we trust AI to build software?” has been answered. It’s not perfect, it’s getting better. It…

  • The Unin-Vited Guests: When Vibe Coding Ships Security Holes

    The Unin-Vited Guests: When Vibe Coding Ships Security Holes

    I look at CISA’s (the Cybersecurity and Infrastructure Security Agency) Known Exploited Vulnerabilities list regularly. Usually, it’s the typical flaws, VPN’s, firewalls, Microsoft, some major open-source packages… but today, I noticed CVE-2025-31125, a vulnerability in Vite. Vite is a frontend tooling framework for JavaScript. If you aren’t a developer, you may have never heard of…

  • Data Center Mania: Greed, Exuberance, and the Race to Build Artificial Brains

    Data Center Mania: Greed, Exuberance, and the Race to Build Artificial Brains

    THE FRAGILE AI STACK The modern AI stack is both complex and fragile. It’s built from a patchwork of third-party models, open-source frameworks, cloud services, and compute constraints, all orbiting around a single gravitational force: data. Whether you believe language models are “stochastic parrots” or “blurry JPEGs of the internet,” the next leap in AI…