THOUGHT LEADERSHIP

Insights on best practice and inclusivity in cybersecurity.

🚨 Cybersecurity Alert: New Insights from Microsoft's MTAC-East Asia Report (April 2024)🚨
James A Lang James A Lang

🚨 Cybersecurity Alert: New Insights from Microsoft's MTAC-East Asia Report (April 2024)🚨

The "MTAC-East Asia Report" by Microsoft Threat Intelligence, published in April 2024, provides an in-depth analysis of cyber and influence operations conducted by East Asian actors, particularly focusing on China and North Korea and the use of AI. This post is structured to give insights into:

• the methods,

• targets, and

• strategic implications of these activities.

Read More
AISec Case Study - Compromised PyTorch Dependency Chain
James A Lang James A Lang

AISec Case Study - Compromised PyTorch Dependency Chain

In a striking breach of security, malicious binaries masquerading as PyTorch dependencies compromised sensitive data on numerous Linux systems through PyPI, unveiling the dangers of dependency confusion in software supply chains.

Read More
Introducing KATO AI - Kaze’s Decision Engineering Platform
James A Lang James A Lang

Introducing KATO AI - Kaze’s Decision Engineering Platform

KATO AI is Kaze’s Decision Engineering platform that enables the development of our human-machine teaming products and services - using our Decision Science, Data Science and AI capabilities we remove uncertainty for business leaders, enabling them to make decisions with confidence.

Read More
Useful Resources for AI Security
James A Lang James A Lang

Useful Resources for AI Security

Don’t become a victim!

A useful set of tools and reference guides to help you secure your organisations AI value from cyberattacks.

Read More
Reference Architecture for an AI Cyber Agent
Cybersecurity, Agent-based solutions, AI James A Lang Cybersecurity, Agent-based solutions, AI James A Lang

Reference Architecture for an AI Cyber Agent

The rapid evolution of cyber threats and the increasing complexity of digital ecosystems have underscored the need for advanced cybersecurity measures. Intelligent agents will emerge as a promising approach for addressing these challenges, leveraging AI and machine learning techniques to detect and mitigate cyber threats in real-time. However, the design and deployment of effective agent-based solutions require a structured approach to ensure scalability, interoperability, and adaptability across diverse environments.

Read More

Get in Touch

Reach out with any questions or inquiries, and James will provide the strategic solutions you need.

Email James:

Or call:

07810524588