Our Blog

Insights on AI security & governance

Practical thinking on shadow AI, data governance, enterprise security, and building AI systems you can actually trust.

Security articles

Page 1 of 2 · 10 posts

🤖
Safety Opinion

AI Companion Apps: The Friendship Your Child Does Not Need

220 million downloads. 64% of children using AI chatbots for emotional advice. Only 37% of parents aware.

Abhishek Sharma · 12 April 2026
🤖
Security Enterprise

Agentic AI Is Your Next Shadow AI Problem

48% of CISOs name agentic AI as the top attack vector for 2026. When the user is an autonomous agent, your old security playbook breaks down.

Abhishek Sharma · 12 April 2026
🏥
Security Enterprise

NHS Staff Are Pasting Patient Data into ChatGPT. Here Is the Fix.

Healthcare workers use free AI to speed up referrals. Patient data ends up on servers they do not control.

Abhishek Sharma · 12 April 2026
🚪
Security Enterprise

What Happens to Your AI Data When an Employee Leaves?

Employee departure is a data security event. How cryptographic key revocation makes AI data mathematically unrecoverable.

Abhishek Sharma · 9 March 2026
📊
Security Guide

The CISO's Guide to Evaluating AI Governance Tools

A 12-point checklist for security leaders evaluating AI governance platforms.

Abhishek Sharma · 9 March 2026
💰
Enterprise Security

The True Cost of Shadow AI: £530,000 Per Breach and Rising

IBM's 2025 data shows shadow AI breaches cost significantly more than average. What UK organisations can do today.

Abhishek Sharma · 2 March 2026
🆚
Opinion Security

Post-Retrieval Filtering vs Pre-Retrieval Enforcement

There's a fundamental difference between filtering what AI shows you and controlling what AI can find.

Abhishek Sharma · 16 February 2026
🧠
Product Security

How Other Me Handles PII: Vaulting, Redaction & Controlled Release

How our platform detects, vaults, and controls sensitive data — so AI assistants never see what they shouldn't.

Abhishek Sharma · 9 February 2026
🔒
Governance Security

What Is Pre-Retrieval Security and Why Does It Matter?

Why filtering data after retrieval is the wrong approach — and how pre-retrieval enforcement changes the security model.

Abhishek Sharma · 2 February 2026