Protecto

817 posts

Protecto banner
Protecto

Protecto

@ProtectoAi

Securing the future of autonomous AI. Privacy, trust, and control built into every decision. #AIPrivacy #DataSecurity #AgenticAI

Cupertino, CA Katılım Ağustos 2019
157 Takip Edilen125 Takipçiler
Sabitlenmiş Tweet
Protecto
Protecto@ProtectoAi·
@ProtectoAi Vault is now on @gcloudpartners Marketplace. If you're running AI on GCP with sensitive data, this one's for you.
English
1
0
1
30
Protecto retweetledi
Citrix
Citrix@citrix·
Sensitive data reaches LLMs from more places than you think: user input, MCP servers, RAG pipelines, and more. Once it crosses the enterprise boundary, control is gone. #NetScaler AI Gateway + @ProtectoAi closes that gap. Learn more about our integration: bit.ly/3Q3IRs6
Citrix tweet media
English
0
3
6
517
Protecto retweetledi
Amar Kanagaraj
Amar Kanagaraj@amarkanagaraj·
Agent governance is getting real. This month alone, the signals are everywhere. - @Gartner_inc warned that enterprise GenAI apps will see rising security incidents as agentic AI and MCP adoption grows. - @Microsoft launched an Agent Governance Toolkit for runtime security. - @msftsecurity made the point even more clearly: identity alone cannot decide whether an action should happen now, for this user, under this business and regulatory context. - @NIST (NIST) is now treating AI agent identity and authorization as a real standards problem. - And recent research from Unit 42 showed how an overprivileged AI agent could become a path for data compromise. But agent governance is not just an identity problem. The missing layer is context security at runtime. That is because an agent is not like a human user with one fixed role. The same agent may help a marketing person in one moment. And help a sales person in the next. It may also call another agent. Or use another tool. So the real question is not just who the agent is. It is what that agent should be allowed to see, carry, share, or act on right now. So there are really two layers to solve for. First, identity. Is this really the agent it claims to be? Second, runtime context control. Given this user, this task, this data, and this workflow, what should that agent be allowed to access, preserve, unmask, share, or even act on? This is why at @protectoai, we are building CBAC: Context based access control That means detecting sensitive and confidential data in real time. Protecting it without breaking context. Allowing selective reveal only when policy allows. And carrying those controls across chained agents and tools. But the missing layer is still #AIcontext security at runtime. That is where enterprise trust in #AI will actually be won.
English
0
2
2
60
Protecto retweetledi
Amar Kanagaraj
Amar Kanagaraj@amarkanagaraj·
Why #Glasswing? LLMs can now read binary almost the way it reads code or language.  That changes cybersecurity. Anthropic says its upcoming version #Claude #Mythos Preview can reverse engineer stripped binaries into plausible source code, reason over what the software is doing, and then look for vulnerabilities from there.  So this is no longer just about scanning source code. It is about finding weaknesses directly from binaries too.  Anthropic’s public examples of such vulnerabilities found by Mythos are already notable. - 27 year old OpenBSD bug - this could have huge implication - 16 year old FFmpeg flaw that survived five million automated test hits. And Linux kernel vulnerabilities chained into full machine compromise.  That, combined with major gains in reasoning and autonomy, is why Anthropic did not broadly release the model. Instead, it launched Project #Glasswing to give defenders early access to secure critical software first.  The security ecosystem is still catching up to pace of AI innovation. The model may be ready. Is the world ready? #AI #CyberSecurity #Anthropic #ProjectGlasswing #ReverseEngineering #AppSec #Infosec
Amar Kanagaraj tweet media
English
0
1
1
70
Protecto
Protecto@ProtectoAi·
@citrix launched @NetScaler AI Gateway and named Protecto as one of two security integrations in the official announcement. Context-aware PII masking at the gateway layer, before it ever hits the LLM. Technical breakdown on Citrix TechZone: community.citrix.com/techzone-blogs…
Protecto tweet media
English
1
2
3
53
Protecto
Protecto@ProtectoAi·
Step 2. Sensitive values get masked, not with random tokens, but semantically equivalent replacements. The AI still understands the context. The real data stays private.
English
1
0
1
5
Protecto
Protecto@ProtectoAi·
How Protecto Vault works on GCP. A quick thread.
English
1
0
1
4
Protecto
Protecto@ProtectoAi·
Step 2. Sensitive values get masked, not with random tokens, but semantically equivalent replacements. The AI still understands the context. The real data stays private.
English
0
0
1
6
Protecto
Protecto@ProtectoAi·
Step 1. Data enters your AI. Protecto intercepts every input and scans for PII, PHI, and financial data. Before anything reaches your model.
English
1
0
1
5
Protecto
Protecto@ProtectoAi·
How Protecto Vault works on GCP. A quick thread. 🧵
English
1
0
1
6
Protecto
Protecto@ProtectoAi·
We built detection for real enterprise data. Not clean CSVs. Messy prompts, Arabic numerals, mixed languages, malformed fields. It works on what you actually have, not what you wish you had. @gcloudpartners
Protecto tweet media
English
0
0
1
8
Protecto
Protecto@ProtectoAi·
99% PII detection. Here's why 1% matters: at 95%, 1 in 20 sensitive items slips through. Processing 1M records? 50,000 unprotected data points reaching your AI. In regulated industries, that's a compliance incident. @gcloudpartners
English
1
0
1
13
Protecto
Protecto@ProtectoAi·
99% PII detection accuracy. Across structured and unstructured data. In production, not a benchmark. Built for messy, real-world enterprise data with typos and mixed languages.
English
0
0
1
8
Protecto
Protecto@ProtectoAi·
You have to choose between privacy and AI accuracy.' You don't. That trade-off only exists with tools that use random-token masking. Semantic masking eliminates it. @gcloudpartners
English
1
0
1
4