Patrick WalshinThe Salty HashUsing Application-Layer Encryption to Restrict Insider AccessApplication-layer or application-level encryption (ALE) is a pattern for encrypting data before sending it to a data store in order to…Sep 6Sep 6
Patrick WalshinThe Salty HashSnowflake and AT&T Breaches Were Preventable With Application-layer EncryptionMisleading Encryption Claims and a Lack of “Security by Default” are the Root CausesJul 25Jul 25
Patrick WalshinThe Salty HashAnalysis of Apple’s New AI Private Compute CloudThe Good and the Bad of Their Approach to Private Server-side LLMsJun 133Jun 133
Patrick WalshinThe Salty HashSecuring AI: The Stack You Need to Protect Your GenAI SystemsEnterprise-grade GenAI systems need these 7 thingsMay 23May 23
Patrick WalshinThe Salty HashThe Encrypted Messenger WarsTelegram vs. Signal: what really mattersMay 23May 23
Patrick WalshinThe Salty Hash5 Things SaaS Companies Get Wrong with BYOKBring Your Own Key (BYOK) is an acronym without a clear and widely agreed-upon definition. It can mean anything from uploading some key…Apr 2Apr 2
Patrick WalshQuick tip: fixing the sudo file on MacOSFor any Apple Silicon users stuck in a terminal ditchApr 2Apr 2
Patrick WalshinThe Salty Hash7 Predictions for 2024We look ahead at the tech industry in 2024 and the factors that will influence its direction and decision making from AI to cybersecurity.Jan 16Jan 16
Patrick WalshinThe Salty HashAI Systems And Vector Databases Are Generating New Privacy RisksThe proliferation of generally intelligent AI models is turning machine learning projects on their heads and changing the source of risk…Nov 3, 2023Nov 3, 2023
Patrick WalshinThe Salty Hash“Embeddings Aren’t Human Readable” And Other NonsenseIn the last month, I’ve heard this and similar things a number of times. Senior leaders at vector database companies told me vector…Aug 21, 2023Aug 21, 2023