Category: Blogs

  • The Unin-Vited Guests: When Vibe Coding Ships Security Holes

    The Unin-Vited Guests: When Vibe Coding Ships Security Holes

    I look at CISA’s (the Cybersecurity and Infrastructure Security Agency) Known Exploited Vulnerabilities list regularly. Usually, it’s the typical flaws, VPN’s, firewalls, Microsoft, some major open-source packages… but today, I noticed CVE-2025-31125, a vulnerability in Vite. Vite is a frontend tooling framework for JavaScript. If you aren’t a developer, you may have never heard of…

  • Data Center Mania: Greed, Exuberance, and the Race to Build Artificial Brains

    Data Center Mania: Greed, Exuberance, and the Race to Build Artificial Brains

    THE FRAGILE AI STACK The modern AI stack is both complex and fragile. It’s built from a patchwork of third-party models, open-source frameworks, cloud services, and compute constraints, all orbiting around a single gravitational force: data. Whether you believe language models are “stochastic parrots” or “blurry JPEGs of the internet,” the next leap in AI…

  • AI Fraud Detection in 2026: What Security and Risk Leaders Must Know

    AI Fraud Detection in 2026: What Security and Risk Leaders Must Know

    Fraud has always evolved quickly, but the acceleration in 2025—driven by generative AI, synthetic identities, model-evasion techniques, and automated social engineering—has pushed enterprises into a new era of risk. As we move into 2026, AI is reshaping fraud detection faster than any previous shift, forcing security and data teams to rethink how they identify anomalies…

  • Future Data Theft and How We’ll Fight Back

    Future Data Theft and How We’ll Fight Back

    You wake up in the year 2047, where everything is connected to a network. You stretch your arms as your AI coffee maker prepares beans harvested on the moon. With five rapid blinks, you deactivate “do not disturb” on your brain-implanted HUD, and suddenly, you receive a barrage of bank notifications alerting you to suspicious…

  • When GenAI Thinks Like Don Quixote

    When working with Generative AI (GenAI) day in and day out, you see the promise and experience the difficulty of an entirely new business paradigm. GenAI brings real, transformative, enterprise scale power to knowledge work – it is the coming of the second industrial revolution. Yet, organizations shouldn’t assume agents will behave benevolently when deployed…

  • The Social Engineering Economy

    It started the way most heists do, with a file that shouldn’t exist. Bob, the vendor account manager, exported a spreadsheet to send out Holiday greeting cards to his customer’s family. Bob always takes copious notes on his customers, their family, how many kids, their names, ages, and which college they got accepted to. It’s…

  • How To Make It in this Agentic World

    How To Make It in this Agentic World

    For centuries, the question of achieving success was answered simply by effort and skill. Back in the day, you were told to do a good job, and in doing so, you would be rewarded. “Lace up your boots and get to work,” they preached. Expertise was fundamental to doing a good job, hence education, practice,…

  • A Quantum Tunnel Through Time: Quantum Computers and Post-Quantum Cryptography

    The Nobel Prize and the Quantum Era On Tuesday, the Nobel Prize in Physics was awarded to John Clarke, Michel H. Devoret, and John M. Martinis. Their experiments with superconducting circuits and Josephson junctions demonstrated that quantum mechanics can govern the behavior of an entire electronic circuit—not just individual particles. They showed that these macroscopic…

  • Secure Your AI Pipeline: Introducing Protegrity Developer Edition 

    Introducing Protegrity Developer Edition Developers are under pressure to build and test new workflows quickly, often with sensitive data. As soon as real customer or financial information is introduced, projects slow down because of compliance, risk, and governance concerns. Identifiers like account numbers, claims records, or health data can’t safely flow through pipelines or models…

  • The Asana of Success

    Yoga aims to unite the body, mind, and soul together to form an integrated whole. All is one. As I reflect on my 25-year yoga journey, I realize there are certain go-to poses in my Vinyasa database, if you will. This makes me wonder what it is in my personality that attracts me to the…