Microsoft Ignite 2025: AI Security – tl;dr but RTFM

Microsoft Ignite 2025: Mapping the M365 + Azure Attack Surface to the New AI Security Stack I spent the part of a week reading through the Microsoft Ignite 2025 announcements and honestly? The trend is interesting. AI this, AI that. Instead of the usual marketing fluff about “unified platforms” and “AI-powered everything,” Microsoft actually dropped…

Seeing the AI-Security Forest Through the Trees

A strategic look at adoption, exposure and what to do next … Executive take AI adoption is rising fastest in Software Engineering, Marketing/Sales, and Service/Customer Ops, while Finance/HR/Legal are catching up more cautiously. Globally, we’ve seen exponential innovation and patent filing of AI solutions. Exponential AI Innovation = Growing Attack Surface Source: Stanford “State of…

Is Claude Code Secure? Let’s Find Out!

Vulnerable Plugin + MCP Enumeration TL&DR Claude Code didn’t invent most of the security problems discussed in this article but it will make them faster, louder and easier to repeat. As I rush to use AI myself, I realize the attack surface is widening in ways that follow classic software supply chain weaknesses: With a…

Panel 1

Home

Breaches Cost Millions! Build AI Detections from NHI + Network logs

Executive Summary Imagine pouring years of hard-work into your idea, only to have your work stolen overnight. Every person and computer in your company is a target, finance with unreleased quarterly results, engineering with blueprints, development with new source code or a journalist with the latest story. That nightmare has been the reality for all…

From Known to Unknown: Shifting Cybersecurity to Proactive AI Detection

Introduction Everyday, Cyber Security teams are faced with a chicken-and-egg problem to detect and contain bad things. As I’ll discuss later in this article, it’s my belief that cyber teams shift allocation of resources to engineering of unsupervised anomaly detections to hunt for broader and deeper unknown threats. Threat Intelligence Teams and Red Teams alike…

training ai to Predict your competitor’s next …

Imagine a world where your every sentiment, every email, every social media post, every meeting minute and every line of code you write was then condensed down to create a pseudo “clone” of yourself. It sounds both horrifying and amazingly beautiful too. Now imagine your ideas, comments and thoughts being used against you or your…

Panel 2 Placeholder
Panel 3 Placeholder
Panel 4 Placeholder