
IronCore Labs
@IronCoreLabs
Followers
345
Following
451
Media
341
Statuses
1K
Bringing strong data protection to cloud apps and AI through usable, searchable, data-in-use encryption. @[email protected]
Joined March 2015
IronCore is proud to be named a Gartner Cool Vendor in the just released "Cool Vendors in Data Security 2025: Securing Your Data in the Age of GenAI and Quantum Computing" report! Here's the link if you're a client:. #cybersecurity #genai #encryption.
gartner.com
Gartner Research on Cool Vendors in Data Security 2025: Securing Your Data in the Age of GenAI and Quantum Computing
0
1
0
New blog out covering trends we're seeing in #SaaS #security and specifically the increase in push for advanced #encryption from financial sector companies.
ironcorelabs.com
Financial institutions are demanding SaaS vendors adopt application-layer encryption and hold-your-own-key solutions. Here's what's driving the increase in pressure.
0
0
0
What do you need to #hack AI? Just a little persistence. Built-in #AI controls are not #security and should never be trusted as such. Read our new blog explaining what we mean:.
ironcorelabs.com
LLMs produce different results every time and sometimes those results are outliers that can be used by hackers to exploit systems.
0
0
0
IronCore has just announced its ability to #encrypt training data and use that encrypted data to build models, which can only be run with the proper key. Bring your own #AI framework, only with #privacy and #security layered in.
apnews.com
IronCore Labs’ Cloaked AI now encrypts training data and models, ensuring AI privacy and security of production AI systems.
0
1
2
Why DCPE may be the best option for securing AI data while NIST #standards for privacy-preserving #encryption remain years away.
ironcorelabs.com
Why DCPE may be the best option for securing AI data while NIST standards for privacy-preserving encryption remain years away.
0
0
1
New blog on why hackers keep winning and how one change could flip the script, if only more people thought at a systems level instead of playing whack-a-mole. #security #cyber #breaches.
ironcorelabs.com
Major breaches expose the data of millions of people and all due to single failure points and a lack of security in depth.
0
0
0
New blog post! "Training AI Without Leaking Data: How Encrypted Embeddings Protect Privacy" A workable pattern for #ai teams who want to train models on private data. #privacy #security
ironcorelabs.com
Learn how to protect sensitive data in AI training by using encrypted vector embeddings. This blog explores privacy risks in AI and presents secure methods like approximate-distance-comparison-pres...
0
1
1
IronCore CEO Patrick Walsh will be joining Jamal Khan of @ConnectionIT on May 7th for a deep dive on emerging threats in AI, vectors, vector databases, and more. The discussion will be a good one covering data privacy, best practices, and more. Join us!
0
1
0
Provisional requirements in PCIv4 are now mandatory. We cover what it means for protecting account holder data as well as requirements for SaaS companies. #security #compliance #cyber.
ironcorelabs.com
What's new in PCI v4 and what it means for protecting account holder data. Dives into the specific requirements and suggestions as well as the extra requirements directed at multi-tenant SaaS...
0
0
0
New white paper is out! Read about #AI Shadow Data -- where it collects and what to do about it to keep data #private and secure. #cybersecurity.
ironcorelabs.com
There are three major areas of untracked and unprotected shadow data in AI systems where copies of sensitive data accrue. Learn about the areas of AI shadow data and how to manage them.
0
0
1
AI brings #security risks and almost everyone is adopting AI ahead of protective measures to mitigate the risks. If your software vendors are adding AI features, you should verify that they're taking security seriously. Here are some questions to ask.
ironcorelabs.com
Before trusting vendor's new AI feature, ask these 12 critical security questions to protect your data, prevent breaches, and ensure compliance.
0
0
0
New blog with the ten steps every security team should be doing ahead of the release of any AI project.
ironcorelabs.com
Stay ahead of threats like prompt injections, data leaks, and model manipulation with proactive measures every company should take before rolling out AI features.
0
0
0
The new @OWASP Top 10 for LLM Applications is 💥 By focusing on the bigger picture surrounding models, it's a better tool for companies looking to #secure their #AI features. Don't miss LLM08.
ironcorelabs.com
OWASP released their second version of the Top 10 for LLM Applications, and it now includes vector and embedding weaknesses among other major new issues that go beyond the LLM model itself
0
0
0
In part 3 of our series on protecting your #privacy, #Apple's OpenAI ChatGPT integration falls short of expectations. What we recommend you do with Apple Intelligence to stay safe.
ironcorelabs.com
Apple has done a lot to preserve privacy when you use their AI, but all of their privacy promises evaporate when you use Apple's ChatGPT integration.
0
0
1
In part two in our series helping people make their digital lives more #private and #secure, we cover email and text communications and dig in to see if Google is really respecting your email privacy (some interesting finds here). Please share!
ironcorelabs.com
A checklist of things to do to better protect the privacy of your emails and text messages as a guard against hackers, surveillance capitalism, and overreaching and authoritarian governments.
0
0
0
We have a new series on protecting your personal privacy. Part one covers what you should do to avoid identity theft and we hope it's something you'll share with your relatives and friends, our intended audience for this one. Be safe out there!
ironcorelabs.com
A privacy checklist series covering what people should do to keep themselves safe online. This first part covers steps to take to prevent identity theft.
0
0
1
Implementing application-layer encryption (ALE) is a powerful way to secure sensitive data, yet building it in-house presents challenges far beyond simply calling an encryption function. Our new blog explores the many hidden complexities in an ALE system.
ironcorelabs.com
A discussion of how to design a system to use application-layer encryption and the non-obvious considerations that add complexity
0
1
0
Thinking of using MySQL’s built-in encryption functions for your sensitive data? Think again. MySQL’s native AES encryption presents security risks with outdated and insecure modes, bad defaults, inadequate key management, and poor scalability.
ironcorelabs.com
6 reasons to avoid MySQL's native encryption functions from bad cryptographic choices to terrible side effects, we explain why you should think twice.
0
1
1