Patrick WalshinThe Salty HashApplication-layer Encryption (ALE) Demo Using a Notes AppIt can be difficult to demo encryption. If you do it right, the encryption is invisible to users, but the hackers only see garbage data…Oct 17Oct 17
Patrick WalshinThe Salty HashHow to talk to the business about AI security risksIf you’re on a security or engineering team and you’ve read our Securing Gen-AI White Paper, you probably understand that the addition of…Oct 16Oct 16
Patrick WalshinThe Salty HashUsing Application-Layer Encryption to Restrict Insider AccessApplication-layer or application-level encryption (ALE) is a pattern for encrypting data before sending it to a data store in order to…Sep 6Sep 6
Patrick WalshinThe Salty HashSnowflake and AT&T Breaches Were Preventable With Application-layer EncryptionMisleading Encryption Claims and a Lack of “Security by Default” are the Root CausesJul 25Jul 25
Patrick WalshinThe Salty HashAnalysis of Apple’s New AI Private Compute CloudThe Good and the Bad of Their Approach to Private Server-side LLMsJun 134Jun 134
Patrick WalshinThe Salty HashSecuring AI: The Stack You Need to Protect Your GenAI SystemsEnterprise-grade GenAI systems need these 7 thingsMay 23May 23
Patrick WalshinThe Salty HashThe Encrypted Messenger WarsTelegram vs. Signal: what really mattersMay 23May 23
Patrick WalshinThe Salty Hash5 Things SaaS Companies Get Wrong with BYOKBring Your Own Key (BYOK) is an acronym without a clear and widely agreed-upon definition. It can mean anything from uploading some key…Apr 2Apr 2
Patrick WalshQuick tip: fixing the sudo file on MacOSFor any Apple Silicon users stuck in a terminal ditchApr 2Apr 2
Patrick WalshinThe Salty Hash7 Predictions for 2024We look ahead at the tech industry in 2024 and the factors that will influence its direction and decision making from AI to cybersecurity.Jan 16Jan 16